LAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1659.433721][T21367] ? save_stack+0x23/0x90 [ 1659.438063][T21367] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1659.443882][T21367] ? kasan_kmalloc+0x9/0x10 [ 1659.448405][T21367] __should_failslab+0x121/0x190 [ 1659.453457][T21367] should_failslab+0x9/0x14 [ 1659.457968][T21367] kmem_cache_alloc_node_trace+0x5a/0x750 [ 1659.463698][T21367] ? do_syscall_64+0xfa/0x790 [ 1659.468379][T21367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.474567][T21367] __kmalloc_node_track_caller+0x3d/0x70 [ 1659.480206][T21367] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1659.485593][T21367] pskb_expand_head+0x151/0xff0 [ 1659.485620][T21367] netlink_trim+0x218/0x270 [ 1659.485637][T21367] netlink_broadcast_filtered+0x67/0xd20 [ 1659.485659][T21367] ? qdisc_watchdog+0x280/0x280 [ 1659.494995][T21367] netlink_broadcast+0x3a/0x50 [ 1659.495017][T21367] rtnetlink_send+0xa5/0x1a0 [ 1659.514826][T21367] tclass_notify.isra.0.constprop.0+0x141/0x1a0 [ 1659.521096][T21367] tc_ctl_tclass+0x8eb/0xcd0 [ 1659.525711][T21367] ? qdisc_tree_reduce_backlog+0x570/0x570 [ 1659.531541][T21367] ? rtnetlink_rcv_msg+0x3d0/0xaf0 [ 1659.536689][T21367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1659.543127][T21367] ? qdisc_tree_reduce_backlog+0x570/0x570 [ 1659.548948][T21367] rtnetlink_rcv_msg+0x45e/0xaf0 [ 1659.553919][T21367] ? rtnl_bridge_getlink+0x910/0x910 [ 1659.559218][T21367] ? netlink_deliver_tap+0x228/0xbe0 [ 1659.564503][T21367] ? find_held_lock+0x35/0x130 [ 1659.569273][T21367] netlink_rcv_skb+0x177/0x450 [ 1659.574040][T21367] ? rtnl_bridge_getlink+0x910/0x910 [ 1659.579339][T21367] ? netlink_ack+0xb50/0xb50 [ 1659.584111][T21367] ? __kasan_check_read+0x11/0x20 [ 1659.589130][T21367] ? netlink_deliver_tap+0x24a/0xbe0 [ 1659.594422][T21367] rtnetlink_rcv+0x1d/0x30 [ 1659.598893][T21367] netlink_unicast+0x58c/0x7d0 [ 1659.603780][T21367] ? netlink_attachskb+0x870/0x870 [ 1659.608920][T21367] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1659.614661][T21367] ? __check_object_size+0x3d/0x437 [ 1659.619891][T21367] netlink_sendmsg+0x91c/0xea0 [ 1659.624685][T21367] ? netlink_unicast+0x7d0/0x7d0 [ 1659.629659][T21367] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1659.635359][T21367] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1659.640843][T21367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1659.647107][T21367] ? security_socket_sendmsg+0x8d/0xc0 [ 1659.652590][T21367] ? netlink_unicast+0x7d0/0x7d0 [ 1659.657601][T21367] sock_sendmsg+0xd7/0x130 [ 1659.662042][T21367] ____sys_sendmsg+0x358/0x880 [ 1659.666833][T21367] ? kernel_sendmsg+0x50/0x50 [ 1659.671626][T21367] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1659.677186][T21367] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1659.683181][T21367] ? find_held_lock+0x35/0x130 [ 1659.687975][T21367] ___sys_sendmsg+0x100/0x170 [ 1659.692673][T21367] ? sendmsg_copy_msghdr+0x70/0x70 [ 1659.697800][T21367] ? __kasan_check_read+0x11/0x20 [ 1659.702844][T21367] ? __might_fault+0x12b/0x1e0 [ 1659.707622][T21367] ? find_held_lock+0x35/0x130 [ 1659.712406][T21367] ? __might_fault+0x12b/0x1e0 [ 1659.717195][T21367] ? ksys_dup3+0x3e0/0x3e0 [ 1659.721642][T21367] ? lock_downgrade+0x920/0x920 [ 1659.726521][T21367] ? ___might_sleep+0x163/0x2c0 [ 1659.731387][T21367] __sys_sendmmsg+0x1bf/0x4d0 [ 1659.736084][T21367] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1659.741142][T21367] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1659.747393][T21367] ? fput_many+0x12c/0x1a0 [ 1659.751828][T21367] ? fput+0x1b/0x20 [ 1659.755732][T21367] ? ksys_write+0x1cf/0x290 [ 1659.760252][T21367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1659.765723][T21367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1659.771193][T21367] ? do_syscall_64+0x26/0x790 [ 1659.775881][T21367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.781966][T21367] ? do_syscall_64+0x26/0x790 [ 1659.786663][T21367] __x64_sys_sendmmsg+0x9d/0x100 [ 1659.792160][T21367] do_syscall_64+0xfa/0x790 [ 1659.796729][T21367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1659.796740][T21367] RIP: 0033:0x45a6f9 [ 1659.796755][T21367] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1659.796762][T21367] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1659.796775][T21367] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1659.796782][T21367] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1659.796789][T21367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1659.796796][T21367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1659.796804][T21367] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, 0xfffffffffffffffe) getsockname(r2, &(0x7f0000000200)=@can, &(0x7f0000000180)=0x80) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) r3 = socket(0x15, 0x80005, 0x0) r4 = socket$inet(0x2, 0x2, 0x5) getsockopt(r4, 0x80004114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0xfffffe08) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x9161, 0x9, [0x5, 0x5, 0x1ff, 0x4, 0x6, 0x1, 0xfffc, 0xfff, 0x1]}, &(0x7f00000002c0)=0x1a) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r5}, &(0x7f0000000340)=0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) accept4(0xffffffffffffffff, &(0x7f0000000740)=@un=@abs, &(0x7f00000007c0)=0x80, 0x400) r6 = socket(0x15, 0x80005, 0x0) getsockopt(r6, 0x200000000114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, 0x0, 0x0) r7 = socket(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r8, 0x8901, 0xfffffffffffffffe) listen(r8, 0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r7, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) r9 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r9, 0x8901, 0xfffffffffffffffe) accept(r8, &(0x7f0000000380)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r10 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r10, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:21:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) socket$inet(0x2, 0x5, 0x8) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000180)) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) gettid() setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000000200)={0x8, {{0xa, 0x4e24, 0x8, @rand_addr="dac9425921ddb457443d9cb6da771157", 0x3}}}, 0x88) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:21:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00z\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:29 executing program 2 (fault-call:4 fault-nth:24): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:21:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000240)=[0x4], 0x2) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) socket$inet6(0xa, 0x80003, 0x6b) sendmsg(r0, &(0x7f0000000380)={0x0, 0xfffffffffffffeec, &(0x7f0000000400)=[{&(0x7f0000002e00)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb3532da1f23a262055223e7a3a62f15eeb8060dc9cfa30e6783757ae2f0ac6ed75d3212591ccd", 0x27d}], 0x1000000000000336}, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x200000000114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) r2 = socket(0x15, 0x80005, 0x0) getsockopt(r2, 0x200000000114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) 00:21:29 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1667.824334][T21393] FAULT_INJECTION: forcing a failure. [ 1667.824334][T21393] name failslab, interval 1, probability 0, space 0, times 0 [ 1667.879296][T21393] CPU: 0 PID: 21393 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1667.888289][T21393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1667.898366][T21393] Call Trace: [ 1667.901676][T21393] dump_stack+0x197/0x210 [ 1667.906028][T21393] should_fail.cold+0xa/0x15 [ 1667.910644][T21393] ? fault_create_debugfs_attr+0x180/0x180 [ 1667.916484][T21393] __should_failslab+0x121/0x190 [ 1667.921423][T21393] should_failslab+0x9/0x14 [ 1667.926035][T21393] kmem_cache_alloc+0x47/0x710 [ 1667.930798][T21393] ? lock_acquire+0x190/0x410 [ 1667.936084][T21393] ? netlink_deliver_tap+0x146/0xbe0 [ 1667.941369][T21393] skb_clone+0x154/0x3d0 [ 1667.945611][T21393] netlink_deliver_tap+0x943/0xbe0 [ 1667.950763][T21393] netlink_unicast+0x643/0x7d0 [ 1667.955533][T21393] ? netlink_attachskb+0x870/0x870 [ 1667.960656][T21393] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1667.966338][T21393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1667.972612][T21393] ? __check_object_size+0x3d/0x437 [ 1667.977943][T21393] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1667.983859][T21393] netlink_sendmsg+0x91c/0xea0 [ 1667.988737][T21393] ? netlink_unicast+0x7d0/0x7d0 [ 1667.993678][T21393] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1667.999235][T21393] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1668.004703][T21393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1668.010936][T21393] ? security_socket_sendmsg+0x8d/0xc0 [ 1668.016502][T21393] ? netlink_unicast+0x7d0/0x7d0 [ 1668.021534][T21393] sock_sendmsg+0xd7/0x130 [ 1668.026083][T21393] ____sys_sendmsg+0x358/0x880 [ 1668.030975][T21393] ? kernel_sendmsg+0x50/0x50 [ 1668.035656][T21393] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1668.041214][T21393] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1668.047209][T21393] ? find_held_lock+0x35/0x130 [ 1668.051979][T21393] ___sys_sendmsg+0x100/0x170 [ 1668.056686][T21393] ? sendmsg_copy_msghdr+0x70/0x70 [ 1668.061816][T21393] ? __kasan_check_read+0x11/0x20 [ 1668.066931][T21393] ? __might_fault+0x12b/0x1e0 [ 1668.071690][T21393] ? find_held_lock+0x35/0x130 [ 1668.076449][T21393] ? __might_fault+0x12b/0x1e0 [ 1668.081229][T21393] ? ksys_dup3+0x3e0/0x3e0 [ 1668.085655][T21393] ? lock_downgrade+0x920/0x920 [ 1668.090512][T21393] ? ___might_sleep+0x163/0x2c0 [ 1668.095350][T21393] __sys_sendmmsg+0x1bf/0x4d0 [ 1668.100045][T21393] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1668.105069][T21393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1668.111315][T21393] ? fput_many+0x12c/0x1a0 [ 1668.116682][T21393] ? fput+0x1b/0x20 [ 1668.120489][T21393] ? ksys_write+0x1cf/0x290 [ 1668.124983][T21393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1668.130454][T21393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1668.135942][T21393] ? do_syscall_64+0x26/0x790 [ 1668.140631][T21393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.146717][T21393] ? do_syscall_64+0x26/0x790 [ 1668.151419][T21393] __x64_sys_sendmmsg+0x9d/0x100 [ 1668.156357][T21393] do_syscall_64+0xfa/0x790 [ 1668.160905][T21393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.166802][T21393] RIP: 0033:0x45a6f9 [ 1668.170686][T21393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1668.190276][T21393] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1668.198688][T21393] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1668.206674][T21393] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1668.214658][T21393] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1668.222677][T21393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 00:21:30 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$packet(0x11, 0x2, 0x300) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x1ff) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000000c0)="8b0d7bababc8db8db6f64149a749642b8f5c39334fc9a5a609467588deb5876ed80147eb6c5db15d9888b4c3e16a2fc9eddd4531ab43c329613afc44a3c51949bdb74d599c09e112939a2b0370b8ab86ab2da4c21977de8844f402", 0x5b) close(r2) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000180)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:21:30 executing program 2 (fault-call:4 fault-nth:25): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1668.230646][T21393] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x03\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1668.401146][T21421] FAULT_INJECTION: forcing a failure. [ 1668.401146][T21421] name failslab, interval 1, probability 0, space 0, times 0 [ 1668.422967][T21421] CPU: 1 PID: 21421 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1668.431696][T21421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1668.441767][T21421] Call Trace: [ 1668.445262][T21421] dump_stack+0x197/0x210 [ 1668.449619][T21421] should_fail.cold+0xa/0x15 [ 1668.454235][T21421] ? fault_create_debugfs_attr+0x180/0x180 [ 1668.460082][T21421] ? ___might_sleep+0x163/0x2c0 [ 1668.464954][T21421] __should_failslab+0x121/0x190 [ 1668.469998][T21421] should_failslab+0x9/0x14 [ 1668.474511][T21421] kmem_cache_alloc_node_trace+0x274/0x750 [ 1668.480334][T21421] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1668.486410][T21421] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1668.492239][T21421] __kmalloc_node_track_caller+0x3d/0x70 [ 1668.498674][T21421] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1668.504339][T21421] __alloc_skb+0x10b/0x5e0 [ 1668.508774][T21421] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1668.514336][T21421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1668.520594][T21421] ? qdisc_tree_reduce_backlog+0x570/0x570 [ 1668.526427][T21421] netlink_ack+0x25c/0xb50 [ 1668.530866][T21421] ? netlink_sendmsg+0xea0/0xea0 [ 1668.535820][T21421] ? find_held_lock+0x35/0x130 [ 1668.540609][T21421] netlink_rcv_skb+0x376/0x450 [ 1668.545385][T21421] ? rtnl_bridge_getlink+0x910/0x910 [ 1668.550684][T21421] ? netlink_ack+0xb50/0xb50 [ 1668.555283][T21421] ? __kasan_check_read+0x11/0x20 [ 1668.560425][T21421] ? netlink_deliver_tap+0x24a/0xbe0 [ 1668.565926][T21421] rtnetlink_rcv+0x1d/0x30 [ 1668.570354][T21421] netlink_unicast+0x58c/0x7d0 [ 1668.575131][T21421] ? netlink_attachskb+0x870/0x870 [ 1668.580536][T21421] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1668.586527][T21421] ? __check_object_size+0x3d/0x437 [ 1668.591830][T21421] netlink_sendmsg+0x91c/0xea0 [ 1668.596793][T21421] ? netlink_unicast+0x7d0/0x7d0 [ 1668.601858][T21421] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1668.607858][T21421] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1668.613587][T21421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1668.620470][T21421] ? security_socket_sendmsg+0x8d/0xc0 [ 1668.627263][T21421] ? netlink_unicast+0x7d0/0x7d0 [ 1668.632419][T21421] sock_sendmsg+0xd7/0x130 [ 1668.637639][T21421] ____sys_sendmsg+0x358/0x880 [ 1668.643135][T21421] ? kernel_sendmsg+0x50/0x50 [ 1668.648177][T21421] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1668.653916][T21421] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1668.660168][T21421] ? find_held_lock+0x35/0x130 [ 1668.664945][T21421] ___sys_sendmsg+0x100/0x170 [ 1668.669700][T21421] ? sendmsg_copy_msghdr+0x70/0x70 [ 1668.674809][T21421] ? __kasan_check_read+0x11/0x20 [ 1668.679820][T21421] ? __might_fault+0x12b/0x1e0 [ 1668.684581][T21421] ? find_held_lock+0x35/0x130 [ 1668.689603][T21421] ? __might_fault+0x12b/0x1e0 [ 1668.694541][T21421] ? ksys_dup3+0x3e0/0x3e0 [ 1668.698974][T21421] ? lock_downgrade+0x920/0x920 [ 1668.704255][T21421] ? ___might_sleep+0x163/0x2c0 [ 1668.709192][T21421] __sys_sendmmsg+0x1bf/0x4d0 [ 1668.714222][T21421] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1668.719294][T21421] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1668.726164][T21421] ? fput_many+0x12c/0x1a0 [ 1668.730932][T21421] ? fput+0x1b/0x20 [ 1668.734762][T21421] ? ksys_write+0x1cf/0x290 [ 1668.741373][T21421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1668.748251][T21421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1668.754053][T21421] ? do_syscall_64+0x26/0x790 [ 1668.758731][T21421] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.764813][T21421] ? do_syscall_64+0x26/0x790 [ 1668.769512][T21421] __x64_sys_sendmmsg+0x9d/0x100 [ 1668.774730][T21421] do_syscall_64+0xfa/0x790 [ 1668.779246][T21421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1668.785125][T21421] RIP: 0033:0x45a6f9 [ 1668.789003][T21421] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1668.808875][T21421] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1668.817274][T21421] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1668.825231][T21421] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1668.833536][T21421] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1668.841507][T21421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 00:21:31 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1668.849463][T21421] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x05\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:31 executing program 2 (fault-call:4 fault-nth:26): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1669.037306][T21436] FAULT_INJECTION: forcing a failure. [ 1669.037306][T21436] name failslab, interval 1, probability 0, space 0, times 0 [ 1669.072277][T21436] CPU: 1 PID: 21436 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1669.082876][T21436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1669.093565][T21436] Call Trace: [ 1669.096886][T21436] dump_stack+0x197/0x210 [ 1669.101446][T21436] should_fail.cold+0xa/0x15 [ 1669.106061][T21436] ? fault_create_debugfs_attr+0x180/0x180 [ 1669.111896][T21436] __should_failslab+0x121/0x190 [ 1669.118315][T21436] should_failslab+0x9/0x14 [ 1669.122947][T21436] kmem_cache_alloc+0x47/0x710 [ 1669.127735][T21436] ? lock_acquire+0x190/0x410 [ 1669.132754][T21436] ? netlink_deliver_tap+0x146/0xbe0 [ 1669.139376][T21436] skb_clone+0x154/0x3d0 [ 1669.144091][T21436] netlink_deliver_tap+0x943/0xbe0 [ 1669.149205][T21436] netlink_unicast+0x643/0x7d0 [ 1669.149223][T21436] ? netlink_attachskb+0x870/0x870 [ 1669.149239][T21436] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1669.149254][T21436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1669.149268][T21436] ? __check_object_size+0x3d/0x437 [ 1669.149285][T21436] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1669.159332][T21436] netlink_sendmsg+0x91c/0xea0 [ 1669.159354][T21436] ? netlink_unicast+0x7d0/0x7d0 [ 1669.159375][T21436] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1669.171372][T21436] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1669.171389][T21436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1669.171404][T21436] ? security_socket_sendmsg+0x8d/0xc0 [ 1669.171420][T21436] ? netlink_unicast+0x7d0/0x7d0 [ 1669.171440][T21436] sock_sendmsg+0xd7/0x130 [ 1669.182848][T21436] ____sys_sendmsg+0x358/0x880 [ 1669.182868][T21436] ? kernel_sendmsg+0x50/0x50 [ 1669.182888][T21436] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1669.204183][T21436] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1669.204203][T21436] ? find_held_lock+0x35/0x130 [ 1669.251677][T21436] ___sys_sendmsg+0x100/0x170 [ 1669.256383][T21436] ? sendmsg_copy_msghdr+0x70/0x70 [ 1669.261511][T21436] ? __kasan_check_read+0x11/0x20 [ 1669.266551][T21436] ? __might_fault+0x12b/0x1e0 [ 1669.271866][T21436] ? find_held_lock+0x35/0x130 [ 1669.276823][T21436] ? __might_fault+0x12b/0x1e0 [ 1669.281624][T21436] ? ksys_dup3+0x3e0/0x3e0 [ 1669.286148][T21436] ? lock_downgrade+0x920/0x920 [ 1669.291136][T21436] ? ___might_sleep+0x163/0x2c0 [ 1669.297203][T21436] __sys_sendmmsg+0x1bf/0x4d0 [ 1669.301993][T21436] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1669.307046][T21436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1669.313293][T21436] ? fput_many+0x12c/0x1a0 [ 1669.317721][T21436] ? fput+0x1b/0x20 [ 1669.321543][T21436] ? ksys_write+0x1cf/0x290 [ 1669.326094][T21436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1669.331653][T21436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1669.337136][T21436] ? do_syscall_64+0x26/0x790 [ 1669.341825][T21436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1669.348169][T21436] ? do_syscall_64+0x26/0x790 [ 1669.352862][T21436] __x64_sys_sendmmsg+0x9d/0x100 [ 1669.357810][T21436] do_syscall_64+0xfa/0x790 [ 1669.362339][T21436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1669.368510][T21436] RIP: 0033:0x45a6f9 [ 1669.373015][T21436] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1669.394934][T21436] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1669.403545][T21436] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1669.411750][T21436] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1669.419733][T21436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1669.427720][T21436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1669.436571][T21436] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@null, @default, 0x8, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="10000000000000000eedff0000000000b378174ba783a4ac0afd3e6b5f94085d630aecccf29f88217e6f0c10369542e400432fda8a794f39a89f644bc30aebb3e57fee4f5803bd72f59e0e0115a5c432e5db4fbb8a2ab9cd33fb648138558ccee84147e5b153a3f32d9fc125574725aac97a04e98fa8489448e0b1a1ba3867b8ec88d38faaafaa12b83683d5dd6370e408d5fed7e4c587f0cf261396744ad3a86ac3712811c81c"], 0x10}}], 0x1, 0x0) 00:21:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000300)="de41b8af2c0410109b82895f39340c", 0xf, 0x800, &(0x7f0000000340)=@abs={0x3, 0x0, 0x4e20}, 0x6e) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000140)=ANY=[@ANYRES64=r4], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x15, 0x0, 0xffffffff, &(0x7f0000000180)=[0x0], 0x1}, 0x20) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = socket(0x15, 0x80005, 0x0) getsockopt(r6, 0x200000000114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) sendmsg$nl_route_sched(r6, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000c40)=ANY=[@ANYBLOB="6c040000650000022dbd7000fbdbdf250000000000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x46c}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:21:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x06\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f00000008c0)=@ax25={{0x3, @rose}, [@remote, @bcast, @remote, @remote, @remote, @netrom, @null, @netrom]}, &(0x7f0000000940)=0x80, 0x80000) bind$isdn(r1, &(0x7f0000000980)={0x22, 0x1f, 0x6, 0x2, 0x80}, 0x6) r2 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") recvmmsg(r0, &(0x7f0000000080), 0x72a, 0x0, 0x0) 00:21:37 executing program 2 (fault-call:4 fault-nth:27): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:21:37 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1674.994603][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1675.032343][T21461] FAULT_INJECTION: forcing a failure. [ 1675.032343][T21461] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.064971][T21461] CPU: 1 PID: 21461 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1675.073737][T21461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1675.083812][T21461] Call Trace: [ 1675.087123][T21461] dump_stack+0x197/0x210 [ 1675.091482][T21461] should_fail.cold+0xa/0x15 [ 1675.096102][T21461] ? fault_create_debugfs_attr+0x180/0x180 [ 1675.102114][T21461] __should_failslab+0x121/0x190 [ 1675.107094][T21461] should_failslab+0x9/0x14 [ 1675.111611][T21461] kmem_cache_alloc+0x47/0x710 [ 1675.116794][T21461] ? lock_acquire+0x190/0x410 [ 1675.121487][T21461] ? netlink_deliver_tap+0x146/0xbe0 [ 1675.126880][T21461] skb_clone+0x154/0x3d0 [ 1675.131135][T21461] netlink_deliver_tap+0x943/0xbe0 [ 1675.136658][T21461] netlink_unicast+0x643/0x7d0 [ 1675.141544][T21461] ? netlink_attachskb+0x870/0x870 [ 1675.146668][T21461] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1675.152432][T21461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1675.158687][T21461] ? __check_object_size+0x3d/0x437 [ 1675.163893][T21461] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1675.169627][T21461] netlink_sendmsg+0x91c/0xea0 [ 1675.174428][T21461] ? netlink_unicast+0x7d0/0x7d0 [ 1675.179899][T21461] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1675.185638][T21461] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1675.191273][T21461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1675.197709][T21461] ? security_socket_sendmsg+0x8d/0xc0 [ 1675.203717][T21461] ? netlink_unicast+0x7d0/0x7d0 [ 1675.208675][T21461] sock_sendmsg+0xd7/0x130 [ 1675.213568][T21461] ____sys_sendmsg+0x358/0x880 [ 1675.218665][T21461] ? kernel_sendmsg+0x50/0x50 [ 1675.223379][T21461] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1675.228945][T21461] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1675.234941][T21461] ? find_held_lock+0x35/0x130 [ 1675.239742][T21461] ___sys_sendmsg+0x100/0x170 [ 1675.244710][T21461] ? sendmsg_copy_msghdr+0x70/0x70 [ 1675.250011][T21461] ? __kasan_check_read+0x11/0x20 [ 1675.255134][T21461] ? __might_fault+0x12b/0x1e0 [ 1675.259905][T21461] ? find_held_lock+0x35/0x130 [ 1675.264677][T21461] ? __might_fault+0x12b/0x1e0 [ 1675.269474][T21461] ? ksys_dup3+0x3e0/0x3e0 [ 1675.273901][T21461] ? lock_downgrade+0x920/0x920 [ 1675.278779][T21461] ? ___might_sleep+0x163/0x2c0 [ 1675.283659][T21461] __sys_sendmmsg+0x1bf/0x4d0 [ 1675.289308][T21461] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1675.294366][T21461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1675.300632][T21461] ? fput_many+0x12c/0x1a0 [ 1675.305072][T21461] ? fput+0x1b/0x20 [ 1675.308904][T21461] ? ksys_write+0x1cf/0x290 [ 1675.313423][T21461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1675.318896][T21461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1675.324381][T21461] ? do_syscall_64+0x26/0x790 [ 1675.329070][T21461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.335150][T21461] ? do_syscall_64+0x26/0x790 [ 1675.339854][T21461] __x64_sys_sendmmsg+0x9d/0x100 [ 1675.344815][T21461] do_syscall_64+0xfa/0x790 [ 1675.349341][T21461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.355239][T21461] RIP: 0033:0x45a6f9 [ 1675.359141][T21461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1675.378912][T21461] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1675.387325][T21461] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1675.395500][T21461] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1675.403545][T21461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:21:37 executing program 3: unshare(0x40000000) r0 = socket$inet(0x2, 0x4, 0xf7) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0x9, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'tunl0\x00\x00\x00\xbd\x90\xff\xff\xe4\x00', 0xfd}) 00:21:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\a\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:37 executing program 2 (fault-call:4 fault-nth:28): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1675.411583][T21461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1675.419561][T21461] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 [ 1675.537727][T21475] IPVS: ftp: loaded support on port[0] = 21 [ 1675.558607][T21479] FAULT_INJECTION: forcing a failure. [ 1675.558607][T21479] name failslab, interval 1, probability 0, space 0, times 0 [ 1675.589665][T21479] CPU: 1 PID: 21479 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1675.598395][T21479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1675.598403][T21479] Call Trace: [ 1675.598427][T21479] dump_stack+0x197/0x210 [ 1675.598452][T21479] should_fail.cold+0xa/0x15 [ 1675.598472][T21479] ? fault_create_debugfs_attr+0x180/0x180 [ 1675.598491][T21479] ? ___might_sleep+0x163/0x2c0 [ 1675.598510][T21479] __should_failslab+0x121/0x190 [ 1675.598526][T21479] should_failslab+0x9/0x14 [ 1675.598539][T21479] kmem_cache_alloc_node_trace+0x274/0x750 [ 1675.598555][T21479] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1675.598568][T21479] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1675.598589][T21479] __kmalloc_node_track_caller+0x3d/0x70 [ 1675.598612][T21479] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1675.598631][T21479] __alloc_skb+0x10b/0x5e0 [ 1675.598646][T21479] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1675.598666][T21479] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1675.631793][T21479] ? aa_sk_perm+0x346/0xaf0 [ 1675.631813][T21479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1675.631830][T21479] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1675.631849][T21479] netlink_sendmsg+0xa1b/0xea0 [ 1675.631869][T21479] ? netlink_unicast+0x7d0/0x7d0 [ 1675.647076][T21479] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1675.664437][T21479] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1675.664456][T21479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1675.664472][T21479] ? security_socket_sendmsg+0x8d/0xc0 [ 1675.664488][T21479] ? netlink_unicast+0x7d0/0x7d0 [ 1675.664505][T21479] sock_sendmsg+0xd7/0x130 [ 1675.685667][T21479] ____sys_sendmsg+0x358/0x880 [ 1675.685688][T21479] ? kernel_sendmsg+0x50/0x50 [ 1675.685704][T21479] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1675.685717][T21479] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1675.685729][T21479] ? find_held_lock+0x35/0x130 [ 1675.685752][T21479] ___sys_sendmsg+0x100/0x170 [ 1675.685770][T21479] ? sendmsg_copy_msghdr+0x70/0x70 [ 1675.697118][T21479] ? __kasan_check_read+0x11/0x20 [ 1675.697137][T21479] ? __might_fault+0x12b/0x1e0 [ 1675.697152][T21479] ? find_held_lock+0x35/0x130 [ 1675.697167][T21479] ? __might_fault+0x12b/0x1e0 [ 1675.697184][T21479] ? ksys_dup3+0x3e0/0x3e0 [ 1675.697201][T21479] ? lock_downgrade+0x920/0x920 [ 1675.697228][T21479] ? ___might_sleep+0x163/0x2c0 [ 1675.714099][T21479] __sys_sendmmsg+0x1bf/0x4d0 [ 1675.714121][T21479] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1675.714157][T21479] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1675.714174][T21479] ? fput_many+0x12c/0x1a0 [ 1675.736843][T21479] ? fput+0x1b/0x20 [ 1675.736858][T21479] ? ksys_write+0x1cf/0x290 [ 1675.736878][T21479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1675.736892][T21479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1675.736905][T21479] ? do_syscall_64+0x26/0x790 [ 1675.736920][T21479] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.736932][T21479] ? do_syscall_64+0x26/0x790 [ 1675.736956][T21479] __x64_sys_sendmmsg+0x9d/0x100 [ 1675.751266][T21479] do_syscall_64+0xfa/0x790 [ 1675.751288][T21479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1675.751300][T21479] RIP: 0033:0x45a6f9 [ 1675.751315][T21479] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1675.751327][T21479] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1675.772241][T21479] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1675.772251][T21479] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1675.772259][T21479] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1675.772268][T21479] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1675.772276][T21479] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:38 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:21:38 executing program 2 (fault-call:4 fault-nth:29): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1676.057148][T21491] FAULT_INJECTION: forcing a failure. [ 1676.057148][T21491] name failslab, interval 1, probability 0, space 0, times 0 [ 1676.070909][T21491] CPU: 0 PID: 21491 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1676.079611][T21491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1676.089684][T21491] Call Trace: [ 1676.092997][T21491] dump_stack+0x197/0x210 [ 1676.097369][T21491] should_fail.cold+0xa/0x15 [ 1676.102009][T21491] ? fault_create_debugfs_attr+0x180/0x180 [ 1676.107832][T21491] ? ___might_sleep+0x163/0x2c0 [ 1676.112701][T21491] __should_failslab+0x121/0x190 [ 1676.117655][T21491] should_failslab+0x9/0x14 [ 1676.122169][T21491] kmem_cache_alloc_node_trace+0x274/0x750 [ 1676.128014][T21491] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1676.133986][T21491] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1676.139899][T21491] __kmalloc_node_track_caller+0x3d/0x70 [ 1676.145555][T21491] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1676.150938][T21491] __alloc_skb+0x10b/0x5e0 [ 1676.155367][T21491] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1676.160929][T21491] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1676.166649][T21491] ? aa_sk_perm+0x346/0xaf0 [ 1676.171157][T21491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1676.177409][T21491] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1676.183667][T21491] netlink_sendmsg+0xa1b/0xea0 [ 1676.188448][T21491] ? netlink_unicast+0x7d0/0x7d0 [ 1676.193391][T21491] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1676.198954][T21491] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1676.204479][T21491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1676.210716][T21491] ? security_socket_sendmsg+0x8d/0xc0 [ 1676.216193][T21491] ? netlink_unicast+0x7d0/0x7d0 [ 1676.221143][T21491] sock_sendmsg+0xd7/0x130 [ 1676.225565][T21491] ____sys_sendmsg+0x358/0x880 [ 1676.231057][T21491] ? kernel_sendmsg+0x50/0x50 [ 1676.235783][T21491] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1676.241340][T21491] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1676.247426][T21491] ? find_held_lock+0x35/0x130 [ 1676.252298][T21491] ___sys_sendmsg+0x100/0x170 [ 1676.257311][T21491] ? sendmsg_copy_msghdr+0x70/0x70 [ 1676.262872][T21491] ? __kasan_check_read+0x11/0x20 [ 1676.267940][T21491] ? __might_fault+0x12b/0x1e0 [ 1676.273356][T21491] ? find_held_lock+0x35/0x130 [ 1676.278131][T21491] ? __might_fault+0x12b/0x1e0 [ 1676.282903][T21491] ? ksys_dup3+0x3e0/0x3e0 [ 1676.287335][T21491] ? lock_downgrade+0x920/0x920 [ 1676.292243][T21491] ? ___might_sleep+0x163/0x2c0 [ 1676.297608][T21491] __sys_sendmmsg+0x1bf/0x4d0 [ 1676.302314][T21491] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1676.307553][T21491] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1676.314386][T21491] ? fput_many+0x12c/0x1a0 [ 1676.318836][T21491] ? fput+0x1b/0x20 [ 1676.322659][T21491] ? ksys_write+0x1cf/0x290 [ 1676.327180][T21491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1676.332645][T21491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1676.338708][T21491] ? do_syscall_64+0x26/0x790 [ 1676.343506][T21491] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1676.350070][T21491] ? do_syscall_64+0x26/0x790 [ 1676.355155][T21491] __x64_sys_sendmmsg+0x9d/0x100 [ 1676.360229][T21491] do_syscall_64+0xfa/0x790 [ 1676.364782][T21491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1676.370676][T21491] RIP: 0033:0x45a6f9 [ 1676.374566][T21491] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1676.395039][T21491] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 00:21:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40101004}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x476}]}, 0x20}, 0x1, 0x0, 0x0, 0x28149}, 0x1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r5, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e22, @broadcast}, 0x10) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1676.403893][T21491] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1676.411864][T21491] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1676.411873][T21491] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1676.411882][T21491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1676.411890][T21491] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 [ 1676.466380][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1676.479620][T21475] IPVS: ftp: loaded support on port[0] = 21 [ 1676.965672][T20821] tipc: TX() has been purged, node left! [ 1677.259064][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1680.445661][T20821] tipc: TX() has been purged, node left! 00:21:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r1, &(0x7f0000004280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="10000000110041100000000000000000"], 0x10}], 0x1}, 0x0) 00:21:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x89\x16\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:46 executing program 2 (fault-call:4 fault-nth:30): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:21:46 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="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"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:21:46 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:21:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYRES64=r2], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e1e, 0x0, @empty, 0x4}, 0xffffffffffffff2a) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r4, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1684.347650][T21519] FAULT_INJECTION: forcing a failure. [ 1684.347650][T21519] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.379342][T21519] CPU: 1 PID: 21519 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1684.388333][T21519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1684.398398][T21519] Call Trace: [ 1684.401704][T21519] dump_stack+0x197/0x210 [ 1684.406040][T21519] should_fail.cold+0xa/0x15 [ 1684.410646][T21519] ? fault_create_debugfs_attr+0x180/0x180 [ 1684.416478][T21519] ? ___might_sleep+0x163/0x2c0 [ 1684.421391][T21519] __should_failslab+0x121/0x190 [ 1684.426357][T21519] should_failslab+0x9/0x14 [ 1684.430854][T21519] kmem_cache_alloc_node+0x268/0x740 [ 1684.436688][T21519] __alloc_skb+0xd5/0x5e0 [ 1684.441369][T21519] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1684.448409][T21519] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1684.454314][T21519] ? aa_sk_perm+0x346/0xaf0 [ 1684.458835][T21519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1684.465188][T21519] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1684.471999][T21519] netlink_sendmsg+0xa1b/0xea0 [ 1684.477036][T21519] ? netlink_unicast+0x7d0/0x7d0 [ 1684.482066][T21519] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1684.487798][T21519] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1684.493363][T21519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1684.499724][T21519] ? security_socket_sendmsg+0x8d/0xc0 [ 1684.505472][T21519] ? netlink_unicast+0x7d0/0x7d0 [ 1684.511538][T21519] sock_sendmsg+0xd7/0x130 [ 1684.516034][T21519] ____sys_sendmsg+0x358/0x880 [ 1684.520814][T21519] ? kernel_sendmsg+0x50/0x50 [ 1684.525512][T21519] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1684.531324][T21519] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1684.537301][T21519] ? find_held_lock+0x35/0x130 [ 1684.542063][T21519] ___sys_sendmsg+0x100/0x170 [ 1684.546915][T21519] ? sendmsg_copy_msghdr+0x70/0x70 [ 1684.552035][T21519] ? __kasan_check_read+0x11/0x20 [ 1684.557095][T21519] ? __might_fault+0x12b/0x1e0 [ 1684.561987][T21519] ? find_held_lock+0x35/0x130 [ 1684.566741][T21519] ? __might_fault+0x12b/0x1e0 [ 1684.571779][T21519] ? ksys_dup3+0x3e0/0x3e0 [ 1684.576791][T21519] ? lock_downgrade+0x920/0x920 [ 1684.581961][T21519] ? ___might_sleep+0x163/0x2c0 [ 1684.586814][T21519] __sys_sendmmsg+0x1bf/0x4d0 [ 1684.591500][T21519] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1684.596532][T21519] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1684.602761][T21519] ? fput_many+0x12c/0x1a0 [ 1684.607167][T21519] ? fput+0x1b/0x20 [ 1684.610976][T21519] ? ksys_write+0x1cf/0x290 [ 1684.615562][T21519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1684.621008][T21519] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1684.626540][T21519] ? do_syscall_64+0x26/0x790 [ 1684.631204][T21519] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1684.637597][T21519] ? do_syscall_64+0x26/0x790 [ 1684.642271][T21519] __x64_sys_sendmmsg+0x9d/0x100 [ 1684.647197][T21519] do_syscall_64+0xfa/0x790 [ 1684.651704][T21519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1684.657954][T21519] RIP: 0033:0x45a6f9 [ 1684.662036][T21519] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1684.684179][T21519] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1684.692763][T21519] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1684.700998][T21519] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1684.709051][T21519] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1684.717009][T21519] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1684.724962][T21519] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00?\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1684.814235][T21523] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:21:47 executing program 2 (fault-call:4 fault-nth:31): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:21:47 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="18000000000000001701000004000000a20f0000000000001800000000000000170100000300000000000000000000002800000000000000170100000200000011000000e5e6c37fcd563fed16d6d6ca6155ca53a900000008010000000000001701000002000000f3000000293ec4d4f0afd23591ec16e0402dc9a2aa24b54131267eadbac76cb51a1b76314c0246796cb1aaa970c74fac08cde3efd159f2ea5c032014533de46ca21446519bc30bb2af7ace8d77b2ef877a5c93300746570fa5a5fa510b529e545b4ebd0d6d8e3eae8b79ff178ff7fb83841823d21f157bfd042f13928200016ab781491c2b2cca11941ff49d2f748f05786b9bb4e1a0ba330de6c3937d0e935812ce1c4621ed7283d037f4cd384a6bddbf1f25a01c32bdac3ded61039829bf960866c9912693701ce9ea8ed7201ff443c26764ae1bfd37e637b79968298d543136a27e608577a257ce2f662f6a7618323c834d99f2438500180000000000000017010000030000000100000000000000200000000000000017010000020000000c0000006d2aaab83e2fc5e91c014a28d8000000000000001701000002000000bf0000009a0ee7704ccda7eb164b55743c82832bf4472422784d6d6a62cb781509af4408b620ce5a18a72634b7a1be63b0930f8d1652a4d55cd54ba88f46f39c79d501378c282bcb7fc84e0755c924492599ae0041513995e5e559cbc9a15e43fdc6d042a422fcd53abe1527016d12f329a087b80af1010e6ef70295ff707f649668ed918a7839a4b87a443a2f3f55d9995687d291456974476ee12b4d3271b1a373bae8ffb62d7ac1a947a36c3196055558c0a2c1923986272446e18d2d87d13070880000000000180000000000000017010000030000000100000000000000580000000000000017010000020000004200000096e279c4a15c9b19c04a5c1acef501367709d021d64e408eedeb20def0a0e047003744bf5f95294763ca4c49d926691f838918a045d26377eeed81a031389f4378970000900000000000000017010000020000007900000015782e5348a08cb5a65c20384b41fc73b7ac709d90925be99582d53bb4c839c9f70eb352c5e7740d459c8882e37eea4e7a2c297b9fbd2b15fb39678b8fa314c50c7cd8fd0011b465e796f7eeeccfbd64427378b743a0adc580e3bdd57549c916bc11d3a67faa8665d40a3af6e3fafa79a367f42122c235e602000000"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1685.005402][T21543] FAULT_INJECTION: forcing a failure. [ 1685.005402][T21543] name failslab, interval 1, probability 0, space 0, times 0 [ 1685.030009][T21543] CPU: 0 PID: 21543 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1685.038733][T21543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1685.048798][T21543] Call Trace: 00:21:47 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="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"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1685.052107][T21543] dump_stack+0x197/0x210 [ 1685.056465][T21543] should_fail.cold+0xa/0x15 [ 1685.061076][T21543] ? fault_create_debugfs_attr+0x180/0x180 [ 1685.066909][T21543] ? ___might_sleep+0x163/0x2c0 [ 1685.071778][T21543] __should_failslab+0x121/0x190 [ 1685.076738][T21543] should_failslab+0x9/0x14 [ 1685.081255][T21543] kmem_cache_alloc_node+0x268/0x740 [ 1685.086670][T21543] __alloc_skb+0xd5/0x5e0 [ 1685.086687][T21543] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1685.086707][T21543] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1685.086720][T21543] ? aa_sk_perm+0x346/0xaf0 [ 1685.086735][T21543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1685.086751][T21543] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1685.086771][T21543] netlink_sendmsg+0xa1b/0xea0 [ 1685.086793][T21543] ? netlink_unicast+0x7d0/0x7d0 [ 1685.086808][T21543] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1685.086824][T21543] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1685.086842][T21543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1685.104951][T21543] ? security_socket_sendmsg+0x8d/0xc0 [ 1685.104971][T21543] ? netlink_unicast+0x7d0/0x7d0 [ 1685.104987][T21543] sock_sendmsg+0xd7/0x130 [ 1685.105003][T21543] ____sys_sendmsg+0x358/0x880 [ 1685.105021][T21543] ? kernel_sendmsg+0x50/0x50 [ 1685.175816][T21543] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1685.181346][T21543] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1685.187306][T21543] ? find_held_lock+0x35/0x130 [ 1685.192062][T21543] ___sys_sendmsg+0x100/0x170 [ 1685.196755][T21543] ? sendmsg_copy_msghdr+0x70/0x70 [ 1685.201865][T21543] ? __kasan_check_read+0x11/0x20 [ 1685.206876][T21543] ? __might_fault+0x12b/0x1e0 [ 1685.211725][T21543] ? find_held_lock+0x35/0x130 [ 1685.216649][T21543] ? __might_fault+0x12b/0x1e0 [ 1685.221676][T21543] ? ksys_dup3+0x3e0/0x3e0 [ 1685.227837][T21543] ? lock_downgrade+0x920/0x920 [ 1685.233572][T21543] ? ___might_sleep+0x163/0x2c0 [ 1685.239291][T21543] __sys_sendmmsg+0x1bf/0x4d0 [ 1685.244267][T21543] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1685.249874][T21543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1685.256200][T21543] ? fput_many+0x12c/0x1a0 [ 1685.260602][T21543] ? fput+0x1b/0x20 [ 1685.264585][T21543] ? ksys_write+0x1cf/0x290 [ 1685.269339][T21543] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1685.274884][T21543] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1685.280520][T21543] ? do_syscall_64+0x26/0x790 [ 1685.285298][T21543] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1685.291439][T21543] ? do_syscall_64+0x26/0x790 [ 1685.296121][T21543] __x64_sys_sendmmsg+0x9d/0x100 [ 1685.301045][T21543] do_syscall_64+0xfa/0x790 [ 1685.305577][T21543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1685.312510][T21543] RIP: 0033:0x45a6f9 [ 1685.316846][T21543] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1685.338006][T21543] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1685.347682][T21543] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 00:21:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00@\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1685.355647][T21543] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1685.363966][T21543] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1685.372357][T21543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1685.380576][T21543] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:47 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="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"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1685.666359][T21558] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:21:55 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:21:55 executing program 2 (fault-call:4 fault-nth:32): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:21:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000000)=0x7fff, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:21:55 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:21:55 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00H\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:55 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="18000000000000001701000004000000a20f0000000000001800000000000000170100000300000000000000000000002800000000000000170100000200000011000000e5e6c37fcd563fed16d6d6ca6155ca53a900000008010000000000001701000002000000f3000000293ec4d4f0afd23591ec16e0402dc9a2aa24b54131267eadbac76cb51a1b76314c0246796cb1aaa970c74fac08cde3efd159f2ea5c032014533de46ca21446519bc30bb2af7ace8d77b2ef877a5c93300746570fa5a5fa510b529e545b4ebd0d6d8e3eae8b79ff178ff7fb83841823d21f157bfd042f13928200016ab781491c2b2cca11941ff49d2f748f05786b9bb4e1a0ba330de6c3937d0e935812ce1c4621ed7283d037f4cd384a6bddbf1f25a01c32bdac3ded61039829bf960866c9912693701ce9ea8ed7201ff443c26764ae1bfd37e637b79968298d543136a27e608577a257ce2f662f6a7618323c834d99f2438500180000000000000017010000030000000100000000000000200000000000000017010000020000000c0000006d2aaab83e2fc5e91c014a28d8000000000000001701000002000000bf0000009a0ee7704ccda7eb164b55743c82832bf4472422784d6d6a62cb781509af4408b620ce5a18a72634b7a1be63b0930f8d1652a4d55cd54ba88f46f39c79d501378c282bcb7fc84e0755c924492599ae0041513995e5e559cbc9a15e43fdc6d042a422fcd53abe1527016d12f329a087b80af1010e6ef70295ff707f649668ed918a7839a4b87a443a2f3f55d9995687d291456974476ee12b4d3271b1a373bae8ffb62d7ac1a947a36c3196055558c0a2c1923986272446e18d2d87d13070880000000000180000000000000017010000030000000100000000000000580000000000000017010000020000004200000096e279c4a15c9b19c04a5c1acef501367709d021d64e408eedeb20def0a0e047003744bf5f95294763ca4c49d926691f838918a045d26377eeed81a031389f4378970000900000000000000017010000020000007900000015782e5348a08cb5a65c20384b41fc73b7ac709d90925be99582d53bb4c839c9f70eb352c5e7740d459c8882e37eea4e7a2c297b9fbd2b15fb39678b8fa314c50c7cd8fd0011b465e796f7eeeccfbd64427378b743a0adc580e3bdd57549c916bc11d3a67faa8665d40a3af6e3fafa79a367f42122c235e602000000"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1693.724838][T21572] FAULT_INJECTION: forcing a failure. [ 1693.724838][T21572] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.737895][T21572] CPU: 1 PID: 21572 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1693.746667][T21572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1693.756753][T21572] Call Trace: [ 1693.760081][T21572] dump_stack+0x197/0x210 [ 1693.764605][T21572] should_fail.cold+0xa/0x15 [ 1693.768847][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1693.769223][T21572] ? fault_create_debugfs_attr+0x180/0x180 [ 1693.786358][T21572] __should_failslab+0x121/0x190 [ 1693.791308][T21572] should_failslab+0x9/0x14 [ 1693.796070][T21572] kmem_cache_alloc+0x47/0x710 [ 1693.800855][T21572] ? lock_acquire+0x190/0x410 [ 1693.805535][T21572] ? netlink_deliver_tap+0x146/0xbe0 [ 1693.810913][T21572] skb_clone+0x154/0x3d0 [ 1693.815150][T21572] netlink_deliver_tap+0x943/0xbe0 [ 1693.821161][T21572] netlink_unicast+0x643/0x7d0 [ 1693.825920][T21572] ? netlink_attachskb+0x870/0x870 [ 1693.831104][T21572] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1693.836814][T21572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1693.843045][T21572] ? __check_object_size+0x3d/0x437 [ 1693.848246][T21572] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1693.854052][T21572] netlink_sendmsg+0x91c/0xea0 [ 1693.859046][T21572] ? netlink_unicast+0x7d0/0x7d0 [ 1693.864058][T21572] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1693.869595][T21572] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1693.875063][T21572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1693.881340][T21572] ? security_socket_sendmsg+0x8d/0xc0 [ 1693.886847][T21572] ? netlink_unicast+0x7d0/0x7d0 [ 1693.891830][T21572] sock_sendmsg+0xd7/0x130 [ 1693.896246][T21572] ____sys_sendmsg+0x358/0x880 [ 1693.901005][T21572] ? kernel_sendmsg+0x50/0x50 [ 1693.905706][T21572] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1693.911241][T21572] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1693.917386][T21572] ? find_held_lock+0x35/0x130 [ 1693.922265][T21572] ___sys_sendmsg+0x100/0x170 [ 1693.926934][T21572] ? sendmsg_copy_msghdr+0x70/0x70 [ 1693.932211][T21572] ? __kasan_check_read+0x11/0x20 [ 1693.937250][T21572] ? __might_fault+0x12b/0x1e0 [ 1693.942262][T21572] ? find_held_lock+0x35/0x130 [ 1693.947025][T21572] ? __might_fault+0x12b/0x1e0 [ 1693.953099][T21572] ? ksys_dup3+0x3e0/0x3e0 [ 1693.958459][T21572] ? lock_downgrade+0x920/0x920 [ 1693.963303][T21572] ? ___might_sleep+0x163/0x2c0 [ 1693.968143][T21572] __sys_sendmmsg+0x1bf/0x4d0 [ 1693.972823][T21572] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1693.977850][T21572] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1693.984381][T21572] ? fput_many+0x12c/0x1a0 [ 1693.988967][T21572] ? fput+0x1b/0x20 [ 1693.992804][T21572] ? ksys_write+0x1cf/0x290 [ 1693.997329][T21572] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1694.003409][T21572] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1694.009831][T21572] ? do_syscall_64+0x26/0x790 [ 1694.014498][T21572] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1694.020938][T21572] ? do_syscall_64+0x26/0x790 [ 1694.025734][T21572] __x64_sys_sendmmsg+0x9d/0x100 [ 1694.030671][T21572] do_syscall_64+0xfa/0x790 [ 1694.035163][T21572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1694.041127][T21572] RIP: 0033:0x45a6f9 [ 1694.045133][T21572] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1694.066744][T21572] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1694.075160][T21572] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1694.083284][T21572] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1694.091432][T21572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1694.099770][T21572] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1694.108292][T21572] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:21:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00L\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00h\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:21:56 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="4da82d6e6fee9076c442bebb5b9e4d2c117a3ce59769b1e928e89c9b93f0b936cd25bff36f83541534e3b7bdcab3584e92f99ca5a1c1a2e5b63d4b3bbd1992a3fcec6f67419a2f4eb4fbf78bcb004b67972e1c8d20e9efda966bbd547f45cbbf968d202e03cb9a8281887aa641195318d827b87d18219ea4f5dbf63e7a89862c3bdb9ad120beb5eb53fc216cc0e684ed1da793603049d55ac24fe5cfb72e2f8fbec499dc63f7c09b0395a86add500874f7de4e88ef5e759bb92a03fe265afd2a92d4c9f78dc9967f4d59266d94bf91d061f5e4e1d6324f9b11dbbf2aedd7ed5d1197a7a3be30d8c81e5ca7b24a9a49fe9c1097889295136e7dba842eb9eea6249a41a7c50fbc8ea5404d3af669f7d8e3ae5f19b5fb1eef1d57bc29ed3dd3921a36fc6fe70baa58f21f0e35b027882ec6558ddd1515df7ebde838209ce483c883becd1dbe0120091698e71b6bff7b260c5ba4ed005265184b225b72d71b6cb280dd28df5378387a02f316220c48338801bf69ed6f64a4e9749fddb5504e9c6f73a0f7831784a7ff44abe908cdd3a5126f2ca6778a7e5226857222218aa572fe670891ca62bf2dc5d77cf3c9ed21dbbbf1e3c31f443ce083e29fecd7e0c633717e088b37b06f5d08d70039afdabde6adbc21438122cbde9f34eb23a6419963d3c57ec19eedf66ddccf0afde3ae977aaaa1a41c286c0eedd4e9aa2998e6c89fc6b22c373430fbe94532c7bf2f40d7dd12b928953a6459d6a69d81205ccc05a7bd7704f6897b9e653610d44f28b8a147e5b4ea0d84201f6ed8ac9e17ec19046b11a17080c2aa8a0bc2af6cb6fef132850f912d4d465017ee04b1741d5c19884a8074b488135ceee3dbdc8ee016cd766898c4fa190d77bd2a21a2eb8fb1b6fd016a55277e5c5cf2b9b91d58579a7f04a7ea026c3c9d24d8278db681f724c5e666490e5c9b0db924aea0da806aaeed8af0d99595251eeb4bae085b423a484833ed9b527e03f2230fd762046a1a9319fa1a4b49a6c0094fd20d02feb3f6782a634312e997bc15a2e180caf3300d8f67281d51f16c1122cf36ccc79f1fefcd9bddc70a68653ef88c64ce89d87f53937636d013bd917abf248e7084ff5dcabe559ad507a58df18dc82def56f4f6a78df18c97781e6de8d860aded0047ec9379168f8fa4f64b92b04250f737f70846c937b44e69aeb20708553f9e7a3f69f0e5b7dfd9a9aad2d512550da69344ffae13c611602e2fd3cd3e0f7bde003299b7ce54a10883cec16a011921151c41b1203fd83e2bc8bfe30594723c7176a15678f37e02cc2aa9cf89fa9e45e23d269d9d6224400d72a4b3499b601e3cfac236f342c95a3d71b6bd75799724c6b0fb716546917cbbef5bbc6c7357c7f94b02e1206ae2b6698eeb4129d78ef6d152aee7bbc44bd076b33f900f4694f408063c15529835d9268459823773e1fcfca34392e8ddee7799b8ed2c8582356ce7b128c557345aa9a74f1b49c82a2e81974884390ca57b3c489129e90e1458a6cc2342179de927545f5cf6e00bd6cfcd8abd0a45cf4211913930481274febf2f25e1e220a02c91d67a0196e5e638043e85d142fe9830bc95f292d1400c396b2cb34315645c7b196dced732265d49dc74b1efd582c26f709b86bc6ddc458b2088fac1bb589e3a44444fcc383fa5af1f7efe20e25754692604125d58f616da128c4994b143fab7ea6ec181272dc7a68a43f91988a34dc1b831f2026cd0cbec36c146689c8a221b4393e71116da18c865108017a3597ca06e89a16cfb28de4eb0b58488d3a60c80aab21a850fda9dc86a4395e386a7c33f2326b3bc1a7fa023bf900557e67ddb3110dc12eb37f11ea8920cceeb1c4259702e74f4f1f6db5317fc3c8496fb7bb13708bf4e3129e5feb0f6d971c05450a7051144a550c90702da0d9b9529dcfa126a1fd99ba295860b00638eb9fe6135b4166362e9389210a50ac775c2852e0cbceecb919c9720c3cdd4665b83a73abcf24d07b0e5ed441bfebdf7ca75f9db69fcd9ffff3f7d08008d87db18bff1c90121d5ee93aefe7e4048fbefbdf83e8ad33d0c49ffaebc2f2d086ce7b9208e936057c0c84b9df055f46cd62169442cb24072a162c1b4c1c3d7d1e40e4cde8819bccafb5a6f5ba7f41b6f8b05d686226d1b4cfaa23bb44a3c85227d9392f2aa25710830c1b824be395976fee7a73d571a7aea8d9961976a7a8ff83847854000c94bc46caecccb6ea7a364756f8b57d1cc3cad3b279802e03320b3e10ece8e337db73ffd087f738ec1382c93a5ffdfaed5a6e8dddf38c9ffd3017be4d7093fd9bcc5d801e1b99289cf1b09406d4a40e1c4b86a0ec00ab105815a3bd48c5fbe47be3bb1382a1323c6802ed8257b337ec6bfd8a619a1660ddbcd50f1cd8b82887f3eaaab0d6a392f87907dff4cb701faa1126a2db3ab689444e365794d39758e3a3c2203f9a13b9280fc3c6674999bfc35f3efdb702e9723cf16b23e494ad35819ae74b0e23ce97e229d0862f26c080e99e0b7f60f40aa3c94e79acb8e0904f7687ac28573ffb5980c40525f350add26a3ed2028f39f823a4bec00000041e0c0c6fb673ba2be8c63043a457c2ef98eeddd8beb6708ff95dde149c06cc985f0a2fb2a49dc1cc5c805fd08116e6396925662d98938eaaf220483685f0197d63ae3655599e60c0392f5e37e74243b74dc61255798f6e9ddf4a4c97aedc39b4c3c355c241d299882b4fca8e0d571381011f5b9c26f72baf778454cac7fdfcfffecf3d21666ddb85e47b7d6e3d02bfe6921ac647a5115cbe706dbc50e9b7d62db70005bd7c681901594a12655887040c2fcfabc47f910cf8b3ed3b244ca10cccf1d4237f2e53ce221148568ea15703614bfcc3382aa4db0e17c6687232b8f3e0b2cfad79a028ce5a2eea8bbd42f95bb4c0242813bb7cece73ad71c83949bf47ee2b6bba0444e1f13e3c73904058d62169850d72076d099e64734e26db0c2a8a7bd716079a55e7c1775b3cd2fdb84b72a00c120f1777447f57791241822b8f01f6883c7cd3e2baf9a3d4e13edcde5de83e1492fde03f26806d9afc6f7376ac6cc1b5dd2a711b05a4b5a9624c6dde633326a40d0299d258503185942fc894b680069f457271026d7a3a6b070785d81384cfde9ac879ff43bcf027468bd75eb40308a8fa69295253f784798faae017dbebac1c52c41342d4419bc6992280905cfda08043b8f7f9323ae3ae0554e11cf08cff4ee3020f98ffde492eef52b8dbe2fcb89c3f0bde2eb8b8e91104f6042278473f05cd0c42c8b6374e36338c214d7ccf30db3d7fa43fb1700a052e6e04a0bd58e2eb615ea9dfb50f89620c89427fa221f4c29fbce7b7504587e396ec2e3dfe96938971f7be9165276cb4ef246cc947557698758dd19cea4334f0865294e26099de1c2c2a9cfcd55a7bde1fcd3edddf9fc9feda8d651be2e50cd09f37b4f0a5a6faae926816d823053a928aac0cd9a8e923c99f374b75ee1d1836829d4036f74c125d011ffca9ec1d9d3fee6f67866fe9beb244f0625f0b474fe50bc5fffc9a28e069cd5101203b31eb29420a98a4b32827e27876e13cda57f5976f7af8f2c86d0f953a06286ab42ab329fab1d4c1ecef78f321fa68ed505e250005d223e4da4b1d6500ba5df4f9a0bec5d71292828453b74060a5d3c359cbccef5d8814928e3fcb2a988579b40f3cafddb87239146c8d7525225344e5c1d6230ecaf69eb3b5b6e1c1f52166356832c2ed6ab917be7b09c28e610bfa4b760716156fc45402849358b919b044a06a5df1a6b8bf9c53294fc44ad6306f7eee1497ee6e602614fe4924d771e1fb6eba47585bf77a43de7b207e11b62cbefe9a9b6077648864584b49f536d8b6ae8ff546972a7705c8d037edd54fdad501b7a290f17e7dcb4ec56faefe51af242f88df79e24b557f3bac685bdebd943e6d06c5f0da4e75afe9fcd7d9cc34e51149398d0cdc8ac7370eae73cf0c5408ab0995e5ee95ba307f8ae745bbcd12bb9af9acaa41866b8cdc31d7e7e2f417ce2a0cb0eb7e194e70b72a6d6d316f090474e7a804f4926612de19718f2ebf0ee3907eabeff2ebb432998e29a06cdc582732ec44c30b04136183d281af6e5221ccd44f1fed5143c6e46fdb8f05bb0f909aa3d4b082c43e4aa19111d1d1b46f9638bdf0f51175621f15bc5f5aab0c3a26a98010248d7776a378b1dfc836f30bc39359994bb4412aee4726b841750ea9ef0875bd23260650509bd151abaec2e16ac4aa5298d329361d7d0be72969160a027a77d2d7121e6e104bbba82d6439add8de1440126dec4981830a6fe152630a7026ab17910bff8365fa828992e6fba36b6b31873857a5425f27076d06fa862c0e730555f6b3822d832a9806fad1046d11021efa05f4f92791308bd8cb00c74cc269cf4b47e1d6a85c59095bdd969413e880e5b1c2fffa8c01e00ad1e1df9fc4fa150bfa32d5a31be566065b7b18195ffd5290203da2e90c0ae68467accdcdd353db29c849bfac161ad876f260e3bdfb70366e662d7b4fb39bd3b523a0109cde071bb1720032c0531b914ed1cce721325d79ee66d2fbb185419a1764957f17b501e5fa8e017e762f95a85ee4344b389c0bfb03c0342b3c1bc014efd3d53f077bfb1b084abdf5c4d0efdd195f11782e61e133e9f5c0ecaa0ddc7172d0a67789101fbad983fa59c64740fcc6e9ea02d174c09de4a9b12c6c76e8ed5fdbd5dbdc327b2119c17c7eefcfba64f0d8a5f4d0d507e375bdf886a401aa4e785d76a8cf551d3632a6d97ed6457c116c384126de85e101d6d61038bc251e0c420533b762c8f9fac91f3ecedc855338efb844b0ecf4cda61ea1e0206a5d4c65f0eda136e62c1b984c3dca7f285498e6185c4f8fc1e5a17ee7dab3c8d9fa87d202e45f9152c600e41e166b220db5c679ec27b3cfd0abc1979a5d62f31d7585b420787238c47a5a9066332add00c4e7c46c991403d13882d5341a7c53c23c130483edeaf05bc937aecfb343f86987bd5126c0a489ae9db3b80cfe5c3258e4e5ab3d740a1db3540b62430e8338634d868d503b069a824da4785425373b84b58e66b4085ef9acc07d355b08d0b87dbc12b93f0a8997bc47f62674b294a6b50c4dc64c1942bcffd2507eb64dcf17f4b54d66f6a6c2b056a73432764414c6c857c886804e8ba4304fab8d1867e20fbb2120a095d4ec2e5ace342a810277e3113cad5ba5f6b3caddfa68d2fb1454634eee88e56ceabea5a4f82f39925231c3a6ba8524bfe35c17dc844f71c92fbc8a703553902ee07af4a53b46e595e01566af0f96d04bce065294cac1cd92cc32050e03db8b109b918b98c1cdeab0a4d613e90aab6b2b1966e2d62513ab9d7ed9286add158af6e3d0a7eccbffa515fd2f92ac055a7374c6d14168b6b8652b0c311c867376347d095c2b5010cef9c8160934bea4e89df2e5ba1e5083329e0655a3ae6b195ded4be8549796b7bb80f58f340cd43dd0028d144a9012b762ff7132a85976a4ea67255d92701de1053a7376397924d126bf369d1d4bc075620eb5719eda0d09538e6f6b505c18f1ec9037ca944e86a40f7f7b6aafc860d6ef4eebfe8166b3cca19d334bea83a0e4dedd90f49af864f93c0042e3938efbc12e61e06cd1070923cbf25c000a3b9cbe852647d96778af8e4196966197ddbd9e351005d4aff2eb034785888f7ef2466170df6e72ed9d635b69cb79b1d278b8b45a19287b23ff6782f1c3c77ba928c777a3fb865146b323f1af186e5675236eecaf1dbc811f3d47727f469a27", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="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"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:21:56 executing program 2 (fault-call:4 fault-nth:33): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:21:56 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1694.648420][T21604] FAULT_INJECTION: forcing a failure. [ 1694.648420][T21604] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.673808][T21604] CPU: 0 PID: 21604 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1694.682530][T21604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1694.693030][T21604] Call Trace: [ 1694.696338][T21604] dump_stack+0x197/0x210 [ 1694.699498][T21601] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1694.700682][T21604] should_fail.cold+0xa/0x15 [ 1694.700705][T21604] ? fault_create_debugfs_attr+0x180/0x180 [ 1694.720412][T21604] __should_failslab+0x121/0x190 [ 1694.725477][T21604] should_failslab+0x9/0x14 [ 1694.729992][T21604] kmem_cache_alloc+0x47/0x710 [ 1694.734866][T21604] ? lock_acquire+0x190/0x410 [ 1694.739563][T21604] ? netlink_deliver_tap+0x146/0xbe0 [ 1694.744875][T21604] skb_clone+0x154/0x3d0 [ 1694.749136][T21604] netlink_deliver_tap+0x943/0xbe0 [ 1694.754610][T21604] netlink_unicast+0x643/0x7d0 [ 1694.759468][T21604] ? netlink_attachskb+0x870/0x870 [ 1694.764633][T21604] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1694.770283][T21604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1694.776543][T21604] ? __check_object_size+0x3d/0x437 [ 1694.781772][T21604] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1694.787723][T21604] netlink_sendmsg+0x91c/0xea0 [ 1694.792611][T21604] ? netlink_unicast+0x7d0/0x7d0 00:21:56 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) r8 = accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r9 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r9, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="5d0c1524e12dc1385344b0779220101bc3ae1e6f750b3c25261d16ceb262ca0066543dde1866d28b6a9192c8ef770bbe1327b0121b8b94e45d27cbc0b0f45a01c67d04c6dad8093f146cafdd910291371df28a65e689b9dd1a44c2f4bd67f5b43f6f0c779377b1eff8cbee900961afdd22431d513e4d5ef19a5231ed2f6a4a78151c3e7ea0fc3e3f115dd952e3bc83c9d5deb7023c65a7b849b4542f17e1c50ba743a16575cfdc437af888cdbc5eb250b15019cea8b1b08eab3eafbd8f376f35d297aac43edec94b34f2b7e098b972c67812bd4a8799382b02c7d77a646555c461f6370e445a0237f70000599e98cd4602050a2b0ee569feb791e921ea542304790c7a24d54023", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="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"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$inet_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1694.797611][T21604] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1694.803471][T21604] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1694.809246][T21604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1694.815514][T21604] ? security_socket_sendmsg+0x8d/0xc0 [ 1694.821012][T21604] ? netlink_unicast+0x7d0/0x7d0 [ 1694.825973][T21604] sock_sendmsg+0xd7/0x130 [ 1694.830417][T21604] ____sys_sendmsg+0x358/0x880 [ 1694.835320][T21604] ? kernel_sendmsg+0x50/0x50 [ 1694.840029][T21604] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1694.845611][T21604] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1694.851607][T21604] ? find_held_lock+0x35/0x130 [ 1694.856380][T21604] ___sys_sendmsg+0x100/0x170 [ 1694.861176][T21604] ? sendmsg_copy_msghdr+0x70/0x70 [ 1694.866294][T21604] ? __kasan_check_read+0x11/0x20 [ 1694.871340][T21604] ? __might_fault+0x12b/0x1e0 [ 1694.876133][T21604] ? find_held_lock+0x35/0x130 [ 1694.880912][T21604] ? __might_fault+0x12b/0x1e0 [ 1694.885682][T21604] ? ksys_dup3+0x3e0/0x3e0 [ 1694.890281][T21604] ? lock_downgrade+0x920/0x920 [ 1694.895745][T21604] ? ___might_sleep+0x163/0x2c0 [ 1694.900785][T21604] __sys_sendmmsg+0x1bf/0x4d0 [ 1694.906380][T21604] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1694.911708][T21604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1694.918414][T21604] ? fput_many+0x12c/0x1a0 [ 1694.923165][T21604] ? fput+0x1b/0x20 [ 1694.927050][T21604] ? ksys_write+0x1cf/0x290 [ 1694.931656][T21604] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1694.937722][T21604] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1694.943527][T21604] ? do_syscall_64+0x26/0x790 [ 1694.948220][T21604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1694.954379][T21604] ? do_syscall_64+0x26/0x790 [ 1694.959156][T21604] __x64_sys_sendmmsg+0x9d/0x100 [ 1694.964169][T21604] do_syscall_64+0xfa/0x790 [ 1694.969447][T21604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1694.975465][T21604] RIP: 0033:0x45a6f9 [ 1694.979558][T21604] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1694.999272][T21604] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1695.007675][T21604] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1695.015820][T21604] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1695.023952][T21604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1695.031920][T21604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1695.040869][T21604] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00l\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:05 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f0000000200)=""/39, 0x27, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr, 0xfffffffc}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000180)='\xd5,\x8a$\x00', 0x5) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:05 executing program 2 (fault-call:4 fault-nth:34): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:05 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) r8 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) sendmmsg$alg(r8, &(0x7f0000009240)=[{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007080)="4da82d6e6fee9076c442bebb5b9e4d2c117a3ce59769b1e928e89c9b93f0b936cd25bff36f83541534e3b7bdcab3584e92f99ca5a1c1a2e5b63d4b3bbd1992a3fcec6f67419a2f4eb4fbf78bcb004b67972e1c8d20e9efda966bbd547f45cbbf968d202e03cb9a8281887aa641195318d827b87d18219ea4f5dbf63e7a89862c3bdb9ad120beb5eb53fc216cc0e684ed1da793603049d55ac24fe5cfb72e2f8fbec499dc63f7c09b0395a86add500874f7de4e88ef5e759bb92a03fe265afd2a92d4c9f78dc9967f4d59266d94bf91d061f5e4e1d6324f9b11dbbf2aedd7ed5d1197a7a3be30d8c81e5ca7b24a9a49fe9c1097889295136e7dba842eb9eea6249a41a7c50fbc8ea5404d3af669f7d8e3ae5f19b5fb1eef1d57bc29ed3dd3921a36fc6fe70baa58f21f0e35b027882ec6558ddd1515df7ebde838209ce483c883becd1dbe0120091698e71b6bff7b260c5ba4ed005265184b225b72d71b6cb280dd28df5378387a02f316220c48338801bf69ed6f64a4e9749fddb5504e9c6f73a0f7831784a7ff44abe908cdd3a5126f2ca6778a7e5226857222218aa572fe670891ca62bf2dc5d77cf3c9ed21dbbbf1e3c31f443ce083e29fecd7e0c633717e088b37b06f5d08d70039afdabde6adbc21438122cbde9f34eb23a6419963d3c57ec19eedf66ddccf0afde3ae977aaaa1a41c286c0eedd4e9aa2998e6c89fc6b22c373430fbe94532c7bf2f40d7dd12b928953a6459d6a69d81205ccc05a7bd7704f6897b9e653610d44f28b8a147e5b4ea0d84201f6ed8ac9e17ec19046b11a17080c2aa8a0bc2af6cb6fef132850f912d4d465017ee04b1741d5c19884a8074b488135ceee3dbdc8ee016cd766898c4fa190d77bd2a21a2eb8fb1b6fd016a55277e5c5cf2b9b91d58579a7f04a7ea026c3c9d24d8278db681f724c5e666490e5c9b0db924aea0da806aaeed8af0d99595251eeb4bae085b423a484833ed9b527e03f2230fd762046a1a9319fa1a4b49a6c0094fd20d02feb3f6782a634312e997bc15a2e180caf3300d8f67281d51f16c1122cf36ccc79f1fefcd9bddc70a68653ef88c64ce89d87f53937636d013bd917abf248e7084ff5dcabe559ad507a58df18dc82def56f4f6a78df18c97781e6de8d860aded0047ec9379168f8fa4f64b92b04250f737f70846c937b44e69aeb20708553f9e7a3f69f0e5b7dfd9a9aad2d512550da69344ffae13c611602e2fd3cd3e0f7bde003299b7ce54a10883cec16a011921151c41b1203fd83e2bc8bfe30594723c7176a15678f37e02cc2aa9cf89fa9e45e23d269d9d6224400d72a4b3499b601e3cfac236f342c95a3d71b6bd75799724c6b0fb716546917cbbef5bbc6c7357c7f94b02e1206ae2b6698eeb4129d78ef6d152aee7bbc44bd076b33f900f4694f408063c15529835d9268459823773e1fcfca34392e8ddee7799b8ed2c8582356ce7b128c557345aa9a74f1b49c82a2e81974884390ca57b3c489129e90e1458a6cc2342179de927545f5cf6e00bd6cfcd8abd0a45cf4211913930481274febf2f25e1e220a02c91d67a0196e5e638043e85d142fe9830bc95f292d1400c396b2cb34315645c7b196dced732265d49dc74b1efd582c26f709b86bc6ddc458b2088fac1bb589e3a44444fcc383fa5af1f7efe20e25754692604125d58f616da128c4994b143fab7ea6ec181272dc7a68a43f91988a34dc1b831f2026cd0cbec36c146689c8a221b4393e71116da18c865108017a3597ca06e89a16cfb28de4eb0b58488d3a60c80aab21a850fda9dc86a4395e386a7c33f2326b3bc1a7fa023bf900557e67ddb3110dc12eb37f11ea8920cceeb1c4259702e74f4f1f6db5317fc3c8496fb7bb13708bf4e3129e5feb0f6d971c05450a7051144a550c90702da0d9b9529dcfa126a1fd99ba295860b00638eb9fe6135b4166362e9389210a50ac775c2852e0cbceecb919c9720c3cdd4665b83a73abcf24d07b0e5ed441bfebdf7ca75f9db69fcd9ffff3f7d08008d87db18bff1c90121d5ee93aefe7e4048fbefbdf83e8ad33d0c49ffaebc2f2d086ce7b9208e936057c0c84b9df055f46cd62169442cb24072a162c1b4c1c3d7d1e40e4cde8819bccafb5a6f5ba7f41b6f8b05d686226d1b4cfaa23bb44a3c85227d9392f2aa25710830c1b824be395976fee7a73d571a7aea8d9961976a7a8ff83847854000c94bc46caecccb6ea7a364756f8b57d1cc3cad3b279802e03320b3e10ece8e337db73ffd087f738ec1382c93a5ffdfaed5a6e8dddf38c9ffd3017be4d7093fd9bcc5d801e1b99289cf1b09406d4a40e1c4b86a0ec00ab105815a3bd48c5fbe47be3bb1382a1323c6802ed8257b337ec6bfd8a619a1660ddbcd50f1cd8b82887f3eaaab0d6a392f87907dff4cb701faa1126a2db3ab689444e365794d39758e3a3c2203f9a13b9280fc3c6674999bfc35f3efdb702e9723cf16b23e494ad35819ae74b0e23ce97e229d0862f26c080e99e0b7f60f40aa3c94e79acb8e0904f7687ac28573ffb5980c40525f350add26a3ed2028f39f823a4bec00000041e0c0c6fb673ba2be8c63043a457c2ef98eeddd8beb6708ff95dde149c06cc985f0a2fb2a49dc1cc5c805fd08116e6396925662d98938eaaf220483685f0197d63ae3655599e60c0392f5e37e74243b74dc61255798f6e9ddf4a4c97aedc39b4c3c355c241d299882b4fca8e0d571381011f5b9c26f72baf778454cac7fdfcfffecf3d21666ddb85e47b7d6e3d02bfe6921ac647a5115cbe706dbc50e9b7d62db70005bd7c681901594a12655887040c2fcfabc47f910cf8b3ed3b244ca10cccf1d4237f2e53ce221148568ea15703614bfcc3382aa4db0e17c6687232b8f3e0b2cfad79a028ce5a2eea8bbd42f95bb4c0242813bb7cece73ad71c83949bf47ee2b6bba0444e1f13e3c73904058d62169850d72076d099e64734e26db0c2a8a7bd716079a55e7c1775b3cd2fdb84b72a00c120f1777447f57791241822b8f01f6883c7cd3e2baf9a3d4e13edcde5de83e1492fde03f26806d9afc6f7376ac6cc1b5dd2a711b05a4b5a9624c6dde633326a40d0299d258503185942fc894b680069f457271026d7a3a6b070785d81384cfde9ac879ff43bcf027468bd75eb40308a8fa69295253f784798faae017dbebac1c52c41342d4419bc6992280905cfda08043b8f7f9323ae3ae0554e11cf08cff4ee3020f98ffde492eef52b8dbe2fcb89c3f0bde2eb8b8e91104f6042278473f05cd0c42c8b6374e36338c214d7ccf30db3d7fa43fb1700a052e6e04a0bd58e2eb615ea9dfb50f89620c89427fa221f4c29fbce7b7504587e396ec2e3dfe96938971f7be9165276cb4ef246cc947557698758dd19cea4334f0865294e26099de1c2c2a9cfcd55a7bde1fcd3edddf9fc9feda8d651be2e50cd09f37b4f0a5a6faae926816d823053a928aac0cd9a8e923c99f374b75ee1d1836829d4036f74c125d011ffca9ec1d9d3fee6f67866fe9beb244f0625f0b474fe50bc5fffc9a28e069cd5101203b31eb29420a98a4b32827e27876e13cda57f5976f7af8f2c86d0f953a06286ab42ab329fab1d4c1ecef78f321fa68ed505e250005d223e4da4b1d6500ba5df4f9a0bec5d71292828453b74060a5d3c359cbccef5d8814928e3fcb2a988579b40f3cafddb87239146c8d7525225344e5c1d6230ecaf69eb3b5b6e1c1f52166356832c2ed6ab917be7b09c28e610bfa4b760716156fc45402849358b919b044a06a5df1a6b8bf9c53294fc44ad6306f7eee1497ee6e602614fe4924d771e1fb6eba47585bf77a43de7b207e11b62cbefe9a9b6077648864584b49f536d8b6ae8ff546972a7705c8d037edd54fdad501b7a290f17e7dcb4ec56faefe51af242f88df79e24b557f3bac685bdebd943e6d06c5f0da4e75afe9fcd7d9cc34e51149398d0cdc8ac7370eae73cf0c5408ab0995e5ee95ba307f8ae745bbcd12bb9af9acaa41866b8cdc31d7e7e2f417ce2a0cb0eb7e194e70b72a6d6d316f090474e7a804f4926612de19718f2ebf0ee3907eabeff2ebb432998e29a06cdc582732ec44c30b04136183d281af6e5221ccd44f1fed5143c6e46fdb8f05bb0f909aa3d4b082c43e4aa19111d1d1b46f9638bdf0f51175621f15bc5f5aab0c3a26a98010248d7776a378b1dfc836f30bc39359994bb4412aee4726b841750ea9ef0875bd23260650509bd151abaec2e16ac4aa5298d329361d7d0be72969160a027a77d2d7121e6e104bbba82d6439add8de1440126dec4981830a6fe152630a7026ab17910bff8365fa828992e6fba36b6b31873857a5425f27076d06fa862c0e730555f6b3822d832a9806fad1046d11021efa05f4f92791308bd8cb00c74cc269cf4b47e1d6a85c59095bdd969413e880e5b1c2fffa8c01e00ad1e1df9fc4fa150bfa32d5a31be566065b7b18195ffd5290203da2e90c0ae68467accdcdd353db29c849bfac161ad876f260e3bdfb70366e662d7b4fb39bd3b523a0109cde071bb1720032c0531b914ed1cce721325d79ee66d2fbb185419a1764957f17b501e5fa8e017e762f95a85ee4344b389c0bfb03c0342b3c1bc014efd3d53f077bfb1b084abdf5c4d0efdd195f11782e61e133e9f5c0ecaa0ddc7172d0a67789101fbad983fa59c64740fcc6e9ea02d174c09de4a9b12c6c76e8ed5fdbd5dbdc327b2119c17c7eefcfba64f0d8a5f4d0d507e375bdf886a401aa4e785d76a8cf551d3632a6d97ed6457c116c384126de85e101d6d61038bc251e0c420533b762c8f9fac91f3ecedc855338efb844b0ecf4cda61ea1e0206a5d4c65f0eda136e62c1b984c3dca7f285498e6185c4f8fc1e5a17ee7dab3c8d9fa87d202e45f9152c600e41e166b220db5c679ec27b3cfd0abc1979a5d62f31d7585b420787238c47a5a9066332add00c4e7c46c991403d13882d5341a7c53c23c130483edeaf05bc937aecfb343f86987bd5126c0a489ae9db3b80cfe5c3258e4e5ab3d740a1db3540b62430e8338634d868d503b069a824da4785425373b84b58e66b4085ef9acc07d355b08d0b87dbc12b93f0a8997bc47f62674b294a6b50c4dc64c1942bcffd2507eb64dcf17f4b54d66f6a6c2b056a73432764414c6c857c886804e8ba4304fab8d1867e20fbb2120a095d4ec2e5ace342a810277e3113cad5ba5f6b3caddfa68d2fb1454634eee88e56ceabea5a4f82f39925231c3a6ba8524bfe35c17dc844f71c92fbc8a703553902ee07af4a53b46e595e01566af0f96d04bce065294cac1cd92cc32050e03db8b109b918b98c1cdeab0a4d613e90aab6b2b1966e2d62513ab9d7ed9286add158af6e3d0a7eccbffa515fd2f92ac055a7374c6d14168b6b8652b0c311c867376347d095c2b5010cef9c8160934bea4e89df2e5ba1e5083329e0655a3ae6b195ded4be8549796b7bb80f58f340cd43dd0028d144a9012b762ff7132a85976a4ea67255d92701de1053a7376397924d126bf369d1d4bc075620eb5719eda0d09538e6f6b505c18f1ec9037ca944e86a40f7f7b6aafc860d6ef4eebfe8166b3cca19d334bea83a0e4dedd90f49af864f93c0042e3938efbc12e61e06cd1070923cbf25c000a3b9cbe852647d96778af8e4196966197ddbd9e351005d4aff2eb034785888f7ef2466170df6e72ed9d635b69cb79b1d278b8b45a19287b23ff6782f1c3c77ba928c777a3fb865146b323f1af186e5675236eecaf1dbc811f3d47727f469a27", 0x1000}, {&(0x7f0000008080)="2a4d52c38eff4e920b2896adef4220a6aaa1352df2f40af9a568553607e98c57d25967b883a966ea7e1ee0db36d8af60ce658b3438889d94918ef6c3329ef82dc6706ffdcd64003d5c5027db307b45c528434948f6ae9cc7ab5f77fb3d38a09965edb633edad22909c700797ce64fc1c962647990782120b985d4e8905026c0f57fc640080a436730093edb77507ea56f062942a5f0b8fadb15f33a70493e93630f4a5a6f432995fd1a94c40e7a53b8a484b9d8e2ae8239acf2fd76b8290f2abf1c8b6127cb7c12e995eed7b3c5a5cedae346cf4c3d53c8beb40d5b638577670e7eeec6b5a3ec9b9eda6b0a724", 0xed}], 0x2, &(0x7f00000081c0)=[@assoc={0x18, 0x117, 0x4, 0xfffffffe}, @assoc={0x18, 0x117, 0x4, 0x1}], 0x30, 0x8000}, {0x0, 0x0, &(0x7f0000008300)=[{&(0x7f0000008200)="e7cf4cde42ca14a17a2a6caef8df1ff5930e526d9738323f7bdbe1739551d90305dd14a410946f9deabfb16a7ef7e692ab1343000815c4acddc47a5f747b8863cb34a3ee0403bd947307afe62c9c7c2feaeb74b391cd30375ccb5694220b5f522a6d40b048525db65c8824cc03f40cd79b183bed89bcf0eb65fab4d8161cd6cd14574fdb9bea63d495152372566d96a8d91bdb5d67b84b4ae624cb5c2bd60b64d92f60d47196d1c550545e983ea91644cf40a3b26019b79144be2d77d9826822786fc8aa4eab421a4af1c89b40b3b593e3", 0xd1}], 0x1, &(0x7f0000008340)=[@iv={0x50, 0x117, 0x2, 0x38, "66bffa41cb8cc4608fbb3a35c8ec83b949c653389f48ce593d6147ed85e002b1b1602f45313d314592bb8b46290d173f90c508b894c5d719"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x70, 0x117, 0x2, 0x5a, "9394c08cdd8e67520d93f76abc3910e904b7338f3b8cbdccfd026d5f0567d80f19c5b137556604482d45cf04f218776c39cf4bb12a7d30fca8a013a722359f2b53356032fc39ef2a7c7d7cf69d4a3fbd73570276f7ca4ffd545c"}, @iv={0xc0, 0x117, 0x2, 0xa8, "057f594642b35a7d34bb77b53d86975ace65f2c99ac5c91a634b555f6ba8e9ded25e1c01ccc3dc94e1543bfba917782b8443e9c68fac4d0ea574ccba01a1dac04b6cd40a66e9b94b4e7297c4675fdd13baf7e71c8e605453bf728aea34840825f8d8b044875a48c5ff403359ca566b21bdef083f5016eba460b7246b1e69ec94fb94884c32fc832c44efc28cd6c11996d120ea57edeb7790cfcb5b2eb6555b76007899cf8271fa80"}, @iv={0x68, 0x117, 0x2, 0x54, "d16ff36d3181df07b4f0816fc049822a27491ee3ab92f048407b271a7d28f8170bc7bb5b06b50efda19f72c920c2904724e52d4686d0115fb7532e00836f7b02e377edf1eaec4a40a57ea20f2adc59e5be8bd0ea"}, @assoc={0x18}, @iv={0x90, 0x117, 0x2, 0x75, "0b49a452033170c8233d741d4305f41ed9741a4e23c88186a06f9311cf8e14253d95ecae20940e96eee190f290097caa08305e8325e61ecb0af9b57a4692e641701905c6f72741512312a82230928ab5bc3f5a4a32dda24d67cfabe24c1742396b70953f9e42845fa3105bac4559aacc9e3395e90d"}], 0x2a8, 0x4008000}, {0x0, 0x0, &(0x7f0000008680)=[{&(0x7f0000008600)="6b1bfe9b7f3d5d2bcd59d8a09194c2d65b3492cc797379af89b22e151a62501337edd49d7effaa214393e4c04a0c3a34ff6c383cfdc2a4c3ba46c7ae314dfb85a911e6627ee6cf2e4b390f94b4c6634b81357953b4413b0867c05dd0e4a40651082302b02c57549e10a125c00bc3c65b892ac6b7498155b646de", 0x7a}], 0x1, 0x0, 0x0, 0x2000090}, {0x0, 0x0, &(0x7f00000087c0)=[{&(0x7f00000086c0)="dd7502c816a15471917630fb4c8de3f53d4984ddbd4793f2cd739f17dbcce11b3f3ea26d91944f343b30cc8d0ce428f13b78e3f85ada01a1dcbb1549b628d24808dd0bbf1759231b39ea56a36cee65e3ed08e978b71088b874fc1cccc1747c12e05d9db6c5f4ab462b623201", 0x6c}, {&(0x7f0000008740)="09363faef36e919324edd13916c3cfc99cb229188b46251c9f764089caffd7c0c259dce3346d1f9bf2aa8d2e7097a5408f6a6e22c39d222258a5a4f883d1871a3e090f0b7b6759368fa71e8093ccf996dd9ad5aeb2aa1530504e13e264b6976c0b17e10b530e0e0c3a6c4a135cf3beae49487573d1ad36da58", 0x79}], 0x2, &(0x7f0000008800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x7c8}], 0x60, 0x4011}, {0x0, 0x0, &(0x7f0000008c80)=[{&(0x7f00000004c0)="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", 0x107}, {&(0x7f0000008940)="b76687a1db86aee6fa9c0e21d4c8ac9989abbf81d45858b6c39b601ca06da3f6c00d0be896977cc83ebc7b85a900a4d1517231a2b82f7d68cf694df694b124eaa6203159751c5108a093ff57bf12f9c4af1438279259198cf154519d532cd3e21e3748362d54bd7adc64f4a3186d499df883a456ce5c5eaf085114fe5b5481c0dc3e51678c1d0a14597359a3a531a486a43b4c5acca67cde2c477cbfac42cfda8b841eb41ac4eaaaa750a61caea36e9837cae77834546d0542811762526a8de9e25b77755a8648483dbe2053135853618ed34e0759713b5bdd", 0xd9}, {&(0x7f0000008a40)="f69de0678ca4acad839009eb4ae1b2a9211704ba9bb132f899bdae7c91bc57965810dc683c963feb4828f017763e867d5190da840e258623938513dd5691424fb13e37ce5c27cde2d97afc503995237b5ba97dae72286742773eb5fd5c0bb6116344d65284fb8862f206435fcc8600ba01ac922f3eb52e3d94e26765649352ada007876d965c4a127f9dfb7259293474340eb9e180cf92e2f051cfbfaf9a5fc3faed3812bcb4d954ed66fd7dc3ef51115be2af1fbcbc60ba7859b43654526286f9648fb09bc91d791b04fac18fa3da", 0xcf}, {&(0x7f0000008b40)="057ef8fbf929f040eb07c0760209e7ae09c3d515e34d4ac0bffe980a718e6e107db499f57603093fe47013fe6e15ad151ed06655ae27109986a70bbbb050602dbad3f1f18a356760ab4dad3f9f199fd55674c61244aaaa89b5796b22c6b945353320868ed58c4939c24349636df1c8c9a6f6c28dc68361d39670b6a975fed37a1416865f63328992c3b1a568ac05416751c050d79d361fbbb9ae8529c714c4b3f6266c52a4391280b2810f8a1538b7a2854a96c55609c343c8620172b526764ca0101855dd1f6bd8", 0xc8}, {&(0x7f0000008c40)="ba46d5e2d70579ef8cb828796d", 0xd}], 0x5, &(0x7f0000008d00)=ANY=[@ANYBLOB="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"], 0x370, 0xc092}, {0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009080)="be1002f9968a302d9150a14326f149bad7746d3ba0c5c24d18a924484b44afd0ed5ba553fab55594e7ec99d7dc41", 0x2e}], 0x1, &(0x7f0000009100)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0x5}, @assoc={0x18, 0x117, 0x4, 0xd3e}, @iv={0x78, 0x117, 0x2, 0x63, "75096f2fd0e915afac1062bb4d05c60ea09474fa06a826b2c668604c30c7bb712de1e6dcfe9f99d1b99eca86dcd7cdfa09731cd10623d4a70bbed648584c1a9084c8f411831ad7938af6bca5d6e1bacf821432fd8390abf163afd4f3ec25cba8fccab0"}, @iv={0x48, 0x117, 0x2, 0x34, "7170fab2ac6696f005b10b0f91f8f8c684b95280378a6bec4ea5de3d06936eea89f28810cc483c50f76d6ac42cf53efe9bb76ab7"}, @assoc={0x18, 0x117, 0x4, 0x63bd1561}], 0x120, 0x41}], 0x6, 0x4000000) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:05 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1703.008068][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1703.032172][T21628] FAULT_INJECTION: forcing a failure. [ 1703.032172][T21628] name failslab, interval 1, probability 0, space 0, times 0 00:22:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00t\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1703.070603][T21628] CPU: 1 PID: 21628 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1703.071910][T21626] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1703.079355][T21628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.079362][T21628] Call Trace: [ 1703.079388][T21628] dump_stack+0x197/0x210 [ 1703.079410][T21628] should_fail.cold+0xa/0x15 [ 1703.079429][T21628] ? fault_create_debugfs_attr+0x180/0x180 [ 1703.079445][T21628] ? ___might_sleep+0x163/0x2c0 [ 1703.079467][T21628] __should_failslab+0x121/0x190 [ 1703.079482][T21628] should_failslab+0x9/0x14 [ 1703.079494][T21628] kmem_cache_alloc_node_trace+0x274/0x750 [ 1703.079507][T21628] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1703.079525][T21628] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1703.111447][T21628] __kmalloc_node_track_caller+0x3d/0x70 [ 1703.132689][T21628] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1703.132713][T21628] __alloc_skb+0x10b/0x5e0 [ 1703.166160][T21628] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1703.171722][T21628] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1703.177398][T21628] ? aa_sk_perm+0x346/0xaf0 [ 1703.182352][T21628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.188731][T21628] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1703.195173][T21628] netlink_sendmsg+0xa1b/0xea0 [ 1703.200504][T21628] ? netlink_unicast+0x7d0/0x7d0 [ 1703.205458][T21628] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1703.211231][T21628] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1703.217097][T21628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1703.223363][T21628] ? security_socket_sendmsg+0x8d/0xc0 [ 1703.228857][T21628] ? netlink_unicast+0x7d0/0x7d0 [ 1703.233818][T21628] sock_sendmsg+0xd7/0x130 [ 1703.238427][T21628] ____sys_sendmsg+0x358/0x880 [ 1703.243243][T21628] ? kernel_sendmsg+0x50/0x50 [ 1703.247935][T21628] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1703.253614][T21628] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1703.260232][T21628] ? find_held_lock+0x35/0x130 [ 1703.265031][T21628] ___sys_sendmsg+0x100/0x170 00:22:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00z\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1703.269774][T21628] ? sendmsg_copy_msghdr+0x70/0x70 [ 1703.275642][T21628] ? __kasan_check_read+0x11/0x20 [ 1703.281177][T21628] ? __might_fault+0x12b/0x1e0 [ 1703.285988][T21628] ? find_held_lock+0x35/0x130 [ 1703.290774][T21628] ? __might_fault+0x12b/0x1e0 [ 1703.295554][T21628] ? ksys_dup3+0x3e0/0x3e0 [ 1703.300202][T21628] ? lock_downgrade+0x920/0x920 [ 1703.305804][T21628] ? ___might_sleep+0x163/0x2c0 [ 1703.311189][T21628] __sys_sendmmsg+0x1bf/0x4d0 [ 1703.316061][T21628] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1703.316094][T21628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1703.316108][T21628] ? fput_many+0x12c/0x1a0 [ 1703.316121][T21628] ? fput+0x1b/0x20 [ 1703.316133][T21628] ? ksys_write+0x1cf/0x290 [ 1703.316150][T21628] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1703.316162][T21628] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1703.316175][T21628] ? do_syscall_64+0x26/0x790 [ 1703.316191][T21628] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.316203][T21628] ? do_syscall_64+0x26/0x790 [ 1703.316228][T21628] __x64_sys_sendmmsg+0x9d/0x100 [ 1703.372703][T21628] do_syscall_64+0xfa/0x790 [ 1703.377245][T21628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1703.383156][T21628] RIP: 0033:0x45a6f9 [ 1703.387070][T21628] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1703.407664][T21628] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 00:22:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x16\x89\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:05 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x7fff, 0x1, 0x3, 0x5705, 0x2}, 0xc) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1703.416111][T21628] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1703.424093][T21628] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1703.432072][T21628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1703.440055][T21628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1703.448038][T21628] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:05 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1703.573332][T21651] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:22:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\xff\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:05 executing program 2 (fault-call:4 fault-nth:35): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1703.837202][T21664] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1703.889674][T21670] FAULT_INJECTION: forcing a failure. [ 1703.889674][T21670] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.915609][T21670] CPU: 1 PID: 21670 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1703.924336][T21670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1703.935594][T21670] Call Trace: [ 1703.938901][T21670] dump_stack+0x197/0x210 [ 1703.943273][T21670] should_fail.cold+0xa/0x15 [ 1703.947914][T21670] ? fault_create_debugfs_attr+0x180/0x180 [ 1703.953757][T21670] __should_failslab+0x121/0x190 [ 1703.959083][T21670] should_failslab+0x9/0x14 [ 1703.963689][T21670] kmem_cache_alloc+0x47/0x710 [ 1703.968803][T21670] ? lock_acquire+0x190/0x410 [ 1703.974046][T21670] ? netlink_deliver_tap+0x146/0xbe0 [ 1703.979825][T21670] skb_clone+0x154/0x3d0 [ 1703.979843][T21670] netlink_deliver_tap+0x943/0xbe0 [ 1703.979864][T21670] netlink_unicast+0x643/0x7d0 [ 1703.979882][T21670] ? netlink_attachskb+0x870/0x870 [ 1703.979895][T21670] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1703.979911][T21670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1703.979927][T21670] ? __check_object_size+0x3d/0x437 [ 1703.979939][T21670] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1703.979957][T21670] netlink_sendmsg+0x91c/0xea0 [ 1703.979978][T21670] ? netlink_unicast+0x7d0/0x7d0 [ 1703.979993][T21670] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1703.980012][T21670] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1704.017941][T21670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1704.028755][T21670] ? security_socket_sendmsg+0x8d/0xc0 [ 1704.028771][T21670] ? netlink_unicast+0x7d0/0x7d0 [ 1704.028786][T21670] sock_sendmsg+0xd7/0x130 [ 1704.028801][T21670] ____sys_sendmsg+0x358/0x880 [ 1704.028818][T21670] ? kernel_sendmsg+0x50/0x50 [ 1704.028831][T21670] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1704.028844][T21670] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1704.028856][T21670] ? find_held_lock+0x35/0x130 [ 1704.028881][T21670] ___sys_sendmsg+0x100/0x170 [ 1704.028896][T21670] ? sendmsg_copy_msghdr+0x70/0x70 [ 1704.028911][T21670] ? __kasan_check_read+0x11/0x20 [ 1704.028929][T21670] ? __might_fault+0x12b/0x1e0 [ 1704.117998][T21670] ? find_held_lock+0x35/0x130 [ 1704.122989][T21670] ? __might_fault+0x12b/0x1e0 [ 1704.127777][T21670] ? ksys_dup3+0x3e0/0x3e0 [ 1704.132211][T21670] ? lock_downgrade+0x920/0x920 [ 1704.137080][T21670] ? ___might_sleep+0x163/0x2c0 [ 1704.141954][T21670] __sys_sendmmsg+0x1bf/0x4d0 [ 1704.146918][T21670] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1704.152490][T21670] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1704.158926][T21670] ? fput_many+0x12c/0x1a0 [ 1704.163359][T21670] ? fput+0x1b/0x20 [ 1704.167209][T21670] ? ksys_write+0x1cf/0x290 [ 1704.171733][T21670] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1704.177261][T21670] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1704.183701][T21670] ? do_syscall_64+0x26/0x790 [ 1704.188758][T21670] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1704.195683][T21670] ? do_syscall_64+0x26/0x790 [ 1704.200373][T21670] __x64_sys_sendmmsg+0x9d/0x100 [ 1704.205422][T21670] do_syscall_64+0xfa/0x790 [ 1704.209953][T21670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1704.215860][T21670] RIP: 0033:0x45a6f9 [ 1704.219920][T21670] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1704.240918][T21670] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1704.249543][T21670] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1704.258272][T21670] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1704.267060][T21670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1704.275037][T21670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1704.283002][T21670] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:14 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:14 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) r2 = accept4(r0, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000180)=0x80, 0x80000) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000740)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x230, 0x0, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000280), {[{{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x1, 0x3}}}, {{@arp={@broadcast, @multicast1, 0xffffffff, 0x0, @empty, {[0x772846789d2a0d1a, 0x0, 0xff, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1f}, {[0x0, 0x7f, 0xff, 0xff, 0xff]}, 0x3ff, 0x3, 0xff00, 0x3ff, 0x2, 0x4, 'nlmon0\x00', 'team0\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x9, 0x1, 0x2}}}, {{@arp={@broadcast, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff, 0x1fe]}, 0xe644, 0x20, 0x4, 0x0, 0xfffa, 0xd9, 'rose0\x00', 'bond0\x00', {}, {}, 0x0, 0x40}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x2, @multicast1, 0x2, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r4, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:14 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x93988990f0f08b0b) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:14 executing program 2 (fault-call:4 fault-nth:36): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1712.427447][T21688] FAULT_INJECTION: forcing a failure. [ 1712.427447][T21688] name failslab, interval 1, probability 0, space 0, times 0 [ 1712.431232][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1712.513107][T21688] CPU: 1 PID: 21688 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1712.521958][T21688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1712.522389][T21690] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1712.532107][T21688] Call Trace: [ 1712.532137][T21688] dump_stack+0x197/0x210 [ 1712.532160][T21688] should_fail.cold+0xa/0x15 [ 1712.532180][T21688] ? fault_create_debugfs_attr+0x180/0x180 [ 1712.532202][T21688] __should_failslab+0x121/0x190 [ 1712.532218][T21688] should_failslab+0x9/0x14 [ 1712.532231][T21688] kmem_cache_alloc+0x47/0x710 [ 1712.532246][T21688] ? lock_acquire+0x190/0x410 [ 1712.532261][T21688] ? netlink_deliver_tap+0x146/0xbe0 [ 1712.532289][T21688] skb_clone+0x154/0x3d0 [ 1712.587970][T21688] netlink_deliver_tap+0x943/0xbe0 [ 1712.593212][T21688] netlink_unicast+0x643/0x7d0 [ 1712.597998][T21688] ? netlink_attachskb+0x870/0x870 [ 1712.603126][T21688] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1712.608853][T21688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1712.615109][T21688] ? __check_object_size+0x3d/0x437 [ 1712.620327][T21688] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1712.626065][T21688] netlink_sendmsg+0x91c/0xea0 [ 1712.630858][T21688] ? netlink_unicast+0x7d0/0x7d0 [ 1712.635810][T21688] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1712.641377][T21688] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1712.646839][T21688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1712.646853][T21688] ? security_socket_sendmsg+0x8d/0xc0 [ 1712.646869][T21688] ? netlink_unicast+0x7d0/0x7d0 [ 1712.646884][T21688] sock_sendmsg+0xd7/0x130 [ 1712.646900][T21688] ____sys_sendmsg+0x358/0x880 [ 1712.646917][T21688] ? kernel_sendmsg+0x50/0x50 [ 1712.646930][T21688] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1712.646944][T21688] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1712.646954][T21688] ? find_held_lock+0x35/0x130 [ 1712.646977][T21688] ___sys_sendmsg+0x100/0x170 [ 1712.682974][T21688] ? sendmsg_copy_msghdr+0x70/0x70 [ 1712.682993][T21688] ? __kasan_check_read+0x11/0x20 [ 1712.683015][T21688] ? __might_fault+0x12b/0x1e0 [ 1712.708657][T21688] ? find_held_lock+0x35/0x130 [ 1712.708679][T21688] ? __might_fault+0x12b/0x1e0 [ 1712.708694][T21688] ? ksys_dup3+0x3e0/0x3e0 [ 1712.708711][T21688] ? lock_downgrade+0x920/0x920 [ 1712.708734][T21688] ? ___might_sleep+0x163/0x2c0 [ 1712.708752][T21688] __sys_sendmmsg+0x1bf/0x4d0 [ 1712.708771][T21688] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1712.708803][T21688] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1712.708815][T21688] ? fput_many+0x12c/0x1a0 [ 1712.708831][T21688] ? fput+0x1b/0x20 [ 1712.761832][T21688] ? ksys_write+0x1cf/0x290 [ 1712.766353][T21688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1712.771828][T21688] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1712.777304][T21688] ? do_syscall_64+0x26/0x790 [ 1712.781992][T21688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.788082][T21688] ? do_syscall_64+0x26/0x790 [ 1712.797133][T21688] __x64_sys_sendmmsg+0x9d/0x100 [ 1712.802085][T21688] do_syscall_64+0xfa/0x790 [ 1712.806602][T21688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1712.812505][T21688] RIP: 0033:0x45a6f9 [ 1712.816410][T21688] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1712.836171][T21688] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1712.844592][T21688] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1712.852574][T21688] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 00:22:15 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) accept4$inet(r6, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10, 0x80000) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1712.860556][T21688] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1712.868560][T21688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1712.876550][T21688] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:15 executing program 2 (fault-call:4 fault-nth:37): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1712.970043][T21709] FAULT_INJECTION: forcing a failure. [ 1712.970043][T21709] name failslab, interval 1, probability 0, space 0, times 0 [ 1713.001369][T21704] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1713.009543][T21709] CPU: 1 PID: 21709 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1713.019491][T21709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1713.029558][T21709] Call Trace: [ 1713.032880][T21709] dump_stack+0x197/0x210 [ 1713.037377][T21709] should_fail.cold+0xa/0x15 [ 1713.041996][T21709] ? fault_create_debugfs_attr+0x180/0x180 [ 1713.047828][T21709] ? ___might_sleep+0x163/0x2c0 [ 1713.052777][T21709] __should_failslab+0x121/0x190 [ 1713.057747][T21709] should_failslab+0x9/0x14 [ 1713.062265][T21709] kmem_cache_alloc_node+0x268/0x740 [ 1713.067668][T21709] __alloc_skb+0xd5/0x5e0 [ 1713.072011][T21709] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1713.078569][T21709] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1713.088941][T21709] ? aa_sk_perm+0x346/0xaf0 [ 1713.093554][T21709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1713.099811][T21709] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1713.106073][T21709] netlink_sendmsg+0xa1b/0xea0 [ 1713.110853][T21709] ? netlink_unicast+0x7d0/0x7d0 [ 1713.115804][T21709] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1713.121362][T21709] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1713.127530][T21709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1713.133778][T21709] ? security_socket_sendmsg+0x8d/0xc0 [ 1713.139248][T21709] ? netlink_unicast+0x7d0/0x7d0 [ 1713.144289][T21709] sock_sendmsg+0xd7/0x130 [ 1713.148803][T21709] ____sys_sendmsg+0x358/0x880 [ 1713.153580][T21709] ? kernel_sendmsg+0x50/0x50 [ 1713.158530][T21709] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1713.164083][T21709] ? rcu_read_lock_any_held.part.0+0x50/0x50 00:22:15 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f0000007040)={{0x1, 0x0, @descriptor="e354438872a92a34"}}) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1713.170067][T21709] ? find_held_lock+0x35/0x130 [ 1713.174855][T21709] ___sys_sendmsg+0x100/0x170 [ 1713.179573][T21709] ? sendmsg_copy_msghdr+0x70/0x70 [ 1713.184903][T21709] ? __kasan_check_read+0x11/0x20 [ 1713.189950][T21709] ? __might_fault+0x12b/0x1e0 [ 1713.194800][T21709] ? find_held_lock+0x35/0x130 [ 1713.199554][T21709] ? __might_fault+0x12b/0x1e0 [ 1713.199569][T21709] ? ksys_dup3+0x3e0/0x3e0 [ 1713.199583][T21709] ? lock_downgrade+0x920/0x920 [ 1713.199605][T21709] ? ___might_sleep+0x163/0x2c0 [ 1713.199628][T21709] __sys_sendmmsg+0x1bf/0x4d0 [ 1713.199647][T21709] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1713.199686][T21709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1713.235657][T21709] ? fput_many+0x12c/0x1a0 [ 1713.240111][T21709] ? fput+0x1b/0x20 [ 1713.244037][T21709] ? ksys_write+0x1cf/0x290 [ 1713.248561][T21709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1713.256045][T21709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1713.261627][T21709] ? do_syscall_64+0x26/0x790 [ 1713.266315][T21709] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1713.273079][T21709] ? do_syscall_64+0x26/0x790 [ 1713.277855][T21709] __x64_sys_sendmmsg+0x9d/0x100 [ 1713.282872][T21709] do_syscall_64+0xfa/0x790 [ 1713.287465][T21709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1713.293528][T21709] RIP: 0033:0x45a6f9 [ 1713.297423][T21709] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1713.317360][T21709] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1713.325768][T21709] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1713.335008][T21709] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1713.343935][T21709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1713.353623][T21709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1713.361782][T21709] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:15 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1713.550670][T21713] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:22:23 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:23 executing program 2 (fault-call:4 fault-nth:38): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:23 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) r5 = accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) r9 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r9, 0x8901, 0xfffffffffffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000880)={'team0\x00', 0x0}) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r11, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r11, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r11, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) getsockopt$inet_pktinfo(r11, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @rand_addr, @dev}, &(0x7f0000000e00)=0xc) accept(0xffffffffffffffff, &(0x7f0000000f00)=@ll={0x11, 0x0, 0x0}, &(0x7f0000000f80)=0x80) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r14, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r14, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r14, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r14, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r14, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r14, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) getsockopt$inet_mreqn(r14, 0x0, 0x23, &(0x7f0000000fc0)={@multicast1, @remote, 0x0}, &(0x7f0000001000)=0xc) r16 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r16, 0x8901, 0xfffffffffffffffe) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, &(0x7f0000001040)={'rose0\x00', 0x0}) r18 = socket$inet6(0xa, 0x3, 0x6b) r19 = socket(0x11, 0x4000000000080002, 0x0) r20 = socket(0x11, 0x800000003, 0x0) bind(r20, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r20, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r19, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r21}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r18, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r21}) r22 = socket$inet6(0xa, 0x3, 0x6b) r23 = socket(0x11, 0x4000000000080002, 0x0) r24 = socket(0x11, 0x800000003, 0x0) bind(r24, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r24, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r23, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r25}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r22, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r25}) r26 = socket$inet6(0xa, 0x3, 0x6b) r27 = socket(0x11, 0x4000000000080002, 0x0) r28 = socket(0x11, 0x800000003, 0x0) bind(r28, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r28, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r27, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r29}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r26, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r29}) r30 = socket$inet6(0xa, 0x3, 0x6b) r31 = socket(0x11, 0x4000000000080002, 0x0) r32 = socket(0x11, 0x800000003, 0x0) bind(r32, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r32, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r31, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r33}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r30, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r33}) r34 = socket$inet6(0xa, 0x3, 0x6b) r35 = socket(0x11, 0x4000000000080002, 0x0) r36 = socket(0x11, 0x800000003, 0x0) bind(r36, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r36, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r35, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r37}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r34, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r37}) r38 = socket$inet6(0xa, 0x3, 0x6b) r39 = socket(0x11, 0x4000000000080002, 0x0) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r39, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r41}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r38, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r41}) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000001080)={@initdev, @loopback, 0x0}, &(0x7f00000010c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000001400)={'team0\x00', 0x0}) r44 = socket$inet6(0xa, 0x3, 0x6b) r45 = socket(0x11, 0x4000000000080002, 0x0) r46 = socket(0x11, 0x800000003, 0x0) bind(r46, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r46, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r45, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r47}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r44, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r47}) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001440)={&(0x7f00000018c0)={0x81c, r6, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r8}, {0x108, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00\x00\x00\x00\x00\x00\x00\x00\x96\xf0\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0xfffffffffffffc54}, {0x8}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x2b8, 0x0, 0x1, 0x7fff}, {0x8000, 0x0, 0x80, 0x36}]}}}]}}, {{0x8}, {0xc0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r13}, {0x20c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x69c}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x31, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1, 0x7, 0x80, 0x6}, {0x8, 0x80, 0x8, 0xfff}, {0x8, 0x86, 0x9, 0x4d9}, {0x9, 0x6, 0x7f, 0x7}, {0xff01, 0x0, 0x1, 0x1f}, {0x3f0, 0x1, 0x6d, 0x130b}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r25}, {0x204, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x4f, 0x20, 0x9, 0x10001}, {0x1, 0x0, 0x1, 0x8}, {0x7, 0x1, 0x7, 0x8000}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r29}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x2, 0x1, 0x4, 0x1000}, {0x2, 0x0, 0x6, 0x14bd}, {0xffff, 0x81, 0x3, 0x5}, {0x3f, 0x5, 0x1, 0x5d}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_1\x009o\x01\x00\x00\x80\x00\x00\x00\x00val\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r33}}}]}}, {{0x8, 0x1, r37}, {0xbc, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r41}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r42}}}]}}, {{0x8, 0x1, r43}, {0xc0, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0xffffffffffffff19}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r47}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x81c}, 0x1, 0x0, 0x0, 0x4}, 0x1) r48 = socket(0x15, 0x80005, 0x0) getsockopt(r48, 0x200000000114, 0x271f, 0xffffffffffffffff, &(0x7f0000000000)=0x2a5) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r48, 0x84, 0x8, &(0x7f0000000180), &(0x7f0000000200)=0x4) shutdown(r1, 0x1) r49 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r49, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:24 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1721.860073][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1721.883668][T21747] FAULT_INJECTION: forcing a failure. [ 1721.883668][T21747] name failslab, interval 1, probability 0, space 0, times 0 [ 1721.917012][T21744] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1721.917080][T21747] CPU: 1 PID: 21747 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1721.936573][T21747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1721.946816][T21747] Call Trace: [ 1721.950465][T21747] dump_stack+0x197/0x210 [ 1721.955164][T21747] should_fail.cold+0xa/0x15 [ 1721.960178][T21747] ? fault_create_debugfs_attr+0x180/0x180 [ 1721.966091][T21747] ? ___might_sleep+0x163/0x2c0 [ 1721.970955][T21747] __should_failslab+0x121/0x190 [ 1721.975918][T21747] should_failslab+0x9/0x14 [ 1721.980442][T21747] kmem_cache_alloc_node_trace+0x274/0x750 [ 1721.986274][T21747] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1721.992372][T21747] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1721.998207][T21747] __kmalloc_node_track_caller+0x3d/0x70 [ 1722.003847][T21747] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1722.009243][T21747] __alloc_skb+0x10b/0x5e0 [ 1722.013754][T21747] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1722.019913][T21747] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1722.025636][T21747] ? aa_sk_perm+0x346/0xaf0 [ 1722.030131][T21747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1722.036361][T21747] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1722.042595][T21747] netlink_sendmsg+0xa1b/0xea0 [ 1722.047536][T21747] ? netlink_unicast+0x7d0/0x7d0 [ 1722.052475][T21747] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1722.058607][T21747] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1722.064172][T21747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1722.070407][T21747] ? security_socket_sendmsg+0x8d/0xc0 [ 1722.076378][T21747] ? netlink_unicast+0x7d0/0x7d0 [ 1722.083315][T21747] sock_sendmsg+0xd7/0x130 [ 1722.087818][T21747] ____sys_sendmsg+0x358/0x880 [ 1722.092825][T21747] ? kernel_sendmsg+0x50/0x50 [ 1722.098445][T21747] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1722.103973][T21747] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1722.110021][T21747] ? find_held_lock+0x35/0x130 [ 1722.114775][T21747] ___sys_sendmsg+0x100/0x170 [ 1722.119480][T21747] ? sendmsg_copy_msghdr+0x70/0x70 [ 1722.124585][T21747] ? __kasan_check_read+0x11/0x20 [ 1722.129594][T21747] ? __might_fault+0x12b/0x1e0 [ 1722.134338][T21747] ? find_held_lock+0x35/0x130 [ 1722.139084][T21747] ? __might_fault+0x12b/0x1e0 [ 1722.143833][T21747] ? ksys_dup3+0x3e0/0x3e0 [ 1722.149198][T21747] ? lock_downgrade+0x920/0x920 [ 1722.154044][T21747] ? ___might_sleep+0x163/0x2c0 [ 1722.158886][T21747] __sys_sendmmsg+0x1bf/0x4d0 [ 1722.163569][T21747] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1722.168590][T21747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1722.174815][T21747] ? fput_many+0x12c/0x1a0 [ 1722.179743][T21747] ? fput+0x1b/0x20 [ 1722.183535][T21747] ? ksys_write+0x1cf/0x290 [ 1722.188026][T21747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1722.193553][T21747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1722.198991][T21747] ? do_syscall_64+0x26/0x790 [ 1722.203658][T21747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1722.210137][T21747] ? do_syscall_64+0x26/0x790 [ 1722.214805][T21747] __x64_sys_sendmmsg+0x9d/0x100 [ 1722.219729][T21747] do_syscall_64+0xfa/0x790 [ 1722.224218][T21747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1722.230093][T21747] RIP: 0033:0x45a6f9 [ 1722.233980][T21747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1722.253565][T21747] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 00:22:24 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1722.261960][T21747] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1722.269913][T21747] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1722.277876][T21747] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1722.285830][T21747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1722.293787][T21747] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:24 executing program 2 (fault-call:4 fault-nth:39): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1722.440267][T21759] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1722.485690][T21763] FAULT_INJECTION: forcing a failure. [ 1722.485690][T21763] name failslab, interval 1, probability 0, space 0, times 0 [ 1722.536495][T21763] CPU: 1 PID: 21763 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1722.545309][T21763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1722.555377][T21763] Call Trace: [ 1722.558684][T21763] dump_stack+0x197/0x210 [ 1722.563035][T21763] should_fail.cold+0xa/0x15 [ 1722.567995][T21763] ? fault_create_debugfs_attr+0x180/0x180 [ 1722.573829][T21763] __should_failslab+0x121/0x190 [ 1722.578781][T21763] should_failslab+0x9/0x14 00:22:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1722.583294][T21763] kmem_cache_alloc+0x47/0x710 [ 1722.588066][T21763] ? lock_acquire+0x190/0x410 [ 1722.592753][T21763] ? netlink_deliver_tap+0x146/0xbe0 [ 1722.598079][T21763] skb_clone+0x154/0x3d0 [ 1722.602334][T21763] netlink_deliver_tap+0x943/0xbe0 [ 1722.607464][T21763] netlink_unicast+0x643/0x7d0 [ 1722.612334][T21763] ? netlink_attachskb+0x870/0x870 [ 1722.617450][T21763] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1722.623091][T21763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1722.629341][T21763] ? __check_object_size+0x3d/0x437 [ 1722.634549][T21763] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1722.640289][T21763] netlink_sendmsg+0x91c/0xea0 [ 1722.645066][T21763] ? netlink_unicast+0x7d0/0x7d0 [ 1722.650010][T21763] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1722.655567][T21763] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1722.661032][T21763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1722.667281][T21763] ? security_socket_sendmsg+0x8d/0xc0 [ 1722.672749][T21763] ? netlink_unicast+0x7d0/0x7d0 [ 1722.677693][T21763] sock_sendmsg+0xd7/0x130 [ 1722.682125][T21763] ____sys_sendmsg+0x358/0x880 [ 1722.686882][T21763] ? kernel_sendmsg+0x50/0x50 [ 1722.686898][T21763] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1722.686912][T21763] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1722.686924][T21763] ? find_held_lock+0x35/0x130 [ 1722.686948][T21763] ___sys_sendmsg+0x100/0x170 [ 1722.686966][T21763] ? sendmsg_copy_msghdr+0x70/0x70 [ 1722.686982][T21763] ? __kasan_check_read+0x11/0x20 [ 1722.686998][T21763] ? __might_fault+0x12b/0x1e0 [ 1722.687014][T21763] ? find_held_lock+0x35/0x130 [ 1722.732172][T21763] ? __might_fault+0x12b/0x1e0 00:22:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1722.736952][T21763] ? ksys_dup3+0x3e0/0x3e0 [ 1722.741382][T21763] ? lock_downgrade+0x920/0x920 [ 1722.746253][T21763] ? ___might_sleep+0x163/0x2c0 [ 1722.751118][T21763] __sys_sendmmsg+0x1bf/0x4d0 [ 1722.755813][T21763] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1722.760869][T21763] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1722.767117][T21763] ? fput_many+0x12c/0x1a0 [ 1722.771545][T21763] ? fput+0x1b/0x20 [ 1722.775356][T21763] ? ksys_write+0x1cf/0x290 [ 1722.779873][T21763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1722.785340][T21763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1722.790823][T21763] ? do_syscall_64+0x26/0x790 [ 1722.795508][T21763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1722.801585][T21763] ? do_syscall_64+0x26/0x790 [ 1722.806276][T21763] __x64_sys_sendmmsg+0x9d/0x100 [ 1722.811232][T21763] do_syscall_64+0xfa/0x790 [ 1722.815750][T21763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1722.821741][T21763] RIP: 0033:0x45a6f9 00:22:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1722.825640][T21763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1722.845278][T21763] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1722.854243][T21763] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1722.862209][T21763] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1722.862217][T21763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1722.862224][T21763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1722.862231][T21763] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:33 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:33 executing program 2 (fault-call:4 fault-nth:40): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:33 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x89', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:33 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1731.252597][T21799] FAULT_INJECTION: forcing a failure. [ 1731.252597][T21799] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.269438][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1731.282142][T21799] CPU: 1 PID: 21799 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1731.290844][T21799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1731.300933][T21799] Call Trace: [ 1731.304239][T21799] dump_stack+0x197/0x210 [ 1731.308619][T21799] should_fail.cold+0xa/0x15 [ 1731.310079][T21798] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1731.319149][T21799] ? fault_create_debugfs_attr+0x180/0x180 [ 1731.319170][T21799] ? ___might_sleep+0x163/0x2c0 [ 1731.319190][T21799] __should_failslab+0x121/0x190 [ 1731.319207][T21799] should_failslab+0x9/0x14 00:22:33 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1731.319217][T21799] kmem_cache_alloc_node+0x268/0x740 [ 1731.319239][T21799] __alloc_skb+0xd5/0x5e0 [ 1731.358228][T21799] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1731.363879][T21799] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1731.369525][T21799] ? aa_sk_perm+0x346/0xaf0 [ 1731.374049][T21799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1731.380313][T21799] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1731.387090][T21799] netlink_sendmsg+0xa1b/0xea0 [ 1731.391876][T21799] ? netlink_unicast+0x7d0/0x7d0 [ 1731.396827][T21799] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1731.402384][T21799] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1731.407865][T21799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1731.414117][T21799] ? security_socket_sendmsg+0x8d/0xc0 [ 1731.419595][T21799] ? netlink_unicast+0x7d0/0x7d0 [ 1731.424544][T21799] sock_sendmsg+0xd7/0x130 [ 1731.428992][T21799] ____sys_sendmsg+0x358/0x880 [ 1731.433785][T21799] ? kernel_sendmsg+0x50/0x50 [ 1731.438472][T21799] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1731.444024][T21799] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1731.450101][T21799] ? find_held_lock+0x35/0x130 [ 1731.454899][T21799] ___sys_sendmsg+0x100/0x170 [ 1731.459599][T21799] ? sendmsg_copy_msghdr+0x70/0x70 [ 1731.464734][T21799] ? __kasan_check_read+0x11/0x20 [ 1731.469779][T21799] ? __might_fault+0x12b/0x1e0 [ 1731.474559][T21799] ? find_held_lock+0x35/0x130 [ 1731.479335][T21799] ? __might_fault+0x12b/0x1e0 [ 1731.484119][T21799] ? ksys_dup3+0x3e0/0x3e0 [ 1731.488550][T21799] ? lock_downgrade+0x920/0x920 [ 1731.493422][T21799] ? ___might_sleep+0x163/0x2c0 [ 1731.498377][T21799] __sys_sendmmsg+0x1bf/0x4d0 [ 1731.503065][T21799] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1731.508095][T21799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1731.514328][T21799] ? fput_many+0x12c/0x1a0 [ 1731.518736][T21799] ? fput+0x1b/0x20 [ 1731.522554][T21799] ? ksys_write+0x1cf/0x290 [ 1731.527045][T21799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1731.532496][T21799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1731.537938][T21799] ? do_syscall_64+0x26/0x790 [ 1731.542611][T21799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1731.548657][T21799] ? do_syscall_64+0x26/0x790 [ 1731.553322][T21799] __x64_sys_sendmmsg+0x9d/0x100 [ 1731.558256][T21799] do_syscall_64+0xfa/0x790 [ 1731.562764][T21799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1731.568660][T21799] RIP: 0033:0x45a6f9 [ 1731.572555][T21799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1731.592155][T21799] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1731.600556][T21799] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1731.608509][T21799] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1731.616466][T21799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1731.624422][T21799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1731.632376][T21799] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:33 executing program 2 (fault-call:4 fault-nth:41): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1731.848468][T21818] FAULT_INJECTION: forcing a failure. [ 1731.848468][T21818] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.885589][T21818] CPU: 0 PID: 21818 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1731.894312][T21818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1731.904379][T21818] Call Trace: [ 1731.907686][T21818] dump_stack+0x197/0x210 [ 1731.912035][T21818] should_fail.cold+0xa/0x15 [ 1731.916646][T21818] ? fault_create_debugfs_attr+0x180/0x180 [ 1731.922475][T21818] ? ___might_sleep+0x163/0x2c0 [ 1731.927354][T21818] __should_failslab+0x121/0x190 [ 1731.932308][T21818] should_failslab+0x9/0x14 [ 1731.936829][T21818] kmem_cache_alloc_node_trace+0x274/0x750 [ 1731.942657][T21818] ? rcu_read_lock_any_held.part.0+0x50/0x50 00:22:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1731.948645][T21818] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1731.954466][T21818] __kmalloc_node_track_caller+0x3d/0x70 [ 1731.960119][T21818] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1731.965512][T21818] __alloc_skb+0x10b/0x5e0 [ 1731.969945][T21818] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1731.975498][T21818] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1731.981153][T21818] ? aa_sk_perm+0x346/0xaf0 [ 1731.985663][T21818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1731.991912][T21818] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1731.999472][T21818] netlink_sendmsg+0xa1b/0xea0 [ 1732.004270][T21818] ? netlink_unicast+0x7d0/0x7d0 [ 1732.009239][T21818] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1732.014807][T21818] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1732.020296][T21818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1732.026558][T21818] ? security_socket_sendmsg+0x8d/0xc0 [ 1732.026577][T21818] ? netlink_unicast+0x7d0/0x7d0 [ 1732.026591][T21818] sock_sendmsg+0xd7/0x130 [ 1732.026605][T21818] ____sys_sendmsg+0x358/0x880 [ 1732.026622][T21818] ? kernel_sendmsg+0x50/0x50 [ 1732.026638][T21818] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1732.026650][T21818] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1732.026663][T21818] ? find_held_lock+0x35/0x130 [ 1732.026688][T21818] ___sys_sendmsg+0x100/0x170 [ 1732.026704][T21818] ? sendmsg_copy_msghdr+0x70/0x70 [ 1732.026722][T21818] ? __kasan_check_read+0x11/0x20 [ 1732.082322][T21818] ? __might_fault+0x12b/0x1e0 [ 1732.087188][T21818] ? find_held_lock+0x35/0x130 [ 1732.091967][T21818] ? __might_fault+0x12b/0x1e0 00:22:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1732.096761][T21818] ? ksys_dup3+0x3e0/0x3e0 [ 1732.101190][T21818] ? lock_downgrade+0x920/0x920 [ 1732.106154][T21818] ? ___might_sleep+0x163/0x2c0 [ 1732.111027][T21818] __sys_sendmmsg+0x1bf/0x4d0 [ 1732.115717][T21818] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1732.115751][T21818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1732.115766][T21818] ? fput_many+0x12c/0x1a0 [ 1732.115781][T21818] ? fput+0x1b/0x20 [ 1732.115794][T21818] ? ksys_write+0x1cf/0x290 [ 1732.115812][T21818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1732.115826][T21818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1732.115843][T21818] ? do_syscall_64+0x26/0x790 [ 1732.127483][T21818] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.127500][T21818] ? do_syscall_64+0x26/0x790 [ 1732.127524][T21818] __x64_sys_sendmmsg+0x9d/0x100 [ 1732.127541][T21818] do_syscall_64+0xfa/0x790 [ 1732.127555][T21818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1732.127567][T21818] RIP: 0033:0x45a6f9 [ 1732.127581][T21818] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1732.127588][T21818] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1732.127601][T21818] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1732.127608][T21818] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1732.127616][T21818] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1732.127625][T21818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1732.127633][T21818] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:42 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:42 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYRES64=r2], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000180)={@mcast1}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r4, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:42 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:42 executing program 2 (fault-call:4 fault-nth:42): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1740.564835][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1740.578618][T21852] FAULT_INJECTION: forcing a failure. [ 1740.578618][T21852] name failslab, interval 1, probability 0, space 0, times 0 [ 1740.580626][T21855] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1740.629677][T21852] CPU: 0 PID: 21852 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1740.638403][T21852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1740.648496][T21852] Call Trace: [ 1740.651797][T21852] dump_stack+0x197/0x210 [ 1740.656136][T21852] should_fail.cold+0xa/0x15 [ 1740.656159][T21852] ? fault_create_debugfs_attr+0x180/0x180 [ 1740.656190][T21852] __should_failslab+0x121/0x190 [ 1740.673274][T21852] should_failslab+0x9/0x14 [ 1740.677792][T21852] kmem_cache_alloc+0x47/0x710 [ 1740.682568][T21852] ? lock_acquire+0x190/0x410 [ 1740.687258][T21852] ? netlink_deliver_tap+0x146/0xbe0 [ 1740.692559][T21852] skb_clone+0x154/0x3d0 [ 1740.696826][T21852] netlink_deliver_tap+0x943/0xbe0 [ 1740.701959][T21852] netlink_unicast+0x643/0x7d0 [ 1740.706745][T21852] ? netlink_attachskb+0x870/0x870 [ 1740.711885][T21852] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1740.717534][T21852] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1740.723787][T21852] ? __check_object_size+0x3d/0x437 [ 1740.728993][T21852] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1740.734730][T21852] netlink_sendmsg+0x91c/0xea0 [ 1740.739631][T21852] ? netlink_unicast+0x7d0/0x7d0 [ 1740.744582][T21852] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1740.750152][T21852] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1740.755659][T21852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1740.761927][T21852] ? security_socket_sendmsg+0x8d/0xc0 [ 1740.767413][T21852] ? netlink_unicast+0x7d0/0x7d0 [ 1740.772375][T21852] sock_sendmsg+0xd7/0x130 [ 1740.776808][T21852] ____sys_sendmsg+0x358/0x880 [ 1740.781604][T21852] ? kernel_sendmsg+0x50/0x50 [ 1740.786300][T21852] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1740.791867][T21852] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1740.797861][T21852] ? find_held_lock+0x35/0x130 [ 1740.802651][T21852] ___sys_sendmsg+0x100/0x170 [ 1740.807352][T21852] ? sendmsg_copy_msghdr+0x70/0x70 [ 1740.812477][T21852] ? __kasan_check_read+0x11/0x20 [ 1740.818214][T21852] ? __might_fault+0x12b/0x1e0 [ 1740.822991][T21852] ? find_held_lock+0x35/0x130 [ 1740.827772][T21852] ? __might_fault+0x12b/0x1e0 [ 1740.832549][T21852] ? ksys_dup3+0x3e0/0x3e0 [ 1740.837155][T21852] ? lock_downgrade+0x920/0x920 [ 1740.842030][T21852] ? ___might_sleep+0x163/0x2c0 [ 1740.846896][T21852] __sys_sendmmsg+0x1bf/0x4d0 [ 1740.851595][T21852] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1740.856649][T21852] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1740.862902][T21852] ? fput_many+0x12c/0x1a0 [ 1740.867328][T21852] ? fput+0x1b/0x20 [ 1740.871144][T21852] ? ksys_write+0x1cf/0x290 [ 1740.875674][T21852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1740.881142][T21852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1740.886811][T21852] ? do_syscall_64+0x26/0x790 [ 1740.891600][T21852] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1740.897691][T21852] ? do_syscall_64+0x26/0x790 [ 1740.902416][T21852] __x64_sys_sendmmsg+0x9d/0x100 [ 1740.907493][T21852] do_syscall_64+0xfa/0x790 [ 1740.912712][T21852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1740.918617][T21852] RIP: 0033:0x45a6f9 [ 1740.922525][T21852] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1740.942151][T21852] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1740.952740][T21852] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1740.961210][T21852] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1740.969598][T21852] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:22:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:43 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1740.977882][T21852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1740.986616][T21852] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:43 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1741.050669][T21866] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:22:43 executing program 2 (fault-call:4 fault-nth:43): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1741.205692][T21872] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:22:43 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1741.285320][T21880] FAULT_INJECTION: forcing a failure. [ 1741.285320][T21880] name failslab, interval 1, probability 0, space 0, times 0 [ 1741.327710][T21880] CPU: 0 PID: 21880 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1741.336434][T21880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1741.346928][T21880] Call Trace: [ 1741.350223][T21880] dump_stack+0x197/0x210 [ 1741.354556][T21880] should_fail.cold+0xa/0x15 [ 1741.359159][T21880] ? fault_create_debugfs_attr+0x180/0x180 [ 1741.364991][T21880] ? ___might_sleep+0x163/0x2c0 [ 1741.369873][T21880] __should_failslab+0x121/0x190 [ 1741.374822][T21880] should_failslab+0x9/0x14 [ 1741.379443][T21880] kmem_cache_alloc_node+0x268/0x740 [ 1741.384760][T21880] __alloc_skb+0xd5/0x5e0 [ 1741.389097][T21880] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1741.394645][T21880] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1741.400281][T21880] ? aa_sk_perm+0x346/0xaf0 [ 1741.404790][T21880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1741.411042][T21880] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1741.417655][T21880] netlink_sendmsg+0xa1b/0xea0 [ 1741.422927][T21880] ? netlink_unicast+0x7d0/0x7d0 [ 1741.428402][T21880] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1741.434178][T21880] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1741.439648][T21880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1741.446149][T21880] ? security_socket_sendmsg+0x8d/0xc0 [ 1741.451717][T21880] ? netlink_unicast+0x7d0/0x7d0 [ 1741.457129][T21880] sock_sendmsg+0xd7/0x130 [ 1741.461563][T21880] ____sys_sendmsg+0x358/0x880 [ 1741.466334][T21880] ? kernel_sendmsg+0x50/0x50 [ 1741.471024][T21880] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1741.476583][T21880] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1741.482570][T21880] ? find_held_lock+0x35/0x130 [ 1741.487356][T21880] ___sys_sendmsg+0x100/0x170 [ 1741.492705][T21880] ? sendmsg_copy_msghdr+0x70/0x70 [ 1741.497869][T21880] ? __kasan_check_read+0x11/0x20 [ 1741.502913][T21880] ? __might_fault+0x12b/0x1e0 [ 1741.507689][T21880] ? find_held_lock+0x35/0x130 [ 1741.512461][T21880] ? __might_fault+0x12b/0x1e0 [ 1741.517234][T21880] ? ksys_dup3+0x3e0/0x3e0 [ 1741.521667][T21880] ? lock_downgrade+0x920/0x920 [ 1741.526554][T21880] ? ___might_sleep+0x163/0x2c0 [ 1741.532554][T21880] __sys_sendmmsg+0x1bf/0x4d0 [ 1741.538067][T21880] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1741.543234][T21880] ? debug_smp_processor_id+0x33/0x18a [ 1741.548727][T21880] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1741.554923][T21880] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1741.560488][T21880] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1741.566487][T21880] ? fput+0x1b/0x20 [ 1741.570318][T21880] ? ksys_write+0x1cf/0x290 [ 1741.575192][T21880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1741.580756][T21880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1741.586231][T21880] ? do_syscall_64+0x26/0x790 [ 1741.591370][T21880] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1741.599712][T21880] ? do_syscall_64+0x26/0x790 [ 1741.604707][T21880] __x64_sys_sendmmsg+0x9d/0x100 [ 1741.609671][T21880] do_syscall_64+0xfa/0x790 [ 1741.614279][T21880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1741.620178][T21880] RIP: 0033:0x45a6f9 [ 1741.624101][T21880] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1741.645202][T21880] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1741.653808][T21880] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1741.661881][T21880] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1741.669867][T21880] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1741.677941][T21880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1741.685928][T21880] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:49 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:49 executing program 2 (fault-call:4 fault-nth:44): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffee0, 0x20008004, &(0x7f000031e000)={0xa, 0x4e22, 0x681}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000140)=ANY=[@ANYRES64=r4], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) bind$packet(r4, 0x0, 0xfffffffffffffefb) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:49 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:49 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1747.720415][T21899] FAULT_INJECTION: forcing a failure. [ 1747.720415][T21899] name failslab, interval 1, probability 0, space 0, times 0 [ 1747.731430][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1747.753023][T21904] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:22:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\xff\xff\xfd', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1747.811267][T21899] CPU: 1 PID: 21899 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1747.820771][T21899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1747.830855][T21899] Call Trace: [ 1747.834161][T21899] dump_stack+0x197/0x210 [ 1747.838514][T21899] should_fail.cold+0xa/0x15 [ 1747.843130][T21899] ? fault_create_debugfs_attr+0x180/0x180 [ 1747.848984][T21899] ? ___might_sleep+0x163/0x2c0 [ 1747.853888][T21899] __should_failslab+0x121/0x190 [ 1747.858850][T21899] should_failslab+0x9/0x14 [ 1747.863368][T21899] kmem_cache_alloc_node_trace+0x274/0x750 [ 1747.869210][T21899] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1747.875229][T21899] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1747.881249][T21899] __kmalloc_node_track_caller+0x3d/0x70 [ 1747.881947][T21916] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1747.886906][T21899] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1747.886923][T21899] __alloc_skb+0x10b/0x5e0 [ 1747.886941][T21899] ? __kmalloc_reserve.isra.0+0xf0/0xf0 00:22:50 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1747.886955][T21899] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1747.886968][T21899] ? aa_sk_perm+0x346/0xaf0 [ 1747.886983][T21899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1747.886998][T21899] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1747.887016][T21899] netlink_sendmsg+0xa1b/0xea0 [ 1747.887037][T21899] ? netlink_unicast+0x7d0/0x7d0 [ 1747.943919][T21899] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1747.949486][T21899] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1747.954971][T21899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1747.961228][T21899] ? security_socket_sendmsg+0x8d/0xc0 [ 1747.966704][T21899] ? netlink_unicast+0x7d0/0x7d0 [ 1747.971677][T21899] sock_sendmsg+0xd7/0x130 [ 1747.975081][T21920] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1747.976125][T21899] ____sys_sendmsg+0x358/0x880 [ 1747.976146][T21899] ? kernel_sendmsg+0x50/0x50 [ 1747.976163][T21899] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1747.976178][T21899] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1747.976191][T21899] ? find_held_lock+0x35/0x130 00:22:50 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r5, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1747.976216][T21899] ___sys_sendmsg+0x100/0x170 [ 1747.976237][T21899] ? sendmsg_copy_msghdr+0x70/0x70 [ 1748.021265][T21899] ? __kasan_check_read+0x11/0x20 [ 1748.026483][T21899] ? __might_fault+0x12b/0x1e0 [ 1748.031263][T21899] ? find_held_lock+0x35/0x130 [ 1748.036052][T21899] ? __might_fault+0x12b/0x1e0 [ 1748.040832][T21899] ? ksys_dup3+0x3e0/0x3e0 [ 1748.045276][T21899] ? lock_downgrade+0x920/0x920 [ 1748.050273][T21899] ? ___might_sleep+0x163/0x2c0 [ 1748.055146][T21899] __sys_sendmmsg+0x1bf/0x4d0 [ 1748.059850][T21899] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1748.064576][T21922] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1748.064920][T21899] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1748.064936][T21899] ? fput_many+0x12c/0x1a0 [ 1748.064949][T21899] ? fput+0x1b/0x20 [ 1748.064966][T21899] ? ksys_write+0x1cf/0x290 [ 1748.093484][T21899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1748.098959][T21899] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1748.098976][T21899] ? do_syscall_64+0x26/0x790 [ 1748.098993][T21899] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.099006][T21899] ? do_syscall_64+0x26/0x790 [ 1748.099029][T21899] __x64_sys_sendmmsg+0x9d/0x100 [ 1748.099046][T21899] do_syscall_64+0xfa/0x790 [ 1748.099065][T21899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.109198][T21899] RIP: 0033:0x45a6f9 [ 1748.109212][T21899] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:22:50 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(0xffffffffffffffff, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1748.109219][T21899] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1748.109232][T21899] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1748.109240][T21899] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1748.109248][T21899] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1748.109257][T21899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1748.109265][T21899] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:50 executing program 2 (fault-call:4 fault-nth:45): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1748.472021][T21933] FAULT_INJECTION: forcing a failure. [ 1748.472021][T21933] name failslab, interval 1, probability 0, space 0, times 0 [ 1748.495585][T21933] CPU: 1 PID: 21933 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1748.504294][T21933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1748.514351][T21933] Call Trace: [ 1748.517662][T21933] dump_stack+0x197/0x210 [ 1748.522012][T21933] should_fail.cold+0xa/0x15 [ 1748.526623][T21933] ? fault_create_debugfs_attr+0x180/0x180 [ 1748.532551][T21933] ? ___might_sleep+0x163/0x2c0 [ 1748.537428][T21933] __should_failslab+0x121/0x190 [ 1748.542375][T21933] should_failslab+0x9/0x14 [ 1748.546887][T21933] kmem_cache_alloc_node+0x268/0x740 [ 1748.552189][T21933] __alloc_skb+0xd5/0x5e0 [ 1748.556531][T21933] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1748.562949][T21933] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1748.568593][T21933] ? aa_sk_perm+0x346/0xaf0 [ 1748.573106][T21933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1748.579442][T21933] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1748.585686][T21933] netlink_sendmsg+0xa1b/0xea0 [ 1748.590521][T21933] ? netlink_unicast+0x7d0/0x7d0 [ 1748.595438][T21933] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1748.600973][T21933] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1748.607198][T21933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1748.613952][T21933] ? security_socket_sendmsg+0x8d/0xc0 [ 1748.619393][T21933] ? netlink_unicast+0x7d0/0x7d0 [ 1748.624307][T21933] sock_sendmsg+0xd7/0x130 [ 1748.628701][T21933] ____sys_sendmsg+0x358/0x880 [ 1748.633477][T21933] ? kernel_sendmsg+0x50/0x50 [ 1748.638157][T21933] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1748.643689][T21933] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1748.649685][T21933] ? find_held_lock+0x35/0x130 [ 1748.654450][T21933] ___sys_sendmsg+0x100/0x170 [ 1748.659132][T21933] ? sendmsg_copy_msghdr+0x70/0x70 [ 1748.664230][T21933] ? __kasan_check_read+0x11/0x20 [ 1748.669238][T21933] ? __might_fault+0x12b/0x1e0 [ 1748.673979][T21933] ? find_held_lock+0x35/0x130 [ 1748.678722][T21933] ? __might_fault+0x12b/0x1e0 [ 1748.683474][T21933] ? ksys_dup3+0x3e0/0x3e0 [ 1748.687879][T21933] ? lock_downgrade+0x920/0x920 [ 1748.692713][T21933] ? ___might_sleep+0x163/0x2c0 [ 1748.697562][T21933] __sys_sendmmsg+0x1bf/0x4d0 [ 1748.702220][T21933] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1748.707234][T21933] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1748.713453][T21933] ? fput_many+0x12c/0x1a0 [ 1748.718130][T21933] ? fput+0x1b/0x20 [ 1748.721954][T21933] ? ksys_write+0x1cf/0x290 [ 1748.726524][T21933] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1748.732030][T21933] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1748.737488][T21933] ? do_syscall_64+0x26/0x790 [ 1748.742243][T21933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.748408][T21933] ? do_syscall_64+0x26/0x790 [ 1748.753076][T21933] __x64_sys_sendmmsg+0x9d/0x100 [ 1748.757997][T21933] do_syscall_64+0xfa/0x790 [ 1748.762761][T21933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.768659][T21933] RIP: 0033:0x45a6f9 [ 1748.772558][T21933] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1748.792145][T21933] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1748.800547][T21933] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1748.809382][T21933] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1748.817620][T21933] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1748.825576][T21933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1748.833547][T21933] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:22:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(0xffffffffffffffff, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:22:59 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:22:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:22:59 executing program 2 (fault-call:4 fault-nth:46): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r10, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0xdfb4d8bbbe1b5660, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x1) 00:22:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x3, 0x0, 0x3f) getsockopt$rose(r4, 0x104, 0xe, &(0x7f00000019c0), &(0x7f0000001a00)=0x4) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(0xffffffffffffffff, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1757.108240][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1757.121111][T21953] FAULT_INJECTION: forcing a failure. [ 1757.121111][T21953] name failslab, interval 1, probability 0, space 0, times 0 [ 1757.148605][T21953] CPU: 0 PID: 21953 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1757.157326][T21953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1757.167740][T21953] Call Trace: [ 1757.171055][T21953] dump_stack+0x197/0x210 [ 1757.175409][T21953] should_fail.cold+0xa/0x15 [ 1757.180050][T21953] ? fault_create_debugfs_attr+0x180/0x180 [ 1757.185966][T21953] ? ___might_sleep+0x163/0x2c0 [ 1757.190837][T21953] __should_failslab+0x121/0x190 [ 1757.195829][T21953] should_failslab+0x9/0x14 [ 1757.200348][T21953] kmem_cache_alloc_node_trace+0x274/0x750 00:22:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) socket(0x3, 0x0, 0x3f) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r4, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1757.206171][T21953] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1757.212169][T21953] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1757.218010][T21953] __kmalloc_node_track_caller+0x3d/0x70 [ 1757.223661][T21953] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1757.229051][T21953] __alloc_skb+0x10b/0x5e0 [ 1757.233493][T21953] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1757.239057][T21953] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1757.244709][T21953] ? aa_sk_perm+0x346/0xaf0 [ 1757.249236][T21953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1757.255494][T21953] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1757.255514][T21953] netlink_sendmsg+0xa1b/0xea0 [ 1757.255538][T21953] ? netlink_unicast+0x7d0/0x7d0 [ 1757.271725][T21953] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1757.277294][T21953] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1757.277310][T21953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1757.277324][T21953] ? security_socket_sendmsg+0x8d/0xc0 [ 1757.277340][T21953] ? netlink_unicast+0x7d0/0x7d0 [ 1757.277358][T21953] sock_sendmsg+0xd7/0x130 [ 1757.277372][T21953] ____sys_sendmsg+0x358/0x880 [ 1757.277392][T21953] ? kernel_sendmsg+0x50/0x50 [ 1757.313388][T21953] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1757.318952][T21953] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1757.324940][T21953] ? find_held_lock+0x35/0x130 [ 1757.326049][T21960] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1757.329731][T21953] ___sys_sendmsg+0x100/0x170 [ 1757.329751][T21953] ? sendmsg_copy_msghdr+0x70/0x70 [ 1757.329772][T21953] ? __kasan_check_read+0x11/0x20 [ 1757.353970][T21953] ? __might_fault+0x12b/0x1e0 00:22:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r3 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r4, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1757.358761][T21953] ? find_held_lock+0x35/0x130 [ 1757.363533][T21953] ? __might_fault+0x12b/0x1e0 [ 1757.368311][T21953] ? ksys_dup3+0x3e0/0x3e0 [ 1757.372738][T21953] ? lock_downgrade+0x920/0x920 [ 1757.377607][T21953] ? ___might_sleep+0x163/0x2c0 [ 1757.382466][T21953] __sys_sendmmsg+0x1bf/0x4d0 [ 1757.387162][T21953] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1757.392216][T21953] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1757.398463][T21953] ? fput_many+0x12c/0x1a0 [ 1757.402879][T21953] ? fput+0x1b/0x20 [ 1757.406678][T21953] ? ksys_write+0x1cf/0x290 [ 1757.406698][T21953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1757.406711][T21953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1757.406728][T21953] ? do_syscall_64+0x26/0x790 [ 1757.426806][T21953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1757.432883][T21953] ? do_syscall_64+0x26/0x790 [ 1757.440448][T21953] __x64_sys_sendmmsg+0x9d/0x100 [ 1757.445407][T21953] do_syscall_64+0xfa/0x790 [ 1757.449932][T21953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1757.455857][T21953] RIP: 0033:0x45a6f9 [ 1757.459758][T21953] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1757.468041][T21963] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1757.479454][T21953] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1757.479470][T21953] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 00:22:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\xfd\xfd\xff', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1757.479476][T21953] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1757.479484][T21953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1757.479492][T21953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1757.479499][T21953] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:22:59 executing program 2 (fault-call:4 fault-nth:47): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:22:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r2 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xffd7) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r3, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1757.720070][T21977] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1757.741073][T21980] FAULT_INJECTION: forcing a failure. [ 1757.741073][T21980] name failslab, interval 1, probability 0, space 0, times 0 [ 1757.755740][T21980] CPU: 0 PID: 21980 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1757.764444][T21980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1757.774505][T21980] Call Trace: [ 1757.777820][T21980] dump_stack+0x197/0x210 [ 1757.782176][T21980] should_fail.cold+0xa/0x15 [ 1757.786973][T21980] ? fault_create_debugfs_attr+0x180/0x180 [ 1757.792806][T21980] __should_failslab+0x121/0x190 [ 1757.797761][T21980] should_failslab+0x9/0x14 [ 1757.802276][T21980] kmem_cache_alloc+0x47/0x710 [ 1757.807071][T21980] ? lock_acquire+0x190/0x410 [ 1757.811760][T21980] ? netlink_deliver_tap+0x146/0xbe0 [ 1757.817057][T21980] skb_clone+0x154/0x3d0 [ 1757.821312][T21980] netlink_deliver_tap+0x943/0xbe0 [ 1757.826440][T21980] netlink_unicast+0x643/0x7d0 [ 1757.831218][T21980] ? netlink_attachskb+0x870/0x870 [ 1757.836338][T21980] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1757.841990][T21980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1757.848356][T21980] ? __check_object_size+0x3d/0x437 [ 1757.853595][T21980] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1757.859333][T21980] netlink_sendmsg+0x91c/0xea0 [ 1757.864123][T21980] ? netlink_unicast+0x7d0/0x7d0 [ 1757.869073][T21980] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1757.880464][T21980] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1757.885940][T21980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1757.892189][T21980] ? security_socket_sendmsg+0x8d/0xc0 [ 1757.897832][T21980] ? netlink_unicast+0x7d0/0x7d0 [ 1757.902779][T21980] sock_sendmsg+0xd7/0x130 [ 1757.907205][T21980] ____sys_sendmsg+0x358/0x880 [ 1757.912761][T21980] ? kernel_sendmsg+0x50/0x50 [ 1757.917627][T21980] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1757.923613][T21980] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1757.929606][T21980] ? find_held_lock+0x35/0x130 [ 1757.934535][T21980] ___sys_sendmsg+0x100/0x170 [ 1757.939232][T21980] ? sendmsg_copy_msghdr+0x70/0x70 [ 1757.944355][T21980] ? __kasan_check_read+0x11/0x20 [ 1757.949391][T21980] ? __might_fault+0x12b/0x1e0 [ 1757.954158][T21980] ? find_held_lock+0x35/0x130 [ 1757.958935][T21980] ? __might_fault+0x12b/0x1e0 [ 1757.963709][T21980] ? ksys_dup3+0x3e0/0x3e0 [ 1757.968129][T21980] ? lock_downgrade+0x920/0x920 [ 1757.973001][T21980] ? ___might_sleep+0x163/0x2c0 [ 1757.977868][T21980] __sys_sendmmsg+0x1bf/0x4d0 [ 1757.982570][T21980] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1757.987622][T21980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1757.993879][T21980] ? fput_many+0x12c/0x1a0 [ 1757.998297][T21980] ? fput+0x1b/0x20 [ 1758.002098][T21980] ? ksys_write+0x1cf/0x290 [ 1758.006590][T21980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1758.012070][T21980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1758.017534][T21980] ? do_syscall_64+0x26/0x790 [ 1758.022208][T21980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1758.028269][T21980] ? do_syscall_64+0x26/0x790 [ 1758.033514][T21980] __x64_sys_sendmmsg+0x9d/0x100 [ 1758.038502][T21980] do_syscall_64+0xfa/0x790 [ 1758.043019][T21980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1758.048921][T21980] RIP: 0033:0x45a6f9 [ 1758.052821][T21980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1758.072524][T21980] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1758.080928][T21980] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1758.080936][T21980] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1758.080943][T21980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1758.080951][T21980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1758.080958][T21980] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:23:06 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) r1 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r2, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:06 executing program 2 (fault-call:4 fault-nth:48): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:06 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r10, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0xdfb4d8bbbe1b5660, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x1) [ 1764.281241][T21992] FAULT_INJECTION: forcing a failure. [ 1764.281241][T21992] name failslab, interval 1, probability 0, space 0, times 0 [ 1764.301799][T21992] CPU: 1 PID: 21992 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1764.310530][T21992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.320604][T21992] Call Trace: [ 1764.321843][T21999] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1764.323914][T21992] dump_stack+0x197/0x210 [ 1764.323939][T21992] should_fail.cold+0xa/0x15 [ 1764.323964][T21992] ? fault_create_debugfs_attr+0x180/0x180 [ 1764.336213][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1764.337566][T21992] ? ___might_sleep+0x163/0x2c0 [ 1764.337587][T21992] __should_failslab+0x121/0x190 [ 1764.337604][T21992] should_failslab+0x9/0x14 [ 1764.337621][T21992] kmem_cache_alloc_node+0x268/0x740 00:23:06 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) socket$inet6(0xa, 0x80003, 0x6) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1764.378554][T21992] __alloc_skb+0xd5/0x5e0 [ 1764.382902][T21992] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1764.388680][T21992] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1764.394334][T21992] ? aa_sk_perm+0x346/0xaf0 [ 1764.398862][T21992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1764.405380][T21992] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1764.411648][T21992] netlink_sendmsg+0xa1b/0xea0 [ 1764.416437][T21992] ? netlink_unicast+0x7d0/0x7d0 [ 1764.421393][T21992] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1764.426961][T21992] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1764.432436][T21992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1764.438691][T21992] ? security_socket_sendmsg+0x8d/0xc0 [ 1764.444165][T21992] ? netlink_unicast+0x7d0/0x7d0 [ 1764.449115][T21992] sock_sendmsg+0xd7/0x130 [ 1764.453552][T21992] ____sys_sendmsg+0x358/0x880 [ 1764.458338][T21992] ? kernel_sendmsg+0x50/0x50 [ 1764.463036][T21992] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1764.468600][T21992] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1764.471667][T22008] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1764.474587][T21992] ? find_held_lock+0x35/0x130 [ 1764.474616][T21992] ___sys_sendmsg+0x100/0x170 [ 1764.474633][T21992] ? sendmsg_copy_msghdr+0x70/0x70 [ 1764.474653][T21992] ? __kasan_check_read+0x11/0x20 [ 1764.504173][T21992] ? __might_fault+0x12b/0x1e0 [ 1764.508953][T21992] ? find_held_lock+0x35/0x130 [ 1764.513730][T21992] ? __might_fault+0x12b/0x1e0 [ 1764.518511][T21992] ? ksys_dup3+0x3e0/0x3e0 [ 1764.523048][T21992] ? lock_downgrade+0x920/0x920 00:23:06 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) socket$inet6(0xa, 0x80003, 0x6) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1764.527931][T21992] ? ___might_sleep+0x163/0x2c0 [ 1764.532804][T21992] __sys_sendmmsg+0x1bf/0x4d0 [ 1764.537521][T21992] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1764.542586][T21992] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1764.548846][T21992] ? fput_many+0x12c/0x1a0 [ 1764.553279][T21992] ? fput+0x1b/0x20 [ 1764.557100][T21992] ? ksys_write+0x1cf/0x290 [ 1764.561615][T21992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1764.567094][T21992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1764.572570][T21992] ? do_syscall_64+0x26/0x790 [ 1764.577257][T21992] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1764.583335][T21992] ? do_syscall_64+0x26/0x790 [ 1764.588029][T21992] __x64_sys_sendmmsg+0x9d/0x100 [ 1764.592977][T21992] do_syscall_64+0xfa/0x790 [ 1764.597495][T21992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1764.603396][T21992] RIP: 0033:0x45a6f9 [ 1764.607301][T21992] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1764.608109][T22010] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1764.626921][T21992] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1764.626936][T21992] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1764.626942][T21992] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1764.626949][T21992] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1764.626955][T21992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1764.626963][T21992] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:06 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) socket$inet6(0xa, 0x80003, 0x6) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r10, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0xdfb4d8bbbe1b5660, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x1) 00:23:07 executing program 2 (fault-call:4 fault-nth:49): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1764.916541][T22024] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1765.046061][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1765.094565][T22031] FAULT_INJECTION: forcing a failure. [ 1765.094565][T22031] name failslab, interval 1, probability 0, space 0, times 0 [ 1765.114723][T22031] CPU: 0 PID: 22031 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1765.123440][T22031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1765.133510][T22031] Call Trace: [ 1765.136860][T22031] dump_stack+0x197/0x210 [ 1765.141211][T22031] should_fail.cold+0xa/0x15 [ 1765.145817][T22031] ? fault_create_debugfs_attr+0x180/0x180 [ 1765.151639][T22031] ? ___might_sleep+0x163/0x2c0 [ 1765.156509][T22031] __should_failslab+0x121/0x190 [ 1765.161459][T22031] should_failslab+0x9/0x14 [ 1765.167964][T22031] kmem_cache_alloc_node_trace+0x274/0x750 [ 1765.173776][T22031] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1765.179763][T22031] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1765.185581][T22031] __kmalloc_node_track_caller+0x3d/0x70 [ 1765.191222][T22031] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1765.196604][T22031] __alloc_skb+0x10b/0x5e0 [ 1765.201027][T22031] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1765.206578][T22031] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1765.212214][T22031] ? aa_sk_perm+0x346/0xaf0 [ 1765.216733][T22031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1765.222993][T22031] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1765.229254][T22031] netlink_sendmsg+0xa1b/0xea0 [ 1765.229275][T22031] ? netlink_unicast+0x7d0/0x7d0 [ 1765.229290][T22031] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1765.229306][T22031] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1765.229321][T22031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1765.229334][T22031] ? security_socket_sendmsg+0x8d/0xc0 [ 1765.229346][T22031] ? netlink_unicast+0x7d0/0x7d0 [ 1765.229365][T22031] sock_sendmsg+0xd7/0x130 [ 1765.239040][T22031] ____sys_sendmsg+0x358/0x880 [ 1765.239057][T22031] ? kernel_sendmsg+0x50/0x50 [ 1765.239071][T22031] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1765.239086][T22031] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1765.239097][T22031] ? find_held_lock+0x35/0x130 [ 1765.239121][T22031] ___sys_sendmsg+0x100/0x170 [ 1765.239139][T22031] ? sendmsg_copy_msghdr+0x70/0x70 [ 1765.239155][T22031] ? __kasan_check_read+0x11/0x20 [ 1765.239175][T22031] ? __might_fault+0x12b/0x1e0 [ 1765.316569][T22031] ? find_held_lock+0x35/0x130 [ 1765.322627][T22031] ? __might_fault+0x12b/0x1e0 [ 1765.327394][T22031] ? ksys_dup3+0x3e0/0x3e0 [ 1765.331812][T22031] ? lock_downgrade+0x920/0x920 [ 1765.336660][T22031] ? ___might_sleep+0x163/0x2c0 [ 1765.341503][T22031] __sys_sendmmsg+0x1bf/0x4d0 [ 1765.346173][T22031] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1765.351216][T22031] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1765.357444][T22031] ? fput_many+0x12c/0x1a0 [ 1765.361861][T22031] ? fput+0x1b/0x20 [ 1765.365658][T22031] ? ksys_write+0x1cf/0x290 [ 1765.370241][T22031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1765.375688][T22031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1765.381145][T22031] ? do_syscall_64+0x26/0x790 [ 1765.385808][T22031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1765.391862][T22031] ? do_syscall_64+0x26/0x790 [ 1765.396535][T22031] __x64_sys_sendmmsg+0x9d/0x100 [ 1765.401463][T22031] do_syscall_64+0xfa/0x790 [ 1765.406046][T22031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1765.411925][T22031] RIP: 0033:0x45a6f9 [ 1765.415807][T22031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1765.435404][T22031] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1765.443806][T22031] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1765.451759][T22031] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1765.459721][T22031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1765.467714][T22031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1765.475710][T22031] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:13 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:13 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:13 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:13 executing program 2 (fault-call:4 fault-nth:50): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r10, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0xdfb4d8bbbe1b5660, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x1) [ 1771.556390][T22044] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1771.573584][T22046] FAULT_INJECTION: forcing a failure. [ 1771.573584][T22046] name failslab, interval 1, probability 0, space 0, times 0 [ 1771.588200][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1771.612466][T22046] CPU: 1 PID: 22046 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1771.621182][T22046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1771.631250][T22046] Call Trace: [ 1771.634554][T22046] dump_stack+0x197/0x210 [ 1771.638915][T22046] should_fail.cold+0xa/0x15 [ 1771.643530][T22046] ? fault_create_debugfs_attr+0x180/0x180 [ 1771.649358][T22046] ? ___might_sleep+0x163/0x2c0 [ 1771.654224][T22046] __should_failslab+0x121/0x190 [ 1771.659155][T22046] should_failslab+0x9/0x14 [ 1771.659168][T22046] kmem_cache_alloc_node_trace+0x274/0x750 [ 1771.659184][T22046] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1771.659198][T22046] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1771.659215][T22046] __kmalloc_node_track_caller+0x3d/0x70 [ 1771.659234][T22046] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1771.692266][T22046] __alloc_skb+0x10b/0x5e0 [ 1771.696704][T22046] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1771.702266][T22046] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1771.707900][T22046] ? aa_sk_perm+0x346/0xaf0 [ 1771.707918][T22046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1771.707934][T22046] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1771.707953][T22046] netlink_sendmsg+0xa1b/0xea0 [ 1771.707975][T22046] ? netlink_unicast+0x7d0/0x7d0 [ 1771.719207][T22046] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1771.719226][T22046] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1771.719242][T22046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1771.719256][T22046] ? security_socket_sendmsg+0x8d/0xc0 [ 1771.719273][T22046] ? netlink_unicast+0x7d0/0x7d0 [ 1771.719287][T22046] sock_sendmsg+0xd7/0x130 [ 1771.719305][T22046] ____sys_sendmsg+0x358/0x880 [ 1771.771978][T22046] ? kernel_sendmsg+0x50/0x50 [ 1771.776674][T22046] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1771.782241][T22046] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1771.782626][T22055] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1771.788232][T22046] ? find_held_lock+0x35/0x130 [ 1771.788262][T22046] ___sys_sendmsg+0x100/0x170 [ 1771.788280][T22046] ? sendmsg_copy_msghdr+0x70/0x70 [ 1771.788295][T22046] ? __kasan_check_read+0x11/0x20 [ 1771.788312][T22046] ? __might_fault+0x12b/0x1e0 [ 1771.788331][T22046] ? find_held_lock+0x35/0x130 [ 1771.826684][T22046] ? __might_fault+0x12b/0x1e0 [ 1771.831557][T22046] ? ksys_dup3+0x3e0/0x3e0 [ 1771.836792][T22046] ? lock_downgrade+0x920/0x920 [ 1771.841668][T22046] ? ___might_sleep+0x163/0x2c0 [ 1771.846534][T22046] __sys_sendmmsg+0x1bf/0x4d0 [ 1771.851233][T22046] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1771.856292][T22046] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1771.862556][T22046] ? fput_many+0x12c/0x1a0 [ 1771.866991][T22046] ? fput+0x1b/0x20 [ 1771.870804][T22046] ? ksys_write+0x1cf/0x290 [ 1771.875316][T22046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1771.880785][T22046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1771.886261][T22046] ? do_syscall_64+0x26/0x790 [ 1771.890956][T22046] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1771.897040][T22046] ? do_syscall_64+0x26/0x790 [ 1771.897064][T22046] __x64_sys_sendmmsg+0x9d/0x100 [ 1771.897081][T22046] do_syscall_64+0xfa/0x790 [ 1771.897100][T22046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1771.897111][T22046] RIP: 0033:0x45a6f9 [ 1771.897125][T22046] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1771.897138][T22046] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1771.918073][T22046] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 00:23:13 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:14 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000010201a7"], 0x8}}, 0x28000090) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1771.944601][T22062] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1771.950731][T22046] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1771.950740][T22046] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1771.950746][T22046] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1771.950753][T22046] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:14 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r2, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1772.214881][T22072] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:23:22 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) 00:23:22 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r2, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:22 executing program 2 (fault-call:4 fault-nth:51): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:22 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:22 executing program 3: pipe(&(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1780.751783][T22091] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1780.763896][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1780.784233][T22092] FAULT_INJECTION: forcing a failure. [ 1780.784233][T22092] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.840379][T22101] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1780.870324][T22092] CPU: 1 PID: 22092 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1780.879044][T22092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1780.889110][T22092] Call Trace: [ 1780.892422][T22092] dump_stack+0x197/0x210 [ 1780.896788][T22092] should_fail.cold+0xa/0x15 [ 1780.901406][T22092] ? fault_create_debugfs_attr+0x180/0x180 [ 1780.907242][T22092] __should_failslab+0x121/0x190 [ 1780.912196][T22092] should_failslab+0x9/0x14 [ 1780.916714][T22092] kmem_cache_alloc+0x47/0x710 [ 1780.921497][T22092] ? lock_acquire+0x190/0x410 [ 1780.926189][T22092] ? netlink_deliver_tap+0x146/0xbe0 [ 1780.931495][T22092] skb_clone+0x154/0x3d0 [ 1780.935756][T22092] netlink_deliver_tap+0x943/0xbe0 [ 1780.941324][T22092] netlink_unicast+0x643/0x7d0 [ 1780.946104][T22092] ? netlink_attachskb+0x870/0x870 [ 1780.951223][T22092] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1780.956890][T22092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1780.963145][T22092] ? __check_object_size+0x3d/0x437 [ 1780.968506][T22092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1780.974272][T22092] netlink_sendmsg+0x91c/0xea0 [ 1780.979060][T22092] ? netlink_unicast+0x7d0/0x7d0 [ 1780.984046][T22092] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1780.989714][T22092] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1780.995217][T22092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.001558][T22092] ? security_socket_sendmsg+0x8d/0xc0 [ 1781.007035][T22092] ? netlink_unicast+0x7d0/0x7d0 [ 1781.011997][T22092] sock_sendmsg+0xd7/0x130 [ 1781.016429][T22092] ____sys_sendmsg+0x358/0x880 [ 1781.021212][T22092] ? kernel_sendmsg+0x50/0x50 [ 1781.025895][T22092] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1781.031454][T22092] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1781.037587][T22092] ? find_held_lock+0x35/0x130 [ 1781.042381][T22092] ___sys_sendmsg+0x100/0x170 [ 1781.047085][T22092] ? sendmsg_copy_msghdr+0x70/0x70 [ 1781.052205][T22092] ? __kasan_check_read+0x11/0x20 [ 1781.057238][T22092] ? __might_fault+0x12b/0x1e0 [ 1781.062181][T22092] ? find_held_lock+0x35/0x130 [ 1781.066963][T22092] ? __might_fault+0x12b/0x1e0 [ 1781.071742][T22092] ? ksys_dup3+0x3e0/0x3e0 [ 1781.076177][T22092] ? lock_downgrade+0x920/0x920 [ 1781.081064][T22092] ? ___might_sleep+0x163/0x2c0 [ 1781.085936][T22092] __sys_sendmmsg+0x1bf/0x4d0 [ 1781.090649][T22092] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1781.095706][T22092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1781.101955][T22092] ? fput_many+0x12c/0x1a0 [ 1781.106382][T22092] ? fput+0x1b/0x20 [ 1781.110200][T22092] ? ksys_write+0x1cf/0x290 [ 1781.114720][T22092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1781.120186][T22092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1781.125640][T22092] ? do_syscall_64+0x26/0x790 [ 1781.130498][T22092] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.136562][T22092] ? do_syscall_64+0x26/0x790 [ 1781.141250][T22092] __x64_sys_sendmmsg+0x9d/0x100 [ 1781.146198][T22092] do_syscall_64+0xfa/0x790 [ 1781.146217][T22092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.146228][T22092] RIP: 0033:0x45a6f9 [ 1781.146241][T22092] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1781.146248][T22092] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 00:23:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:23 executing program 3: pipe(&(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1781.146267][T22092] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1781.196576][T22092] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1781.204550][T22092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1781.212697][T22092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1781.212705][T22092] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 [ 1781.274620][T22106] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:23:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:23 executing program 2 (fault-call:4 fault-nth:52): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:23 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1781.495231][T22114] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1781.562207][T22117] FAULT_INJECTION: forcing a failure. [ 1781.562207][T22117] name failslab, interval 1, probability 0, space 0, times 0 [ 1781.601812][T22117] CPU: 1 PID: 22117 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1781.610533][T22117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1781.620597][T22117] Call Trace: [ 1781.623897][T22117] dump_stack+0x197/0x210 [ 1781.628245][T22117] should_fail.cold+0xa/0x15 [ 1781.632848][T22117] ? fault_create_debugfs_attr+0x180/0x180 [ 1781.638689][T22117] ? ___might_sleep+0x163/0x2c0 [ 1781.643549][T22117] __should_failslab+0x121/0x190 [ 1781.648505][T22117] should_failslab+0x9/0x14 [ 1781.653024][T22117] kmem_cache_alloc_node+0x268/0x740 [ 1781.658331][T22117] __alloc_skb+0xd5/0x5e0 [ 1781.662680][T22117] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1781.668239][T22117] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1781.673887][T22117] ? aa_sk_perm+0x346/0xaf0 [ 1781.678409][T22117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.684661][T22117] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1781.691177][T22117] netlink_sendmsg+0xa1b/0xea0 [ 1781.695954][T22117] ? netlink_unicast+0x7d0/0x7d0 [ 1781.700897][T22117] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1781.706447][T22117] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1781.711931][T22117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.718183][T22117] ? security_socket_sendmsg+0x8d/0xc0 [ 1781.723669][T22117] ? netlink_unicast+0x7d0/0x7d0 [ 1781.728619][T22117] sock_sendmsg+0xd7/0x130 [ 1781.733134][T22117] ____sys_sendmsg+0x358/0x880 [ 1781.737924][T22117] ? kernel_sendmsg+0x50/0x50 [ 1781.742611][T22117] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1781.748168][T22117] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1781.754157][T22117] ? find_held_lock+0x35/0x130 [ 1781.758950][T22117] ___sys_sendmsg+0x100/0x170 [ 1781.763645][T22117] ? sendmsg_copy_msghdr+0x70/0x70 [ 1781.768770][T22117] ? __kasan_check_read+0x11/0x20 [ 1781.773810][T22117] ? __might_fault+0x12b/0x1e0 [ 1781.778605][T22117] ? find_held_lock+0x35/0x130 [ 1781.783386][T22117] ? __might_fault+0x12b/0x1e0 [ 1781.788160][T22117] ? ksys_dup3+0x3e0/0x3e0 [ 1781.792586][T22117] ? lock_downgrade+0x920/0x920 [ 1781.797457][T22117] ? ___might_sleep+0x163/0x2c0 [ 1781.802325][T22117] __sys_sendmmsg+0x1bf/0x4d0 [ 1781.807022][T22117] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1781.812070][T22117] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1781.818351][T22117] ? fput_many+0x12c/0x1a0 [ 1781.822785][T22117] ? fput+0x1b/0x20 [ 1781.826611][T22117] ? ksys_write+0x1cf/0x290 [ 1781.831125][T22117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1781.836595][T22117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1781.842091][T22117] ? do_syscall_64+0x26/0x790 [ 1781.846794][T22117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.852864][T22117] ? do_syscall_64+0x26/0x790 [ 1781.857576][T22117] __x64_sys_sendmmsg+0x9d/0x100 [ 1781.862719][T22117] do_syscall_64+0xfa/0x790 [ 1781.867235][T22117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.873747][T22117] RIP: 0033:0x45a6f9 [ 1781.877647][T22117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1781.897257][T22117] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1781.905678][T22117] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1781.913662][T22117] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1781.922337][T22117] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1781.930316][T22117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1781.939273][T22117] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:32 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) 00:23:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:32 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:32 executing program 2 (fault-call:4 fault-nth:53): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:32 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:32 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1789.970519][T22132] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1789.998595][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1790.027530][T22137] FAULT_INJECTION: forcing a failure. [ 1790.027530][T22137] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.058738][T22137] CPU: 1 PID: 22137 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1790.067468][T22137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1790.077546][T22137] Call Trace: [ 1790.080862][T22137] dump_stack+0x197/0x210 [ 1790.085221][T22137] should_fail.cold+0xa/0x15 [ 1790.089864][T22137] ? fault_create_debugfs_attr+0x180/0x180 [ 1790.095694][T22137] ? ___might_sleep+0x163/0x2c0 [ 1790.096901][T22149] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1790.100557][T22137] __should_failslab+0x121/0x190 [ 1790.100580][T22137] should_failslab+0x9/0x14 [ 1790.119285][T22137] kmem_cache_alloc_node_trace+0x274/0x750 [ 1790.125109][T22137] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1790.131104][T22137] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1790.136932][T22137] __kmalloc_node_track_caller+0x3d/0x70 [ 1790.142584][T22137] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1790.147970][T22137] __alloc_skb+0x10b/0x5e0 [ 1790.152400][T22137] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1790.158050][T22137] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1790.163814][T22137] ? aa_sk_perm+0x346/0xaf0 [ 1790.168340][T22137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1790.174682][T22137] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1790.181061][T22137] netlink_sendmsg+0xa1b/0xea0 [ 1790.185856][T22137] ? netlink_unicast+0x7d0/0x7d0 [ 1790.191846][T22137] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1790.197407][T22137] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1790.203482][T22137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1790.209736][T22137] ? security_socket_sendmsg+0x8d/0xc0 [ 1790.215228][T22137] ? netlink_unicast+0x7d0/0x7d0 [ 1790.221510][T22137] sock_sendmsg+0xd7/0x130 [ 1790.225944][T22137] ____sys_sendmsg+0x358/0x880 [ 1790.230812][T22137] ? kernel_sendmsg+0x50/0x50 [ 1790.235503][T22137] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1790.241319][T22137] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1790.247502][T22137] ? find_held_lock+0x35/0x130 [ 1790.254383][T22137] ___sys_sendmsg+0x100/0x170 [ 1790.260262][T22137] ? sendmsg_copy_msghdr+0x70/0x70 [ 1790.265972][T22137] ? __kasan_check_read+0x11/0x20 [ 1790.271213][T22137] ? __might_fault+0x12b/0x1e0 [ 1790.276356][T22137] ? find_held_lock+0x35/0x130 [ 1790.281133][T22137] ? __might_fault+0x12b/0x1e0 [ 1790.285902][T22137] ? ksys_dup3+0x3e0/0x3e0 [ 1790.290325][T22137] ? lock_downgrade+0x920/0x920 [ 1790.295197][T22137] ? ___might_sleep+0x163/0x2c0 [ 1790.300057][T22137] __sys_sendmmsg+0x1bf/0x4d0 [ 1790.304745][T22137] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1790.309799][T22137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1790.316045][T22137] ? fput_many+0x12c/0x1a0 [ 1790.320472][T22137] ? fput+0x1b/0x20 [ 1790.324285][T22137] ? ksys_write+0x1cf/0x290 [ 1790.328807][T22137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1790.334277][T22137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1790.339746][T22137] ? do_syscall_64+0x26/0x790 [ 1790.344638][T22137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1790.350721][T22137] ? do_syscall_64+0x26/0x790 [ 1790.355416][T22137] __x64_sys_sendmmsg+0x9d/0x100 [ 1790.360372][T22137] do_syscall_64+0xfa/0x790 [ 1790.364891][T22137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1790.370796][T22137] RIP: 0033:0x45a6f9 00:23:32 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1790.374722][T22137] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1790.394941][T22137] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1790.403365][T22137] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1790.411349][T22137] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1790.419316][T22137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1790.419324][T22137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1790.419331][T22137] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:32 executing program 2 (fault-call:4 fault-nth:54): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1790.514886][T22162] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:23:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1790.701822][T22172] FAULT_INJECTION: forcing a failure. [ 1790.701822][T22172] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.723663][T22176] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1790.747490][T22172] CPU: 1 PID: 22172 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1790.756209][T22172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1790.766268][T22172] Call Trace: [ 1790.766293][T22172] dump_stack+0x197/0x210 [ 1790.766316][T22172] should_fail.cold+0xa/0x15 [ 1790.766338][T22172] ? fault_create_debugfs_attr+0x180/0x180 [ 1790.773949][T22172] __should_failslab+0x121/0x190 [ 1790.789908][T22172] should_failslab+0x9/0x14 [ 1790.794436][T22172] kmem_cache_alloc+0x47/0x710 [ 1790.799226][T22172] ? lock_acquire+0x190/0x410 [ 1790.803923][T22172] ? netlink_deliver_tap+0x146/0xbe0 [ 1790.809226][T22172] skb_clone+0x154/0x3d0 [ 1790.813491][T22172] netlink_deliver_tap+0x943/0xbe0 [ 1790.818630][T22172] netlink_unicast+0x643/0x7d0 [ 1790.823416][T22172] ? netlink_attachskb+0x870/0x870 [ 1790.828801][T22172] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1790.834598][T22172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1790.841152][T22172] ? __check_object_size+0x3d/0x437 [ 1790.846580][T22172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1790.852317][T22172] netlink_sendmsg+0x91c/0xea0 [ 1790.857301][T22172] ? netlink_unicast+0x7d0/0x7d0 [ 1790.862674][T22172] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1790.871374][T22172] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1790.876855][T22172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1790.883112][T22172] ? security_socket_sendmsg+0x8d/0xc0 [ 1790.888593][T22172] ? netlink_unicast+0x7d0/0x7d0 [ 1790.893562][T22172] sock_sendmsg+0xd7/0x130 [ 1790.897983][T22172] ____sys_sendmsg+0x358/0x880 [ 1790.902743][T22172] ? kernel_sendmsg+0x50/0x50 [ 1790.907412][T22172] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1790.912938][T22172] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1790.918905][T22172] ? find_held_lock+0x35/0x130 [ 1790.923656][T22172] ___sys_sendmsg+0x100/0x170 [ 1790.928330][T22172] ? sendmsg_copy_msghdr+0x70/0x70 [ 1790.933427][T22172] ? __kasan_check_read+0x11/0x20 [ 1790.938433][T22172] ? __might_fault+0x12b/0x1e0 [ 1790.943183][T22172] ? find_held_lock+0x35/0x130 [ 1790.947931][T22172] ? __might_fault+0x12b/0x1e0 [ 1790.952677][T22172] ? ksys_dup3+0x3e0/0x3e0 [ 1790.957095][T22172] ? lock_downgrade+0x920/0x920 [ 1790.962456][T22172] ? ___might_sleep+0x163/0x2c0 [ 1790.967309][T22172] __sys_sendmmsg+0x1bf/0x4d0 [ 1790.971972][T22172] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1790.977001][T22172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1790.983238][T22172] ? fput_many+0x12c/0x1a0 [ 1790.987650][T22172] ? fput+0x1b/0x20 [ 1790.991454][T22172] ? ksys_write+0x1cf/0x290 [ 1790.995958][T22172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1791.001442][T22172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1791.006895][T22172] ? do_syscall_64+0x26/0x790 [ 1791.011564][T22172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1791.017630][T22172] ? do_syscall_64+0x26/0x790 [ 1791.022312][T22172] __x64_sys_sendmmsg+0x9d/0x100 [ 1791.027234][T22172] do_syscall_64+0xfa/0x790 [ 1791.031728][T22172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1791.037613][T22172] RIP: 0033:0x45a6f9 [ 1791.041507][T22172] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1791.061099][T22172] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1791.069582][T22172] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1791.077828][T22172] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1791.085796][T22172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1791.093752][T22172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1791.101707][T22172] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) 00:23:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) 00:23:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:39 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:39 executing program 2 (fault-call:4 fault-nth:55): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1797.107329][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1797.118411][T22192] FAULT_INJECTION: forcing a failure. [ 1797.118411][T22192] name failslab, interval 1, probability 0, space 0, times 0 [ 1797.118433][T22192] CPU: 1 PID: 22192 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1797.118443][T22192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1797.118447][T22192] Call Trace: [ 1797.118468][T22192] dump_stack+0x197/0x210 [ 1797.118490][T22192] should_fail.cold+0xa/0x15 [ 1797.118513][T22192] ? fault_create_debugfs_attr+0x180/0x180 [ 1797.138556][T22199] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1797.139780][T22192] ? ___might_sleep+0x163/0x2c0 [ 1797.139801][T22192] __should_failslab+0x121/0x190 [ 1797.139822][T22192] should_failslab+0x9/0x14 [ 1797.191406][T22192] kmem_cache_alloc_node+0x268/0x740 [ 1797.196723][T22192] __alloc_skb+0xd5/0x5e0 [ 1797.201080][T22192] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1797.206700][T22192] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1797.212374][T22192] ? aa_sk_perm+0x346/0xaf0 [ 1797.216901][T22192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.223195][T22192] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1797.229460][T22192] netlink_sendmsg+0xa1b/0xea0 [ 1797.234262][T22192] ? netlink_unicast+0x7d0/0x7d0 [ 1797.239222][T22192] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1797.244857][T22192] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1797.250510][T22192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1797.256876][T22192] ? security_socket_sendmsg+0x8d/0xc0 [ 1797.263326][T22192] ? netlink_unicast+0x7d0/0x7d0 [ 1797.268807][T22192] sock_sendmsg+0xd7/0x130 [ 1797.273246][T22192] ____sys_sendmsg+0x358/0x880 [ 1797.278031][T22192] ? kernel_sendmsg+0x50/0x50 [ 1797.282727][T22192] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1797.288286][T22192] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1797.294278][T22192] ? find_held_lock+0x35/0x130 [ 1797.299068][T22192] ___sys_sendmsg+0x100/0x170 [ 1797.303762][T22192] ? sendmsg_copy_msghdr+0x70/0x70 [ 1797.308890][T22192] ? __kasan_check_read+0x11/0x20 [ 1797.313930][T22192] ? __might_fault+0x12b/0x1e0 [ 1797.318707][T22192] ? find_held_lock+0x35/0x130 [ 1797.323484][T22192] ? __might_fault+0x12b/0x1e0 [ 1797.324957][T22205] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1797.328256][T22192] ? ksys_dup3+0x3e0/0x3e0 [ 1797.328274][T22192] ? lock_downgrade+0x920/0x920 [ 1797.328300][T22192] ? ___might_sleep+0x163/0x2c0 [ 1797.328319][T22192] __sys_sendmmsg+0x1bf/0x4d0 00:23:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:39 executing program 3: socket$inet6(0xa, 0x80003, 0x6) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r0, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1797.328337][T22192] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1797.328367][T22192] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1797.367599][T22192] ? fput_many+0x12c/0x1a0 [ 1797.367614][T22192] ? fput+0x1b/0x20 [ 1797.367628][T22192] ? ksys_write+0x1cf/0x290 [ 1797.367646][T22192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1797.367659][T22192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1797.367672][T22192] ? do_syscall_64+0x26/0x790 [ 1797.367686][T22192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1797.367698][T22192] ? do_syscall_64+0x26/0x790 [ 1797.367717][T22192] __x64_sys_sendmmsg+0x9d/0x100 [ 1797.367735][T22192] do_syscall_64+0xfa/0x790 [ 1797.375943][T22192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1797.375956][T22192] RIP: 0033:0x45a6f9 [ 1797.375971][T22192] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1797.375977][T22192] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1797.375989][T22192] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1797.375997][T22192] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1797.376005][T22192] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1797.376012][T22192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1797.376020][T22192] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1797.536235][T22213] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:23:39 executing program 3: socket$inet6(0xa, 0x80003, 0x6) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r0, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:23:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1797.741997][T22225] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1797.757425][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:23:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:48 executing program 3: socket$inet6(0xa, 0x80003, 0x6) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r0, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) 00:23:48 executing program 2 (fault-call:4 fault-nth:56): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:48 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:23:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1806.440144][T22246] FAULT_INJECTION: forcing a failure. [ 1806.440144][T22246] name failslab, interval 1, probability 0, space 0, times 0 [ 1806.454978][T22249] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1806.467034][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1806.472096][T22246] CPU: 1 PID: 22246 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1806.486859][T22246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1806.496927][T22246] Call Trace: [ 1806.500230][T22246] dump_stack+0x197/0x210 [ 1806.504585][T22246] should_fail.cold+0xa/0x15 [ 1806.509201][T22246] ? fault_create_debugfs_attr+0x180/0x180 [ 1806.515036][T22246] __should_failslab+0x121/0x190 [ 1806.519992][T22246] should_failslab+0x9/0x14 [ 1806.524509][T22246] kmem_cache_alloc+0x47/0x710 [ 1806.529293][T22246] ? lock_acquire+0x190/0x410 [ 1806.533987][T22246] ? netlink_deliver_tap+0x146/0xbe0 00:23:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1806.539292][T22246] skb_clone+0x154/0x3d0 [ 1806.543554][T22246] netlink_deliver_tap+0x943/0xbe0 [ 1806.548693][T22246] netlink_unicast+0x643/0x7d0 [ 1806.553472][T22246] ? netlink_attachskb+0x870/0x870 [ 1806.558596][T22246] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1806.564244][T22246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1806.570496][T22246] ? __check_object_size+0x3d/0x437 [ 1806.575706][T22246] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1806.581444][T22246] netlink_sendmsg+0x91c/0xea0 [ 1806.586225][T22246] ? netlink_unicast+0x7d0/0x7d0 [ 1806.591177][T22246] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1806.594583][T22256] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1806.596733][T22246] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1806.596752][T22246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1806.596776][T22246] ? security_socket_sendmsg+0x8d/0xc0 [ 1806.596792][T22246] ? netlink_unicast+0x7d0/0x7d0 [ 1806.596811][T22246] sock_sendmsg+0xd7/0x130 [ 1806.633846][T22246] ____sys_sendmsg+0x358/0x880 00:23:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1806.638632][T22246] ? kernel_sendmsg+0x50/0x50 [ 1806.643336][T22246] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1806.648892][T22246] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1806.654882][T22246] ? find_held_lock+0x35/0x130 [ 1806.659699][T22246] ___sys_sendmsg+0x100/0x170 [ 1806.664393][T22246] ? sendmsg_copy_msghdr+0x70/0x70 [ 1806.669514][T22246] ? __kasan_check_read+0x11/0x20 [ 1806.674550][T22246] ? __might_fault+0x12b/0x1e0 [ 1806.679341][T22246] ? find_held_lock+0x35/0x130 [ 1806.684118][T22246] ? __might_fault+0x12b/0x1e0 [ 1806.688957][T22246] ? ksys_dup3+0x3e0/0x3e0 [ 1806.693393][T22246] ? lock_downgrade+0x920/0x920 [ 1806.698270][T22246] ? ___might_sleep+0x163/0x2c0 [ 1806.699423][T22262] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1806.703134][T22246] __sys_sendmmsg+0x1bf/0x4d0 [ 1806.703157][T22246] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1806.703190][T22246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1806.728468][T22246] ? fput_many+0x12c/0x1a0 [ 1806.732898][T22246] ? fput+0x1b/0x20 [ 1806.736730][T22246] ? ksys_write+0x1cf/0x290 00:23:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x0, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1806.741253][T22246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1806.746727][T22246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1806.753070][T22246] ? do_syscall_64+0x26/0x790 [ 1806.757782][T22246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1806.764645][T22246] ? do_syscall_64+0x26/0x790 [ 1806.769474][T22246] __x64_sys_sendmmsg+0x9d/0x100 [ 1806.774433][T22246] do_syscall_64+0xfa/0x790 [ 1806.778958][T22246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1806.784855][T22246] RIP: 0033:0x45a6f9 00:23:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1806.788764][T22246] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1806.807137][T22268] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1806.808629][T22246] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1806.808644][T22246] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1806.808653][T22246] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1806.808662][T22246] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1806.808671][T22246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1806.808677][T22246] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000140)=ANY=[@ANYRES64=r10], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r10, 0x0) 00:23:57 executing program 2 (fault-call:4 fault-nth:57): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:23:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:23:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:57 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1815.790535][T22289] FAULT_INJECTION: forcing a failure. [ 1815.790535][T22289] name failslab, interval 1, probability 0, space 0, times 0 [ 1815.822779][T22289] CPU: 1 PID: 22289 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1815.831552][T22289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1815.841720][T22289] Call Trace: [ 1815.845036][T22289] dump_stack+0x197/0x210 [ 1815.846922][T22299] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1815.849383][T22289] should_fail.cold+0xa/0x15 [ 1815.849404][T22289] ? fault_create_debugfs_attr+0x180/0x180 [ 1815.849424][T22289] ? ___might_sleep+0x163/0x2c0 [ 1815.862228][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1815.864004][T22289] __should_failslab+0x121/0x190 [ 1815.864023][T22289] should_failslab+0x9/0x14 [ 1815.864041][T22289] kmem_cache_alloc_node+0x268/0x740 [ 1815.902171][T22289] __alloc_skb+0xd5/0x5e0 [ 1815.906614][T22289] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1815.912172][T22289] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1815.917827][T22289] ? aa_sk_perm+0x346/0xaf0 [ 1815.922351][T22289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.928610][T22289] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1815.934873][T22289] netlink_sendmsg+0xa1b/0xea0 [ 1815.939659][T22289] ? netlink_unicast+0x7d0/0x7d0 [ 1815.944874][T22289] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1815.950526][T22289] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1815.955997][T22289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.962252][T22289] ? security_socket_sendmsg+0x8d/0xc0 [ 1815.967728][T22289] ? netlink_unicast+0x7d0/0x7d0 [ 1815.972682][T22289] sock_sendmsg+0xd7/0x130 [ 1815.977114][T22289] ____sys_sendmsg+0x358/0x880 [ 1815.981895][T22289] ? kernel_sendmsg+0x50/0x50 [ 1815.986584][T22289] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1815.992160][T22289] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1815.998154][T22289] ? find_held_lock+0x35/0x130 [ 1816.002962][T22289] ___sys_sendmsg+0x100/0x170 [ 1816.007652][T22289] ? sendmsg_copy_msghdr+0x70/0x70 [ 1816.012785][T22289] ? __kasan_check_read+0x11/0x20 [ 1816.018092][T22289] ? __might_fault+0x12b/0x1e0 [ 1816.022872][T22289] ? find_held_lock+0x35/0x130 [ 1816.027654][T22289] ? __might_fault+0x12b/0x1e0 [ 1816.032421][T22289] ? ksys_dup3+0x3e0/0x3e0 [ 1816.036848][T22289] ? lock_downgrade+0x920/0x920 00:23:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x02\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:23:58 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1816.041730][T22289] ? ___might_sleep+0x163/0x2c0 [ 1816.046598][T22289] __sys_sendmmsg+0x1bf/0x4d0 [ 1816.051288][T22289] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1816.056343][T22289] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1816.062584][T22289] ? fput_many+0x12c/0x1a0 [ 1816.066994][T22289] ? fput+0x1b/0x20 [ 1816.067007][T22289] ? ksys_write+0x1cf/0x290 [ 1816.067024][T22289] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1816.067036][T22289] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1816.067050][T22289] ? do_syscall_64+0x26/0x790 [ 1816.067064][T22289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1816.067076][T22289] ? do_syscall_64+0x26/0x790 [ 1816.067097][T22289] __x64_sys_sendmmsg+0x9d/0x100 [ 1816.067113][T22289] do_syscall_64+0xfa/0x790 [ 1816.067131][T22289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1816.067141][T22289] RIP: 0033:0x45a6f9 [ 1816.067158][T22289] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1816.112594][T22289] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1816.112609][T22289] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1816.112618][T22289] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1816.112627][T22289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1816.112640][T22289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1816.139011][T22307] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1816.143331][T22289] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:23:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x03\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:23:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:23:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1816.453876][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1816.474130][T22329] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:05 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:05 executing program 2 (fault-call:4 fault-nth:58): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:24:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x04\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:05 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1823.094064][T22342] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1823.148035][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1823.161042][T22345] FAULT_INJECTION: forcing a failure. [ 1823.161042][T22345] name failslab, interval 1, probability 0, space 0, times 0 [ 1823.182011][T22345] CPU: 1 PID: 22345 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 00:24:05 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1823.191513][T22345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.201756][T22345] Call Trace: [ 1823.205168][T22345] dump_stack+0x197/0x210 [ 1823.209524][T22345] should_fail.cold+0xa/0x15 [ 1823.214146][T22345] ? fault_create_debugfs_attr+0x180/0x180 [ 1823.219974][T22345] ? ___might_sleep+0x163/0x2c0 [ 1823.224855][T22345] __should_failslab+0x121/0x190 [ 1823.228422][T22350] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1823.229814][T22345] should_failslab+0x9/0x14 00:24:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1823.229835][T22345] kmem_cache_alloc_node+0x268/0x740 [ 1823.249916][T22345] __alloc_skb+0xd5/0x5e0 [ 1823.254635][T22345] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1823.260384][T22345] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1823.266991][T22345] ? aa_sk_perm+0x346/0xaf0 [ 1823.272329][T22345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.278599][T22345] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1823.284880][T22345] netlink_sendmsg+0xa1b/0xea0 [ 1823.290284][T22345] ? netlink_unicast+0x7d0/0x7d0 [ 1823.295240][T22345] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1823.301096][T22345] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1823.306583][T22345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.312844][T22345] ? security_socket_sendmsg+0x8d/0xc0 [ 1823.318510][T22345] ? netlink_unicast+0x7d0/0x7d0 [ 1823.323568][T22345] sock_sendmsg+0xd7/0x130 [ 1823.328183][T22345] ____sys_sendmsg+0x358/0x880 [ 1823.331231][T22354] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1823.332978][T22345] ? kernel_sendmsg+0x50/0x50 00:24:05 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1823.332999][T22345] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1823.352478][T22345] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1823.359013][T22345] ? find_held_lock+0x35/0x130 [ 1823.363948][T22345] ___sys_sendmsg+0x100/0x170 [ 1823.368653][T22345] ? sendmsg_copy_msghdr+0x70/0x70 [ 1823.373799][T22345] ? __kasan_check_read+0x11/0x20 [ 1823.378933][T22345] ? __might_fault+0x12b/0x1e0 [ 1823.383714][T22345] ? find_held_lock+0x35/0x130 [ 1823.388492][T22345] ? __might_fault+0x12b/0x1e0 [ 1823.393411][T22345] ? ksys_dup3+0x3e0/0x3e0 [ 1823.397875][T22345] ? lock_downgrade+0x920/0x920 [ 1823.403019][T22345] ? ___might_sleep+0x163/0x2c0 [ 1823.408407][T22345] __sys_sendmmsg+0x1bf/0x4d0 [ 1823.413121][T22345] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1823.418183][T22345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1823.424437][T22345] ? fput_many+0x12c/0x1a0 [ 1823.428868][T22345] ? fput+0x1b/0x20 [ 1823.432687][T22345] ? ksys_write+0x1cf/0x290 [ 1823.436395][T22358] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1823.437193][T22345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1823.437213][T22345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1823.457488][T22345] ? do_syscall_64+0x26/0x790 [ 1823.462288][T22345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1823.468370][T22345] ? do_syscall_64+0x26/0x790 [ 1823.473069][T22345] __x64_sys_sendmmsg+0x9d/0x100 [ 1823.478031][T22345] do_syscall_64+0xfa/0x790 [ 1823.482562][T22345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1823.488463][T22345] RIP: 0033:0x45a6f9 [ 1823.492365][T22345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1823.511978][T22345] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1823.520406][T22345] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1823.528566][T22345] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1823.530453][T22360] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1823.536558][T22345] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1823.536567][T22345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1823.536575][T22345] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:24:12 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:12 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0b") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x05\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:12 executing program 2 (fault-call:4 fault-nth:59): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:24:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1830.280605][T22381] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1830.322286][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1830.339216][T22386] FAULT_INJECTION: forcing a failure. [ 1830.339216][T22386] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.367729][T22386] CPU: 1 PID: 22386 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1830.376457][T22386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.386520][T22386] Call Trace: [ 1830.389826][T22386] dump_stack+0x197/0x210 [ 1830.394181][T22386] should_fail.cold+0xa/0x15 [ 1830.398796][T22386] ? fault_create_debugfs_attr+0x180/0x180 [ 1830.404628][T22386] __should_failslab+0x121/0x190 [ 1830.409583][T22386] should_failslab+0x9/0x14 [ 1830.414104][T22386] kmem_cache_alloc+0x47/0x710 [ 1830.418990][T22386] ? lock_acquire+0x190/0x410 [ 1830.423682][T22386] ? netlink_deliver_tap+0x146/0xbe0 [ 1830.424274][T22393] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1830.428983][T22386] skb_clone+0x154/0x3d0 [ 1830.429006][T22386] netlink_deliver_tap+0x943/0xbe0 [ 1830.429026][T22386] netlink_unicast+0x643/0x7d0 [ 1830.429046][T22386] ? netlink_attachskb+0x870/0x870 [ 1830.429059][T22386] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1830.429073][T22386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 00:24:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1830.429087][T22386] ? __check_object_size+0x3d/0x437 [ 1830.429106][T22386] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1830.480731][T22386] netlink_sendmsg+0x91c/0xea0 [ 1830.485515][T22386] ? netlink_unicast+0x7d0/0x7d0 [ 1830.490465][T22386] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1830.496030][T22386] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1830.501594][T22386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.507846][T22386] ? security_socket_sendmsg+0x8d/0xc0 [ 1830.507864][T22386] ? netlink_unicast+0x7d0/0x7d0 [ 1830.507879][T22386] sock_sendmsg+0xd7/0x130 [ 1830.507895][T22386] ____sys_sendmsg+0x358/0x880 [ 1830.507917][T22386] ? kernel_sendmsg+0x50/0x50 [ 1830.507932][T22386] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1830.507945][T22386] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1830.507962][T22386] ? find_held_lock+0x35/0x130 [ 1830.527506][T22386] ___sys_sendmsg+0x100/0x170 [ 1830.527525][T22386] ? sendmsg_copy_msghdr+0x70/0x70 [ 1830.527541][T22386] ? __kasan_check_read+0x11/0x20 [ 1830.527557][T22386] ? __might_fault+0x12b/0x1e0 [ 1830.527577][T22386] ? find_held_lock+0x35/0x130 00:24:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe847") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1830.558475][T22396] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1830.563773][T22386] ? __might_fault+0x12b/0x1e0 [ 1830.563790][T22386] ? ksys_dup3+0x3e0/0x3e0 [ 1830.563808][T22386] ? lock_downgrade+0x920/0x920 [ 1830.563836][T22386] ? ___might_sleep+0x163/0x2c0 [ 1830.601571][T22386] __sys_sendmmsg+0x1bf/0x4d0 [ 1830.606268][T22386] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1830.611326][T22386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1830.617575][T22386] ? fput_many+0x12c/0x1a0 [ 1830.622000][T22386] ? fput+0x1b/0x20 [ 1830.625810][T22386] ? ksys_write+0x1cf/0x290 [ 1830.625829][T22386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1830.625844][T22386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1830.625857][T22386] ? do_syscall_64+0x26/0x790 [ 1830.625871][T22386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1830.625884][T22386] ? do_syscall_64+0x26/0x790 [ 1830.625903][T22386] __x64_sys_sendmmsg+0x9d/0x100 [ 1830.625918][T22386] do_syscall_64+0xfa/0x790 [ 1830.625936][T22386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1830.635864][T22386] RIP: 0033:0x45a6f9 [ 1830.635879][T22386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1830.635886][T22386] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1830.635898][T22386] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1830.635905][T22386] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 00:24:12 executing program 2 (fault-call:4 fault-nth:60): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:24:12 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x06\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1830.635912][T22386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1830.635919][T22386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1830.635926][T22386] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 [ 1830.794128][T22406] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1830.850935][T22412] FAULT_INJECTION: forcing a failure. [ 1830.850935][T22412] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.920730][T22412] CPU: 1 PID: 22412 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1830.929480][T22412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.939550][T22412] Call Trace: [ 1830.942859][T22412] dump_stack+0x197/0x210 [ 1830.947215][T22412] should_fail.cold+0xa/0x15 [ 1830.951831][T22412] ? fault_create_debugfs_attr+0x180/0x180 [ 1830.957665][T22412] __should_failslab+0x121/0x190 [ 1830.962633][T22412] should_failslab+0x9/0x14 [ 1830.967162][T22412] kmem_cache_alloc+0x47/0x710 [ 1830.972090][T22412] ? lock_acquire+0x190/0x410 [ 1830.976793][T22412] ? netlink_deliver_tap+0x146/0xbe0 [ 1830.982117][T22412] skb_clone+0x154/0x3d0 [ 1830.986383][T22412] netlink_deliver_tap+0x943/0xbe0 [ 1830.991536][T22412] netlink_unicast+0x643/0x7d0 [ 1830.996830][T22412] ? netlink_attachskb+0x870/0x870 [ 1830.996848][T22412] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1830.996863][T22412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1830.996877][T22412] ? __check_object_size+0x3d/0x437 [ 1830.996889][T22412] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1830.996909][T22412] netlink_sendmsg+0x91c/0xea0 [ 1830.996932][T22412] ? netlink_unicast+0x7d0/0x7d0 [ 1830.996947][T22412] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1830.996965][T22412] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1830.996980][T22412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.996993][T22412] ? security_socket_sendmsg+0x8d/0xc0 [ 1830.997006][T22412] ? netlink_unicast+0x7d0/0x7d0 [ 1830.997021][T22412] sock_sendmsg+0xd7/0x130 [ 1830.997037][T22412] ____sys_sendmsg+0x358/0x880 [ 1830.997060][T22412] ? kernel_sendmsg+0x50/0x50 [ 1831.007814][T22412] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1831.007828][T22412] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1831.007841][T22412] ? find_held_lock+0x35/0x130 [ 1831.007870][T22412] ___sys_sendmsg+0x100/0x170 [ 1831.007888][T22412] ? sendmsg_copy_msghdr+0x70/0x70 [ 1831.007904][T22412] ? __kasan_check_read+0x11/0x20 [ 1831.007921][T22412] ? __might_fault+0x12b/0x1e0 [ 1831.007933][T22412] ? find_held_lock+0x35/0x130 [ 1831.007947][T22412] ? __might_fault+0x12b/0x1e0 [ 1831.007962][T22412] ? ksys_dup3+0x3e0/0x3e0 [ 1831.007977][T22412] ? lock_downgrade+0x920/0x920 [ 1831.008001][T22412] ? ___might_sleep+0x163/0x2c0 [ 1831.046497][T22412] __sys_sendmmsg+0x1bf/0x4d0 [ 1831.046518][T22412] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1831.046551][T22412] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1831.046571][T22412] ? fput_many+0x12c/0x1a0 [ 1831.158009][T22412] ? fput+0x1b/0x20 [ 1831.161828][T22412] ? ksys_write+0x1cf/0x290 [ 1831.166350][T22412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1831.171905][T22412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1831.177384][T22412] ? do_syscall_64+0x26/0x790 [ 1831.182063][T22412] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1831.188159][T22412] ? do_syscall_64+0x26/0x790 [ 1831.192867][T22412] __x64_sys_sendmmsg+0x9d/0x100 [ 1831.197888][T22412] do_syscall_64+0xfa/0x790 [ 1831.202413][T22412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1831.208573][T22412] RIP: 0033:0x45a6f9 [ 1831.212618][T22412] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1831.232403][T22412] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1831.240835][T22412] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1831.248801][T22412] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1831.256937][T22412] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1831.264906][T22412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1831.272996][T22412] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:24:21 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:21 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\a\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:21 executing program 2 (fault-call:4 fault-nth:61): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:24:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x0) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1839.565512][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1839.590955][T22433] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1839.601795][T22431] FAULT_INJECTION: forcing a failure. [ 1839.601795][T22431] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.630116][T22431] CPU: 1 PID: 22431 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1839.638831][T22431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1839.648894][T22431] Call Trace: [ 1839.652200][T22431] dump_stack+0x197/0x210 [ 1839.656557][T22431] should_fail.cold+0xa/0x15 [ 1839.661171][T22431] ? fault_create_debugfs_attr+0x180/0x180 [ 1839.666997][T22431] ? ___might_sleep+0x163/0x2c0 [ 1839.671877][T22431] __should_failslab+0x121/0x190 00:24:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\b\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1839.676831][T22431] should_failslab+0x9/0x14 [ 1839.681346][T22431] kmem_cache_alloc_node+0x268/0x740 [ 1839.686755][T22431] __alloc_skb+0xd5/0x5e0 [ 1839.691101][T22431] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1839.696658][T22431] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1839.702300][T22431] ? aa_sk_perm+0x346/0xaf0 [ 1839.706822][T22431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.713267][T22431] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1839.719506][T22431] netlink_sendmsg+0xa1b/0xea0 [ 1839.719529][T22431] ? netlink_unicast+0x7d0/0x7d0 [ 1839.719548][T22431] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1839.719570][T22431] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1839.740335][T22431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.747024][T22431] ? security_socket_sendmsg+0x8d/0xc0 [ 1839.752500][T22431] ? netlink_unicast+0x7d0/0x7d0 [ 1839.757455][T22431] sock_sendmsg+0xd7/0x130 [ 1839.761901][T22431] ____sys_sendmsg+0x358/0x880 [ 1839.766659][T22431] ? kernel_sendmsg+0x50/0x50 [ 1839.766674][T22431] ? rcu_read_lock_sched_held+0x9c/0xd0 00:24:21 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1839.766687][T22431] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1839.766699][T22431] ? find_held_lock+0x35/0x130 [ 1839.766722][T22431] ___sys_sendmsg+0x100/0x170 [ 1839.766738][T22431] ? sendmsg_copy_msghdr+0x70/0x70 [ 1839.766757][T22431] ? __kasan_check_read+0x11/0x20 [ 1839.802599][T22431] ? __might_fault+0x12b/0x1e0 [ 1839.805096][T22444] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1839.807478][T22431] ? find_held_lock+0x35/0x130 [ 1839.807494][T22431] ? __might_fault+0x12b/0x1e0 [ 1839.807509][T22431] ? ksys_dup3+0x3e0/0x3e0 [ 1839.807537][T22431] ? lock_downgrade+0x920/0x920 [ 1839.835560][T22431] ? ___might_sleep+0x163/0x2c0 [ 1839.835580][T22431] __sys_sendmmsg+0x1bf/0x4d0 [ 1839.835598][T22431] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1839.835630][T22431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1839.857060][T22431] ? fput_many+0x12c/0x1a0 [ 1839.861488][T22431] ? fput+0x1b/0x20 [ 1839.865315][T22431] ? ksys_write+0x1cf/0x290 [ 1839.869829][T22431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1839.869844][T22431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1839.869863][T22431] ? do_syscall_64+0x26/0x790 [ 1839.885462][T22431] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1839.891544][T22431] ? do_syscall_64+0x26/0x790 [ 1839.896242][T22431] __x64_sys_sendmmsg+0x9d/0x100 [ 1839.901194][T22431] do_syscall_64+0xfa/0x790 [ 1839.905711][T22431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1839.911606][T22431] RIP: 0033:0x45a6f9 00:24:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe84740") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1839.915502][T22431] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1839.935144][T22431] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1839.943572][T22431] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1839.951573][T22431] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1839.959556][T22431] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1839.967543][T22431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 00:24:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00H\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1839.975526][T22431] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:24:22 executing program 2 (fault-call:4 fault-nth:62): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 1840.109439][T22459] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1840.144382][T22461] FAULT_INJECTION: forcing a failure. [ 1840.144382][T22461] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.211302][T22461] CPU: 1 PID: 22461 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1840.220012][T22461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1840.230097][T22461] Call Trace: [ 1840.233410][T22461] dump_stack+0x197/0x210 [ 1840.237767][T22461] should_fail.cold+0xa/0x15 [ 1840.242380][T22461] ? fault_create_debugfs_attr+0x180/0x180 [ 1840.248201][T22461] ? ___might_sleep+0x163/0x2c0 [ 1840.253070][T22461] __should_failslab+0x121/0x190 [ 1840.258024][T22461] should_failslab+0x9/0x14 [ 1840.262550][T22461] kmem_cache_alloc_node_trace+0x274/0x750 [ 1840.268356][T22461] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1840.274332][T22461] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1840.280145][T22461] __kmalloc_node_track_caller+0x3d/0x70 [ 1840.285774][T22461] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1840.291147][T22461] __alloc_skb+0x10b/0x5e0 [ 1840.295557][T22461] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1840.301092][T22461] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1840.306724][T22461] ? aa_sk_perm+0x346/0xaf0 [ 1840.311236][T22461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.317473][T22461] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 1840.323813][T22461] netlink_sendmsg+0xa1b/0xea0 [ 1840.328579][T22461] ? netlink_unicast+0x7d0/0x7d0 [ 1840.333511][T22461] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1840.339052][T22461] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1840.344519][T22461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.350757][T22461] ? security_socket_sendmsg+0x8d/0xc0 [ 1840.356226][T22461] ? netlink_unicast+0x7d0/0x7d0 [ 1840.361160][T22461] sock_sendmsg+0xd7/0x130 [ 1840.365569][T22461] ____sys_sendmsg+0x358/0x880 [ 1840.370331][T22461] ? kernel_sendmsg+0x50/0x50 [ 1840.375007][T22461] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1840.380548][T22461] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1840.386521][T22461] ? find_held_lock+0x35/0x130 [ 1840.391290][T22461] ___sys_sendmsg+0x100/0x170 [ 1840.395965][T22461] ? sendmsg_copy_msghdr+0x70/0x70 [ 1840.401076][T22461] ? __kasan_check_read+0x11/0x20 [ 1840.406103][T22461] ? __might_fault+0x12b/0x1e0 [ 1840.410874][T22461] ? find_held_lock+0x35/0x130 [ 1840.415629][T22461] ? __might_fault+0x12b/0x1e0 [ 1840.420390][T22461] ? ksys_dup3+0x3e0/0x3e0 [ 1840.424806][T22461] ? lock_downgrade+0x920/0x920 [ 1840.429670][T22461] ? ___might_sleep+0x163/0x2c0 [ 1840.434520][T22461] __sys_sendmmsg+0x1bf/0x4d0 [ 1840.439194][T22461] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1840.444233][T22461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1840.450577][T22461] ? fput_many+0x12c/0x1a0 [ 1840.454989][T22461] ? fput+0x1b/0x20 [ 1840.458789][T22461] ? ksys_write+0x1cf/0x290 [ 1840.463288][T22461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1840.468752][T22461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1840.474208][T22461] ? do_syscall_64+0x26/0x790 [ 1840.478887][T22461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1840.484944][T22461] ? do_syscall_64+0x26/0x790 [ 1840.489623][T22461] __x64_sys_sendmmsg+0x9d/0x100 [ 1840.494559][T22461] do_syscall_64+0xfa/0x790 [ 1840.499076][T22461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1840.504959][T22461] RIP: 0033:0x45a6f9 [ 1840.508856][T22461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1840.528450][T22461] RSP: 002b:00007fe2b8431c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1840.536855][T22461] RAX: ffffffffffffffda RBX: 00007fe2b8431c90 RCX: 000000000045a6f9 [ 1840.544816][T22461] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1840.552781][T22461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1840.560755][T22461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe2b84326d4 [ 1840.568727][T22461] R13: 00000000004c906c R14: 00000000004e0c80 R15: 0000000000000005 00:24:30 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:30 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00L\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:30 executing program 2 (fault-call:4 fault-nth:63): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:24:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1848.132178][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 00:24:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00h\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:30 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:30 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:30 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2, 0x0) 00:24:37 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00l\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x3, 0x0) 00:24:37 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:24:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4, 0x0) [ 1855.416814][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00t\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:37 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x0, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:37 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x5, 0x0) 00:24:37 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:46 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00z\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x6, 0x0) 00:24:46 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x0, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:24:46 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x7, 0x0) [ 1864.687674][T22576] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1864.690292][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:24:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x03', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:47 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x0, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:47 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x8, 0x0) [ 1864.969583][T22596] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1865.168814][T22608] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:56 executing program 5: 00:24:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x9, 0x0) 00:24:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x05', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:56 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x10, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:24:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xa, 0x0) [ 1873.953094][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1873.982912][T22626] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:24:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x06', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:24:56 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x10, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:24:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) shutdown(r1, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1874.196375][T22640] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:24:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xb, 0x0) [ 1874.376200][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:00 executing program 5: 00:25:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xc, 0x0) 00:25:00 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x10, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:25:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\a', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) r5 = socket(0x11, 0x4000000000080002, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r5, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r7}, 0x80, 0x0}}], 0x1, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r8 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xd, 0x0) [ 1878.196040][T22673] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1878.212876][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040), 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:25:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x89\x16', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:00 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xe, 0x0) [ 1878.382487][T22690] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:25:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040), 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 1878.601667][T22707] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:25:04 executing program 5: 00:25:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) shutdown(r1, 0x0) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00?', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xf, 0x0) 00:25:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040), 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:25:04 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1882.344429][T22722] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1882.357224][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00@', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x10, 0x0) 00:25:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(0xffffffffffffffff, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:25:04 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00H', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(0xffffffffffffffff, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:25:08 executing program 5: r0 = socket(0x2, 0x8002, 0x0) connect$unix(r0, &(0x7f0000000d80)=ANY=[@ANYBLOB="8202adfdffffffffffffff653000463f7b238a2a197a386207000000008295955984c87900bf453f68c11700287ed30bcb777fa69dfceac2a84e6abca64896bc5e57c6360bcd4c0a162b58fd4237b8fa4d012ae447472b3e8495aaee48c02f6abf1e6bf3bf554799b9f213ad30505e9b0000a49fef9d612f87a5c5fe65baa202361cd8cac7dbac5b65c6593d2870bc122cd2350000000000000000000000000000000000ff0100000000000021d3204028adb1ff1afb37ec4305642ad2cf8724eb18089278e314330000000000000000000000e02b05e5d12f524ab2aa8cc7712a2b279dbff4b7b46564ef560026e969c9341589ac85cab1a4c6b41dccf137c8ae135db3119e911c3b94484c692cac607b1c26455bedfb9c9f35f23d1aa551dff7744123053ff03d92533341d85544cd1cfd0b34aa3fc1611cc665840ea3b1e39af6206b1f007bf8f244ff010000000000000906000000ec895c4784f63b0ba02e9768a8b36d05c2b819777a972cda526e4049c89da05a0a414c6394359a0000000000c5906c074cf888981d4e22265367027548d8ffda5eb1152f6b60afa3393fc23442dc9631d64bcd5b823e495bb171672365f9025ac16e369633d89aac22e7c3daf733f9a509da7f66d0c7598f54a53f5e773e35d0d6bc372d1a8ff42aa3cdc2e80eff000000000000003f5a659255490b88ff1bf33436e6731ad3574d79be64d7a570715f68932de75cc53ec316484d3e4132dee58554fdac1bfa4aca2c3ebed7ad1bd9da569f770ddbf463c687e75f6a28b7f09126efe6c2d6ad126358a2bf7eb6652c52476b0f4a1fc0c7ee2e61ac5538254b916042575a9603e929cc5b030087c08f6f7c1013f89d3bd1f11b9dd8c3e5afc074c1861cebe415fa2cfdee2e52bf897cc2330000000000000004751b76b6c98bf0d9f371e916fc7b88c013c7381f77d036b0233aca38bc8789d05f77e9f616eb7246be9389e32be26a498d0ce05a3852a1cb4338f3bfee17a07001520dd24c70916b23a8b086c43633a42e93fe75f8a85f37ee8c3f120c000001007c1f1dbea0d7ce9a02edf26e82fcca1e245a58d78b79dc3b93720fa7885824e119dc4c67c825898793cd22ce392c3c965d0fc950eb6fcd3be43a9578a2793c3f1253654f503adf2f3b4affd04d710180b8bbca8854747213442d720dac635800236b272dd10000009d5e3da04cfbb073654c94798428f933becdfff903ad0000ac7557c99a8ea296f8f93ddc76bf621af687923ec91aed6cb55ad71e211058b6b187190f4287f30056f0eca629d0162d03821b117c90841ea6147ce522005f96566eaab012083d8597e92269a7d09c1048d54e3fe2c38b66b4d7e28272aee313f431ebf190de01bbb11a2c979c4543f9000000df395e367a8807e37779cb60ff7fb71682d1a247d5d2b5afc600000000000000009c42bdbe3f267105d1d6654c4dcc8faa9a9956d9a018ce494de290673b40ddb1ae4ea610e2f6d9d55b434e8e41a077c0889b4d873318f832941ed130ec8be79ab4cea21b83e2f6ec1abdc4a29f701d87d5774af91f12417cefc944bd0ef51ae20a4953180699a3fb309081a2bc4b1a793cd93a3b71d50f63806988f7cafeb77065abd6a28adb18a80382aa25271ba8c524b9fb93a8cb1d63d56a2c166b77d02b04942da17ccf1b22cd1a19dece6dd1054a1e73261e995ea7277a21401659ffb2c9eb72d97b27deb0a1a31822c2c70b4a65fbc89f35183bcedc712dca03d04484f7cdaa3b2f6f1b6473f75872cf9394abb7dde75d6d91cbda4743a7f32138a1767852556f3bf92bb72680802ac5c54502ecef9bf693c7089b45c183f7cf7a824794a9b53ca29b4c0a049393d7d5ff1035cd8ac01be2234a87fe6d9f2b9ac401296ff99680b68dcaf19373a88b187f0772332b13f9a3d9200b375aac13ef5271376cd24cbe66b9872ed9f1cb5aa9b61db8f8c00d8490cd9d29e1e7918130cc8adfab194526ef3d94d017608f0af762f9a091d8c32434be973fb1bfeeb0b678a1da248e3077a8eadcfb825dcd595149aed62e7e7b57c9691182f577e27ab8c0db3e5cfd3587bd15af7146d722597d018ef56aa51aa0d75a3e9095a3a98a55bc74ef9b305876a976b77a03daba19e68bbff84b1f7d92b2fef98798aa3c31e326c5455ba670150fd0c92c73f242f4a214ad81610e740f313b9a1686befcbb23c50ab925cbc02cefae3a145f2d70d1443161c0fdc08359e6c5e9a51d905731223cd28d9f4c6d087f5eb3c7f166031313894d328973edb324885c145c584ecdba342b777a0354bf4001fbabf6512fe6edfbb1c39597d06627241477a2164f680c70a964f9c4380fd728a9ad2f860000000000000000cc98413dee260c8a15e3b6509e25389a70d45771af9f1013ea749ee1f7d38ba398fd1583f6b1b54c1b04c58ebaf3d914d59d1ce0db0938b8bca21e65fb4f1398351f858847281f9d54d1d6f47ef7f29cee9beea95373111d251c4a6924d0f5daef42530402da223bc69585fc33ffb92ee32ee085c8f4968906d34f1fd011f26940868a7a6ba63610fe6c243b14c058c9a2bb"], 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000024c0)="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", 0x599}], 0x1) 00:25:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) shutdown(r1, 0x0) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x11, 0x0) 00:25:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(0xffffffffffffffff, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:25:08 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00L', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1886.515005][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, 0x0, 0x0) 00:25:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x12, 0x0) 00:25:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00h', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:08 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x13, 0x0) 00:25:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, 0x0, 0x0) 00:25:15 executing program 5: unshare(0x6c060000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xfffffeee}], 0x1, &(0x7f0000000200)=""/20, 0x5, 0x3e8}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 00:25:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) socket(0x11, 0x800000003, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:15 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, 0x0, 0x0) 00:25:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x2) 00:25:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00l', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:15 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:16 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc), 0x0) [ 1893.847364][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:16 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3) 00:25:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00t', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:16 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:16 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc), 0x0) 00:25:16 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4) [ 1900.044083][T22856] IPVS: ftp: loaded support on port[0] = 21 00:25:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14, 0x0, 0x19, 0x203}, 0xbb}}, 0x0) 00:25:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00z', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc), 0x0) 00:25:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5) 00:25:25 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x16\x89', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00", 0x12) [ 1903.269046][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:25 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6) 00:25:25 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1903.395738][T15916] tipc: TX() has been purged, node left! 00:25:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00", 0x12) 00:25:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) shutdown(r1, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1903.689821][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\xff', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) shutdown(r1, 0x0) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8) 00:25:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00", 0x12) 00:25:32 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x0, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) shutdown(r1, 0x0) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffff", 0x1b) 00:25:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x9) [ 1910.458472][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:32 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa) 00:25:32 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffff", 0x1b) 00:25:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) syz_init_net_socket$netrom(0x6, 0x5, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:32 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x0, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1910.877685][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) shutdown(r1, 0x0) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:41 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb) 00:25:41 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffff", 0x1b) 00:25:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) shutdown(r1, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:41 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x0, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff08000000", 0x20) 00:25:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc) [ 1919.831466][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:42 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff08000000", 0x20) 00:25:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) shutdown(r1, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe) [ 1920.234432][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) shutdown(r1, 0x0) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff08000000", 0x20) 00:25:51 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:25:51 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf) 00:25:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:51 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x10) [ 1929.079108][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff080000000000", 0x22) 00:25:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff080000000000", 0x22) 00:25:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:25:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:25:51 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x11) [ 1929.433664][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:00 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:00 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff080000000000", 0x22) 00:26:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x12) 00:26:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1938.449499][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff08000000000000", 0x23) 00:26:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:00 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x13) 00:26:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:00 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff08000000000000", 0x23) [ 1938.777169][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:07 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x14) 00:26:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff08000000000000", 0x23) 00:26:07 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fedbdf2513000000cc00010024000200080004000400000008000200ffff0000080003000800000008000400ed6600000c0002000800010002000000100001006574683a726f7365300000000c00010069623a6e0001000a004e200000000600000000000000000000ffff00000000fbffffff200002000a004e2200002fabff0200000000000000000000000000010900000038000400200001000a004e2300000007fe800000000000000000000000000015030000001400020002004e217f00000100000000000000000400010014000600040002000400020008000100a600000014000600080001000100000004000200040002008fe5f5ad0c9e55c176a8cd40fdb91bdd932889290fea961672bbad8a915f12762863ce9b1e78a3391e5f1292abe859942343a7666296a6b5340f2cd962fd45185d475c5c2562cbf2d409e57171fe757dea1425145f7340e173d5e719a61e0ed90f41ba860331d6eed4a8d2e29b8aa466b634e931cc7f09"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) socket$inet6(0xa, 0x3, 0x6b) socket(0x11, 0x4000000000080002, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) shutdown(r1, 0x0) shutdown(r1, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1945.672013][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:07 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x30) 00:26:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:08 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 1945.868408][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:08 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x60) [ 1946.032603][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:14 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:14 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:14 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc0) 00:26:14 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:15 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1952.896105][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0) 00:26:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:15 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x205) 00:26:15 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1953.277454][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:24 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x300) 00:26:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:24 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x10, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 1962.181675][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:24 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x331) 00:26:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) shutdown(r1, 0x0) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:24 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x500) [ 1962.524862][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:33 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:33 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x502) 00:26:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) socket(0x0, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x600) [ 1971.502680][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:33 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x900) 00:26:33 executing program 3: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x500) [ 1971.778769][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000540)={{0x7fffffff, 0x1}, 0x4}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000500)=0x6, 0x8) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000885}, 0x10) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) r5 = socket$inet6(0xa, 0x3, 0x6b) r6 = socket(0x11, 0x4000000000080002, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmmsg$sock(r6, &(0x7f0000005640)=[{{&(0x7f00000000c0)=@hci={0x1f, r8}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x1, 0x200, r8}) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000600)={0x0, @nfc={0x27, 0x0, 0x1, 0x3}, @can={0x1d, r8}, @generic={0xa, "5ee8335d4b48c97329dd3faa464e"}, 0x8001, 0x0, 0x0, 0x0, 0xfff, &(0x7f00000005c0)='vlan0\x00', 0xc000000000000000, 0xff, 0x6}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r9 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r9, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:42 executing program 3: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x5, 0x0) 00:26:42 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:42 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa00) [ 1980.831577][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\xff\xff', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:43 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb00) 00:26:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:43 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:43 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc00) [ 1981.128347][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:54 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe00) 00:26:54 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:54 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xec0) [ 1992.253597][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:26:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\xfd\xfd', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:26:54 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:26:54 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf00) 00:26:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:01 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1100) 00:27:01 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:01 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1200) 00:27:01 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:01 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1300) 00:27:01 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:10 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1400) 00:27:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:10 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:10 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:10 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3000) 00:27:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:11 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:11 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3103) 00:27:11 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:11 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4000) 00:27:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:17 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:17 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5865) 00:27:17 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:17 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6000) 00:27:17 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:17 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6558) 00:27:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000000)=0x7fff, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) accept(r3, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 2015.670689][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:27:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:26 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8100) 00:27:26 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:26 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:26 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc000) 00:27:27 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:27 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc00e) 00:27:27 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2025.096304][T23612] FAULT_INJECTION: forcing a failure. [ 2025.096304][T23612] name failslab, interval 1, probability 0, space 0, times 0 [ 2025.133774][T23612] CPU: 0 PID: 23612 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2025.142502][T23612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2025.152570][T23612] Call Trace: [ 2025.152598][T23612] dump_stack+0x197/0x210 [ 2025.152622][T23612] should_fail.cold+0xa/0x15 [ 2025.152637][T23612] ? release_sock+0x156/0x1c0 [ 2025.152655][T23612] ? fault_create_debugfs_attr+0x180/0x180 [ 2025.152675][T23612] ? ___might_sleep+0x163/0x2c0 [ 2025.152696][T23612] __should_failslab+0x121/0x190 [ 2025.152713][T23612] should_failslab+0x9/0x14 [ 2025.152725][T23612] kmem_cache_alloc_node+0x268/0x740 [ 2025.152750][T23612] __alloc_skb+0xd5/0x5e0 [ 2025.199439][T23612] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2025.205016][T23612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2025.205036][T23612] ? netlink_autobind.isra.0+0x223/0x300 [ 2025.205057][T23612] netlink_sendmsg+0xa1b/0xea0 [ 2025.222239][T23612] ? netlink_unicast+0x7d0/0x7d0 [ 2025.227200][T23612] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2025.232775][T23612] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2025.238260][T23612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2025.244509][T23612] ? security_socket_sendmsg+0x8d/0xc0 [ 2025.244529][T23612] ? netlink_unicast+0x7d0/0x7d0 [ 2025.244545][T23612] sock_sendmsg+0xd7/0x130 [ 2025.244563][T23612] sock_write_iter+0x27c/0x3e0 [ 2025.254981][T23612] ? sock_sendmsg+0x130/0x130 [ 2025.268924][T23612] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2025.274946][T23612] ? find_held_lock+0x35/0x130 [ 2025.279939][T23612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2025.286459][T23612] ? iov_iter_init+0xee/0x220 [ 2025.291782][T23612] new_sync_write+0x4d3/0x770 [ 2025.296597][T23612] ? new_sync_read+0x800/0x800 [ 2025.301399][T23612] ? __fget+0x37f/0x550 [ 2025.305585][T23612] ? apparmor_file_permission+0x27/0x30 [ 2025.311248][T23612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2025.317513][T23612] ? security_file_permission+0x8f/0x380 [ 2025.323162][T23612] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2025.328559][T23612] __vfs_write+0xe1/0x110 [ 2025.332911][T23612] vfs_write+0x268/0x5d0 [ 2025.337177][T23612] ksys_write+0x220/0x290 [ 2025.341526][T23612] ? __ia32_sys_read+0xb0/0xb0 [ 2025.346360][T23612] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2025.354609][T23612] ? do_syscall_64+0x26/0x790 [ 2025.359383][T23612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2025.365495][T23612] ? do_syscall_64+0x26/0x790 [ 2025.370503][T23612] __x64_sys_write+0x73/0xb0 [ 2025.376292][T23612] do_syscall_64+0xfa/0x790 [ 2025.381291][T23612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2025.388001][T23612] RIP: 0033:0x45a6f9 [ 2025.392480][T23612] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2025.413494][T23612] RSP: 002b:00007efdcbee1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2025.421929][T23612] RAX: ffffffffffffffda RBX: 00007efdcbee1c90 RCX: 000000000045a6f9 [ 2025.429928][T23612] RDX: 0000000000000024 RSI: 000000002018efdc RDI: 0000000000000004 [ 2025.437918][T23612] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2025.445899][T23612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdcbee26d4 [ 2025.445907][T23612] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000005 00:27:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xa, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0xff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x2, 0x0, "8bf1abbeb32db183862088a89e1c2580fe044d1d9a073cb6e86c24b341aaed29ba3417e6e2a8fbb741879c8525dda00ad61adc333a3bc4193aa2f04738f224cd130f1d5669cb2ba1c52c3574f6c79a56"}, 0xd8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000340)={0x200, 0x9, 0x462, @broadcast, 'nr0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x10001, 0x963, 0x4, 0x6, 0x7f}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000300)=0x7, 0x8) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r5, 0x0, &(0x7f0000001880)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x800, 0x4) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmsg$can_raw(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000400)=""/73}], 0x259, 0x0, 0xfffffffffffffdb2}, 0x400120e5) accept(r4, &(0x7f0000000480)=@l2, &(0x7f0000000380)=0xfecc) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) shutdown(r2, 0x1) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:36 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf000) 00:27:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:36 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:36 executing program 3 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2033.988374][T23626] FAULT_INJECTION: forcing a failure. [ 2033.988374][T23626] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.024562][T23626] CPU: 0 PID: 23626 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2034.033329][T23626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.043528][T23626] Call Trace: [ 2034.047707][T23626] dump_stack+0x197/0x210 [ 2034.047730][T23626] should_fail.cold+0xa/0x15 [ 2034.047750][T23626] ? fault_create_debugfs_attr+0x180/0x180 [ 2034.047766][T23626] ? ___might_sleep+0x163/0x2c0 [ 2034.047788][T23626] __should_failslab+0x121/0x190 [ 2034.073698][T23626] should_failslab+0x9/0x14 [ 2034.078302][T23626] kmem_cache_alloc_node_trace+0x274/0x750 [ 2034.084290][T23626] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2034.090633][T23626] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2034.090651][T23626] __kmalloc_node_track_caller+0x3d/0x70 [ 2034.090667][T23626] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2034.090682][T23626] __alloc_skb+0x10b/0x5e0 [ 2034.090698][T23626] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2034.090712][T23626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2034.090732][T23626] ? netlink_autobind.isra.0+0x223/0x300 [ 2034.131627][T23626] netlink_sendmsg+0xa1b/0xea0 [ 2034.136420][T23626] ? netlink_unicast+0x7d0/0x7d0 [ 2034.141389][T23626] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2034.148002][T23626] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2034.153745][T23626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2034.160031][T23626] ? security_socket_sendmsg+0x8d/0xc0 [ 2034.165515][T23626] ? netlink_unicast+0x7d0/0x7d0 [ 2034.170471][T23626] sock_sendmsg+0xd7/0x130 [ 2034.174940][T23626] sock_write_iter+0x27c/0x3e0 [ 2034.179747][T23626] ? sock_sendmsg+0x130/0x130 [ 2034.184514][T23626] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2034.190264][T23626] ? find_held_lock+0x35/0x130 [ 2034.195048][T23626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2034.202172][T23626] ? iov_iter_init+0xee/0x220 [ 2034.206865][T23626] new_sync_write+0x4d3/0x770 [ 2034.211567][T23626] ? new_sync_read+0x800/0x800 [ 2034.216352][T23626] ? __fget+0x37f/0x550 [ 2034.220533][T23626] ? apparmor_file_permission+0x27/0x30 [ 2034.226090][T23626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2034.232340][T23626] ? security_file_permission+0x8f/0x380 [ 2034.238153][T23626] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2034.243451][T23626] __vfs_write+0xe1/0x110 [ 2034.247809][T23626] vfs_write+0x268/0x5d0 [ 2034.252063][T23626] ksys_write+0x220/0x290 [ 2034.256395][T23626] ? __ia32_sys_read+0xb0/0xb0 [ 2034.256412][T23626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2034.256424][T23626] ? do_syscall_64+0x26/0x790 [ 2034.256445][T23626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2034.266686][T23626] ? do_syscall_64+0x26/0x790 [ 2034.266703][T23626] __x64_sys_write+0x73/0xb0 00:27:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:36 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:36 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(0xffffffffffffffff, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 2034.266718][T23626] do_syscall_64+0xfa/0x790 [ 2034.266735][T23626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2034.266744][T23626] RIP: 0033:0x45a6f9 [ 2034.266763][T23626] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2034.320573][T23626] RSP: 002b:00007efdcbee1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2034.320588][T23626] RAX: ffffffffffffffda RBX: 00007efdcbee1c90 RCX: 000000000045a6f9 00:27:36 executing program 3 (fault-call:4 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:27:36 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x33fe0) [ 2034.320595][T23626] RDX: 0000000000000024 RSI: 000000002018efdc RDI: 0000000000000004 [ 2034.320602][T23626] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2034.320609][T23626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdcbee26d4 [ 2034.320616][T23626] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000005 [ 2034.451829][T23653] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2034.479976][T23653] FAULT_INJECTION: forcing a failure. [ 2034.479976][T23653] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.511065][T23653] CPU: 0 PID: 23653 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2034.519798][T23653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2034.530477][T23653] Call Trace: [ 2034.533774][T23653] dump_stack+0x197/0x210 [ 2034.538124][T23653] should_fail.cold+0xa/0x15 [ 2034.542780][T23653] ? fault_create_debugfs_attr+0x180/0x180 [ 2034.548614][T23653] ? ___might_sleep+0x163/0x2c0 [ 2034.553475][T23653] __should_failslab+0x121/0x190 [ 2034.558421][T23653] should_failslab+0x9/0x14 [ 2034.562932][T23653] kmem_cache_alloc_node+0x268/0x740 [ 2034.568368][T23653] ? ipv6_dev_get_saddr+0xc50/0xc50 [ 2034.573954][T23653] __alloc_skb+0xd5/0x5e0 [ 2034.578296][T23653] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2034.578309][T23653] ? __kasan_check_read+0x11/0x20 [ 2034.578328][T23653] ? ipv6_dev_get_saddr+0xc50/0xc50 [ 2034.578350][T23653] netlink_ack+0x25c/0xb50 [ 2034.594275][T23653] ? netlink_sendmsg+0xea0/0xea0 [ 2034.603964][T23653] ? find_held_lock+0x35/0x130 [ 2034.609537][T23653] netlink_rcv_skb+0x376/0x450 [ 2034.615239][T23653] ? rtnl_bridge_getlink+0x910/0x910 [ 2034.620721][T23653] ? netlink_ack+0xb50/0xb50 [ 2034.625358][T23653] ? __kasan_check_read+0x11/0x20 [ 2034.631151][T23653] ? netlink_deliver_tap+0x24a/0xbe0 [ 2034.637098][T23653] rtnetlink_rcv+0x1d/0x30 [ 2034.641533][T23653] netlink_unicast+0x58c/0x7d0 [ 2034.646410][T23653] ? netlink_attachskb+0x870/0x870 [ 2034.651539][T23653] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2034.657277][T23653] ? __check_object_size+0x3d/0x437 [ 2034.662502][T23653] netlink_sendmsg+0x91c/0xea0 [ 2034.667281][T23653] ? netlink_unicast+0x7d0/0x7d0 [ 2034.672234][T23653] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2034.677810][T23653] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2034.683292][T23653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2034.689773][T23653] ? security_socket_sendmsg+0x8d/0xc0 [ 2034.695219][T23653] ? netlink_unicast+0x7d0/0x7d0 [ 2034.700148][T23653] sock_sendmsg+0xd7/0x130 [ 2034.704767][T23653] sock_write_iter+0x27c/0x3e0 [ 2034.709779][T23653] ? sock_sendmsg+0x130/0x130 [ 2034.714435][T23653] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2034.720234][T23653] ? find_held_lock+0x35/0x130 [ 2034.724998][T23653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2034.731220][T23653] ? iov_iter_init+0xee/0x220 [ 2034.735885][T23653] new_sync_write+0x4d3/0x770 [ 2034.740543][T23653] ? new_sync_read+0x800/0x800 [ 2034.746091][T23653] ? __fget+0x37f/0x550 [ 2034.750323][T23653] ? apparmor_file_permission+0x27/0x30 [ 2034.755851][T23653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2034.762080][T23653] ? security_file_permission+0x8f/0x380 [ 2034.767691][T23653] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2034.772966][T23653] __vfs_write+0xe1/0x110 [ 2034.777278][T23653] vfs_write+0x268/0x5d0 [ 2034.781586][T23653] ksys_write+0x220/0x290 [ 2034.785914][T23653] ? __ia32_sys_read+0xb0/0xb0 [ 2034.790673][T23653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2034.796118][T23653] ? do_syscall_64+0x26/0x790 [ 2034.800864][T23653] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2034.806921][T23653] ? do_syscall_64+0x26/0x790 [ 2034.811594][T23653] __x64_sys_write+0x73/0xb0 [ 2034.816192][T23653] do_syscall_64+0xfa/0x790 [ 2034.820691][T23653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2034.826573][T23653] RIP: 0033:0x45a6f9 [ 2034.830450][T23653] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2034.850045][T23653] RSP: 002b:00007efdcbee1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2034.858772][T23653] RAX: ffffffffffffffda RBX: 00007efdcbee1c90 RCX: 000000000045a6f9 [ 2034.867036][T23653] RDX: 0000000000000024 RSI: 000000002018efdc RDI: 0000000000000004 [ 2034.875964][T23653] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2034.885044][T23653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdcbee26d4 [ 2034.893199][T23653] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000005 00:27:47 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:47 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x34000) 00:27:47 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, 0x0, 0x0, 0x0) 00:27:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:47 executing program 3 (fault-call:4 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:27:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 2045.329235][T23670] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2045.355557][T23670] FAULT_INJECTION: forcing a failure. [ 2045.355557][T23670] name failslab, interval 1, probability 0, space 0, times 0 [ 2045.388259][T23670] CPU: 0 PID: 23670 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 2045.397005][T23670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2045.407160][T23670] Call Trace: [ 2045.410838][T23670] dump_stack+0x197/0x210 [ 2045.415210][T23670] should_fail.cold+0xa/0x15 [ 2045.420694][T23670] ? fault_create_debugfs_attr+0x180/0x180 [ 2045.426529][T23670] ? ___might_sleep+0x163/0x2c0 [ 2045.431405][T23670] __should_failslab+0x121/0x190 [ 2045.436368][T23670] should_failslab+0x9/0x14 [ 2045.440917][T23670] kmem_cache_alloc_node_trace+0x274/0x750 [ 2045.446858][T23670] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2045.452912][T23670] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2045.458830][T23670] __kmalloc_node_track_caller+0x3d/0x70 [ 2045.464838][T23670] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2045.470230][T23670] __alloc_skb+0x10b/0x5e0 [ 2045.474674][T23670] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2045.480416][T23670] ? __kasan_check_read+0x11/0x20 [ 2045.485480][T23670] ? ipv6_dev_get_saddr+0xc50/0xc50 [ 2045.490702][T23670] netlink_ack+0x25c/0xb50 [ 2045.495141][T23670] ? netlink_sendmsg+0xea0/0xea0 [ 2045.500101][T23670] ? find_held_lock+0x35/0x130 [ 2045.505278][T23670] netlink_rcv_skb+0x376/0x450 [ 2045.510361][T23670] ? rtnl_bridge_getlink+0x910/0x910 [ 2045.515760][T23670] ? netlink_ack+0xb50/0xb50 [ 2045.520917][T23670] ? __kasan_check_read+0x11/0x20 [ 2045.525987][T23670] ? netlink_deliver_tap+0x24a/0xbe0 [ 2045.531487][T23670] rtnetlink_rcv+0x1d/0x30 [ 2045.536023][T23670] netlink_unicast+0x58c/0x7d0 [ 2045.540982][T23670] ? netlink_attachskb+0x870/0x870 [ 2045.546111][T23670] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2045.551938][T23670] ? __check_object_size+0x3d/0x437 [ 2045.557252][T23670] netlink_sendmsg+0x91c/0xea0 [ 2045.562055][T23670] ? netlink_unicast+0x7d0/0x7d0 [ 2045.567144][T23670] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2045.572756][T23670] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2045.578287][T23670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2045.584667][T23670] ? security_socket_sendmsg+0x8d/0xc0 [ 2045.590578][T23670] ? netlink_unicast+0x7d0/0x7d0 [ 2045.595636][T23670] sock_sendmsg+0xd7/0x130 [ 2045.600108][T23670] sock_write_iter+0x27c/0x3e0 [ 2045.604896][T23670] ? sock_sendmsg+0x130/0x130 [ 2045.610751][T23670] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2045.616516][T23670] ? find_held_lock+0x35/0x130 [ 2045.621668][T23670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2045.628239][T23670] ? iov_iter_init+0xee/0x220 [ 2045.632962][T23670] new_sync_write+0x4d3/0x770 [ 2045.637662][T23670] ? new_sync_read+0x800/0x800 [ 2045.642451][T23670] ? __fget+0x37f/0x550 [ 2045.646930][T23670] ? apparmor_file_permission+0x27/0x30 [ 2045.652495][T23670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2045.658930][T23670] ? security_file_permission+0x8f/0x380 [ 2045.664592][T23670] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2045.669997][T23670] __vfs_write+0xe1/0x110 [ 2045.674346][T23670] vfs_write+0x268/0x5d0 [ 2045.678607][T23670] ksys_write+0x220/0x290 [ 2045.682960][T23670] ? __ia32_sys_read+0xb0/0xb0 [ 2045.687845][T23670] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2045.693448][T23670] ? do_syscall_64+0x26/0x790 [ 2045.698524][T23670] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2045.704746][T23670] ? do_syscall_64+0x26/0x790 [ 2045.709544][T23670] __x64_sys_write+0x73/0xb0 [ 2045.714162][T23670] do_syscall_64+0xfa/0x790 [ 2045.718905][T23670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2045.724915][T23670] RIP: 0033:0x45a6f9 [ 2045.728829][T23670] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2045.748705][T23670] RSP: 002b:00007efdcbee1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2045.757659][T23670] RAX: ffffffffffffffda RBX: 00007efdcbee1c90 RCX: 000000000045a6f9 [ 2045.765819][T23670] RDX: 0000000000000024 RSI: 000000002018efdc RDI: 0000000000000004 [ 2045.775221][T23670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:27:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:47 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, 0x0, 0x0, 0x0) 00:27:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:47 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, 0x0, 0x0, 0x0) 00:27:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 2045.785902][T23670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdcbee26d4 [ 2045.794675][T23670] R13: 00000000004c7a8a R14: 00000000004e4b08 R15: 0000000000000005 00:27:56 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:27:56 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:27:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x40000) 00:27:56 executing program 3 (fault-call:4 fault-nth:4): r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2054.615181][T23720] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:27:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:27:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x02', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:27:56 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x400300) [ 2054.822618][T23735] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:27:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="0f00000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:27:57 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf0ffff) 00:27:57 executing program 4 (fault-call:20 fault-nth:0): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 2055.068280][T23748] FAULT_INJECTION: forcing a failure. [ 2055.068280][T23748] name failslab, interval 1, probability 0, space 0, times 0 [ 2055.112400][T23748] CPU: 0 PID: 23748 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2055.121148][T23748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2055.131263][T23748] Call Trace: [ 2055.134574][T23748] dump_stack+0x197/0x210 [ 2055.138938][T23748] should_fail.cold+0xa/0x15 [ 2055.143561][T23748] ? fault_create_debugfs_attr+0x180/0x180 [ 2055.149401][T23748] ? ___might_sleep+0x163/0x2c0 [ 2055.149425][T23748] __should_failslab+0x121/0x190 [ 2055.149444][T23748] should_failslab+0x9/0x14 [ 2055.149457][T23748] kmem_cache_alloc_node+0x268/0x740 [ 2055.149468][T23748] ? mark_lock+0xc2/0x1220 [ 2055.149486][T23748] ? __lock_acquire+0x16f2/0x4a00 [ 2055.159289][T23748] __alloc_skb+0xd5/0x5e0 [ 2055.159308][T23748] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2055.159331][T23748] alloc_skb_with_frags+0x93/0x590 [ 2055.159344][T23748] ? __kasan_check_read+0x11/0x20 [ 2055.159357][T23748] ? __lock_acquire+0x16f2/0x4a00 [ 2055.159367][T23748] ? __lock_acquire+0x16f2/0x4a00 [ 2055.159386][T23748] sock_alloc_send_pskb+0x7ad/0x920 [ 2055.215474][T23748] ? release_sock+0x156/0x1c0 [ 2055.220159][T23748] ? sock_wmalloc+0x120/0x120 [ 2055.224820][T23748] ? _raw_spin_unlock_bh+0x2c/0x30 [ 2055.229914][T23748] ? __local_bh_enable_ip+0x15a/0x270 [ 2055.235284][T23748] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2055.240562][T23748] ? release_sock+0x156/0x1c0 [ 2055.245244][T23748] ? trace_hardirqs_on+0x67/0x240 [ 2055.250250][T23748] ? release_sock+0x156/0x1c0 [ 2055.254911][T23748] sock_alloc_send_skb+0x32/0x40 [ 2055.259898][T23748] dccp_sendmsg+0x2c2/0xd20 [ 2055.264494][T23748] ? aa_af_perm+0x2a0/0x2a0 [ 2055.269565][T23748] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2055.275247][T23748] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2055.281363][T23748] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2055.287671][T23748] inet_sendmsg+0x9e/0xe0 [ 2055.292021][T23748] ? inet_send_prepare+0x4e0/0x4e0 [ 2055.297123][T23748] sock_sendmsg+0xd7/0x130 [ 2055.301950][T23748] ____sys_sendmsg+0x358/0x880 [ 2055.306710][T23748] ? kernel_sendmsg+0x50/0x50 [ 2055.311374][T23748] ? __fget+0x35d/0x550 [ 2055.315525][T23748] ? find_held_lock+0x35/0x130 [ 2055.320301][T23748] ___sys_sendmsg+0x100/0x170 [ 2055.324976][T23748] ? sendmsg_copy_msghdr+0x70/0x70 [ 2055.330086][T23748] ? __kasan_check_read+0x11/0x20 [ 2055.335097][T23748] ? __fget+0x37f/0x550 [ 2055.339786][T23748] ? ksys_dup3+0x3e0/0x3e0 [ 2055.344286][T23748] ? find_held_lock+0x35/0x130 [ 2055.349072][T23748] ? get_pid_task+0x11d/0x210 [ 2055.354115][T23748] ? __fget_light+0x1a9/0x230 [ 2055.358799][T23748] ? __fdget+0x1b/0x20 [ 2055.362969][T23748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2055.369221][T23748] ? sockfd_lookup_light+0xcb/0x180 [ 2055.374761][T23748] __sys_sendmmsg+0x1bf/0x4d0 [ 2055.379554][T23748] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2055.385149][T23748] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2055.391949][T23748] ? fput_many+0x12c/0x1a0 [ 2055.396836][T23748] ? fput+0x1b/0x20 [ 2055.400658][T23748] ? ksys_write+0x1cf/0x290 [ 2055.405914][T23748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2055.411499][T23748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2055.418293][T23748] ? do_syscall_64+0x26/0x790 [ 2055.418309][T23748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2055.418320][T23748] ? do_syscall_64+0x26/0x790 [ 2055.418346][T23748] __x64_sys_sendmmsg+0x9d/0x100 [ 2055.430514][T23748] do_syscall_64+0xfa/0x790 [ 2055.444877][T23748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2055.450792][T23748] RIP: 0033:0x45a6f9 [ 2055.454714][T23748] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2055.474421][T23748] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2055.482924][T23748] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2055.491105][T23748] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2055.499660][T23748] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2055.507883][T23748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2055.515926][T23748] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a 00:28:03 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x03', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:28:03 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x1000000) 00:28:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="1000000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:28:03 executing program 4 (fault-call:20 fault-nth:1): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="6800000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2061.821780][T23760] FAULT_INJECTION: forcing a failure. [ 2061.821780][T23760] name failslab, interval 1, probability 0, space 0, times 0 [ 2061.861064][T23760] CPU: 0 PID: 23760 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 00:28:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x2000000) 00:28:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x04', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 2061.869785][T23760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2061.879856][T23760] Call Trace: [ 2061.883164][T23760] dump_stack+0x197/0x210 [ 2061.887520][T23760] should_fail.cold+0xa/0x15 [ 2061.892131][T23760] ? fault_create_debugfs_attr+0x180/0x180 [ 2061.897969][T23760] ? ___might_sleep+0x163/0x2c0 [ 2061.902843][T23760] __should_failslab+0x121/0x190 [ 2061.907797][T23760] should_failslab+0x9/0x14 [ 2061.912322][T23760] kmem_cache_alloc_node_trace+0x274/0x750 00:28:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="c000000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2061.918144][T23760] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2061.924134][T23760] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2061.929967][T23760] __kmalloc_node_track_caller+0x3d/0x70 [ 2061.935615][T23760] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2061.941012][T23760] __alloc_skb+0x10b/0x5e0 [ 2061.945441][T23760] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2061.951005][T23760] alloc_skb_with_frags+0x93/0x590 [ 2061.956132][T23760] ? __kasan_check_read+0x11/0x20 [ 2061.961173][T23760] ? __lock_acquire+0x16f2/0x4a00 [ 2061.966200][T23760] ? __lock_acquire+0x16f2/0x4a00 00:28:04 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x2050000) [ 2061.971332][T23760] sock_alloc_send_pskb+0x7ad/0x920 [ 2061.976545][T23760] ? release_sock+0x156/0x1c0 [ 2061.981235][T23760] ? sock_wmalloc+0x120/0x120 [ 2061.985917][T23760] ? _raw_spin_unlock_bh+0x2c/0x30 [ 2061.991122][T23760] ? __local_bh_enable_ip+0x15a/0x270 [ 2061.996502][T23760] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2062.001798][T23760] ? release_sock+0x156/0x1c0 [ 2062.007096][T23760] ? trace_hardirqs_on+0x67/0x240 [ 2062.012130][T23760] ? release_sock+0x156/0x1c0 [ 2062.016828][T23760] sock_alloc_send_skb+0x32/0x40 00:28:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="c00e000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2062.021777][T23760] dccp_sendmsg+0x2c2/0xd20 [ 2062.026295][T23760] ? aa_af_perm+0x2a0/0x2a0 [ 2062.030815][T23760] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2062.036831][T23760] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2062.042395][T23760] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2062.048654][T23760] inet_sendmsg+0x9e/0xe0 [ 2062.052997][T23760] ? inet_send_prepare+0x4e0/0x4e0 [ 2062.058120][T23760] sock_sendmsg+0xd7/0x130 [ 2062.062551][T23760] ____sys_sendmsg+0x358/0x880 [ 2062.067334][T23760] ? kernel_sendmsg+0x50/0x50 [ 2062.072024][T23760] ? __fget+0x35d/0x550 [ 2062.076192][T23760] ? find_held_lock+0x35/0x130 [ 2062.081016][T23760] ___sys_sendmsg+0x100/0x170 [ 2062.085713][T23760] ? sendmsg_copy_msghdr+0x70/0x70 [ 2062.090834][T23760] ? __kasan_check_read+0x11/0x20 [ 2062.095871][T23760] ? __fget+0x37f/0x550 [ 2062.100050][T23760] ? ksys_dup3+0x3e0/0x3e0 [ 2062.104499][T23760] ? find_held_lock+0x35/0x130 [ 2062.109268][T23760] ? get_pid_task+0x11d/0x210 [ 2062.113970][T23760] ? __fget_light+0x1a9/0x230 [ 2062.118663][T23760] ? __fdget+0x1b/0x20 [ 2062.122748][T23760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2062.129013][T23760] ? sockfd_lookup_light+0xcb/0x180 [ 2062.134327][T23760] __sys_sendmmsg+0x1bf/0x4d0 [ 2062.139012][T23760] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2062.139044][T23760] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2062.139059][T23760] ? fput_many+0x12c/0x1a0 [ 2062.139072][T23760] ? fput+0x1b/0x20 [ 2062.139084][T23760] ? ksys_write+0x1cf/0x290 [ 2062.139101][T23760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2062.139119][T23760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2062.150369][T23760] ? do_syscall_64+0x26/0x790 [ 2062.150386][T23760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2062.150401][T23760] ? do_syscall_64+0x26/0x790 [ 2062.150421][T23760] __x64_sys_sendmmsg+0x9d/0x100 [ 2062.150439][T23760] do_syscall_64+0xfa/0x790 [ 2062.158637][T23760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2062.158649][T23760] RIP: 0033:0x45a6f9 [ 2062.158664][T23760] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2062.158672][T23760] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2062.158686][T23760] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2062.158696][T23760] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2062.158704][T23760] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2062.158711][T23760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2062.158718][T23760] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a 00:28:12 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000001, 0x30, 0xffffffffffffffff, 0xffffd000) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}, {}, {}], 0x3, 0x0) r1 = socket(0x4, 0x4, 0xffffffffffffffff) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, 0xfffffffffffffffe) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 00:28:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="effd000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3000000) 00:28:12 executing program 4 (fault-call:20 fault-nth:2): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x05', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:28:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 2070.268817][T23811] FAULT_INJECTION: forcing a failure. [ 2070.268817][T23811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2070.282072][T23811] CPU: 0 PID: 23811 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2070.291446][T23811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2070.301523][T23811] Call Trace: [ 2070.304838][T23811] dump_stack+0x197/0x210 [ 2070.309198][T23811] should_fail.cold+0xa/0x15 [ 2070.313815][T23811] ? fault_create_debugfs_attr+0x180/0x180 [ 2070.319640][T23811] ? __kasan_check_read+0x11/0x20 [ 2070.324681][T23811] ? __lock_acquire+0x16f2/0x4a00 [ 2070.329896][T23811] ? alloc_skb_with_frags+0x93/0x590 [ 2070.335238][T23811] should_fail_alloc_page+0x50/0x60 [ 2070.340448][T23811] __alloc_pages_nodemask+0x1a1/0x910 [ 2070.345835][T23811] ? fs_reclaim_release+0xf/0x30 [ 2070.350787][T23811] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2070.356525][T23811] ? fs_reclaim_release+0xf/0x30 [ 2070.361484][T23811] ? fault_create_debugfs_attr+0x180/0x180 [ 2070.367332][T23811] cache_grow_begin+0x90/0xc60 [ 2070.372113][T23811] ? __kmalloc_node_track_caller+0x3d/0x70 [ 2070.377941][T23811] ? trace_hardirqs_off+0x62/0x240 [ 2070.383075][T23811] kmem_cache_alloc_node_trace+0x689/0x750 [ 2070.388923][T23811] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2070.394923][T23811] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2070.400752][T23811] __kmalloc_node_track_caller+0x3d/0x70 [ 2070.406403][T23811] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2070.411797][T23811] __alloc_skb+0x10b/0x5e0 [ 2070.416237][T23811] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2070.421809][T23811] alloc_skb_with_frags+0x93/0x590 [ 2070.426937][T23811] ? __kasan_check_read+0x11/0x20 [ 2070.431975][T23811] ? __lock_acquire+0x16f2/0x4a00 [ 2070.437023][T23811] ? __lock_acquire+0x16f2/0x4a00 [ 2070.442097][T23811] sock_alloc_send_pskb+0x7ad/0x920 [ 2070.447318][T23811] ? release_sock+0x156/0x1c0 [ 2070.452099][T23811] ? sock_wmalloc+0x120/0x120 [ 2070.456880][T23811] ? _raw_spin_unlock_bh+0x2c/0x30 [ 2070.462037][T23811] ? __local_bh_enable_ip+0x15a/0x270 [ 2070.467449][T23811] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2070.472751][T23811] ? release_sock+0x156/0x1c0 [ 2070.477455][T23811] ? trace_hardirqs_on+0x67/0x240 [ 2070.482494][T23811] ? release_sock+0x156/0x1c0 [ 2070.487193][T23811] sock_alloc_send_skb+0x32/0x40 [ 2070.492170][T23811] dccp_sendmsg+0x2c2/0xd20 [ 2070.496717][T23811] ? aa_af_perm+0x2a0/0x2a0 [ 2070.501346][T23811] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2070.507024][T23811] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2070.512591][T23811] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 00:28:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="e03f030052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4000000) 00:28:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="00f0182052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5000000) 00:28:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="effdffff52001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:12 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6000000) [ 2070.518851][T23811] inet_sendmsg+0x9e/0xe0 [ 2070.523194][T23811] ? inet_send_prepare+0x4e0/0x4e0 [ 2070.528315][T23811] sock_sendmsg+0xd7/0x130 [ 2070.532755][T23811] ____sys_sendmsg+0x358/0x880 [ 2070.537536][T23811] ? kernel_sendmsg+0x50/0x50 [ 2070.542229][T23811] ? __fget+0x35d/0x550 [ 2070.546380][T23811] ? find_held_lock+0x35/0x130 [ 2070.546406][T23811] ___sys_sendmsg+0x100/0x170 [ 2070.546427][T23811] ? sendmsg_copy_msghdr+0x70/0x70 [ 2070.555843][T23811] ? __kasan_check_read+0x11/0x20 [ 2070.555861][T23811] ? __fget+0x37f/0x550 [ 2070.555879][T23811] ? ksys_dup3+0x3e0/0x3e0 [ 2070.555891][T23811] ? find_held_lock+0x35/0x130 [ 2070.555912][T23811] ? get_pid_task+0x11d/0x210 [ 2070.566363][T23811] ? __fget_light+0x1a9/0x230 [ 2070.566379][T23811] ? __fdget+0x1b/0x20 [ 2070.566401][T23811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2070.566414][T23811] ? sockfd_lookup_light+0xcb/0x180 [ 2070.566437][T23811] __sys_sendmmsg+0x1bf/0x4d0 [ 2070.574995][T23811] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2070.575034][T23811] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2070.584437][T23811] ? fput_many+0x12c/0x1a0 [ 2070.584454][T23811] ? fput+0x1b/0x20 [ 2070.584471][T23811] ? ksys_write+0x1cf/0x290 [ 2070.593186][T23811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2070.593202][T23811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2070.593219][T23811] ? do_syscall_64+0x26/0x790 [ 2070.604727][T23811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2070.604744][T23811] ? do_syscall_64+0x26/0x790 [ 2070.604767][T23811] __x64_sys_sendmmsg+0x9d/0x100 [ 2070.618177][T23811] do_syscall_64+0xfa/0x790 [ 2070.618197][T23811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2070.618209][T23811] RIP: 0033:0x45a6f9 [ 2070.618222][T23811] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2070.618235][T23811] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2070.628875][T23811] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2070.628889][T23811] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2070.637164][T23811] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2070.637172][T23811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2070.637179][T23811] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a [ 2078.525255][T23847] IPVS: ftp: loaded support on port[0] = 21 [ 2078.772458][T23848] IPVS: ftp: loaded support on port[0] = 21 00:28:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.swap.current\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) connect$ax25(r0, &(0x7f0000000040)={{0x3, @default, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast]}, 0x48) 00:28:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2400000009001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:21 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8000000) 00:28:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\x06', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:28:21 executing program 4 (fault-call:20 fault-nth:3): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:21 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x0) shutdown(r0, 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:28:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="240000000f001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:22 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x0) shutdown(r0, 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 2079.919022][T23862] FAULT_INJECTION: forcing a failure. [ 2079.919022][T23862] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.955639][ T178] tipc: TX() has been purged, node left! 00:28:22 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x9000000) [ 2079.973433][T23862] CPU: 0 PID: 23862 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2079.982176][T23862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2079.993286][T23862] Call Trace: [ 2079.996610][T23862] dump_stack+0x197/0x210 [ 2079.996635][T23862] should_fail.cold+0xa/0x15 [ 2079.996650][T23862] ? __kasan_check_read+0x11/0x20 [ 2079.996669][T23862] ? fault_create_debugfs_attr+0x180/0x180 [ 2079.996680][T23862] ? memcpy+0x46/0x50 [ 2079.996777][T23862] ? dccp_insert_fn_opt+0x241/0x310 [ 2080.025776][T23862] __should_failslab+0x121/0x190 [ 2080.030737][T23862] should_failslab+0x9/0x14 [ 2080.035238][T23862] kmem_cache_alloc+0x47/0x710 [ 2080.040110][T23862] ? dccp_feat_clone_list+0x4c0/0x4c0 [ 2080.045497][T23862] dccp_ackvec_update_records+0x30/0x430 [ 2080.051154][T23862] dccp_insert_options+0x9c5/0xc70 [ 2080.056287][T23862] dccp_transmit_skb+0x1c4/0x12a0 [ 2080.061329][T23862] dccp_xmit_packet+0x1f6/0x660 [ 2080.066198][T23862] dccp_write_xmit+0x17f/0x1e0 00:28:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2402000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2080.070974][T23862] dccp_sendmsg+0xa87/0xd20 [ 2080.075499][T23862] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2080.081162][T23862] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2080.086719][T23862] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2080.092974][T23862] inet_sendmsg+0x9e/0xe0 [ 2080.097311][T23862] ? inet_send_prepare+0x4e0/0x4e0 [ 2080.102818][T23862] sock_sendmsg+0xd7/0x130 [ 2080.107238][T23862] ____sys_sendmsg+0x358/0x880 [ 2080.111998][T23862] ? kernel_sendmsg+0x50/0x50 [ 2080.116682][T23862] ? __fget+0x35d/0x550 00:28:22 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa000000) [ 2080.120839][T23862] ? find_held_lock+0x35/0x130 [ 2080.125621][T23862] ___sys_sendmsg+0x100/0x170 [ 2080.130309][T23862] ? sendmsg_copy_msghdr+0x70/0x70 [ 2080.135425][T23862] ? __kasan_check_read+0x11/0x20 [ 2080.140457][T23862] ? __fget+0x37f/0x550 [ 2080.144636][T23862] ? ksys_dup3+0x3e0/0x3e0 [ 2080.149072][T23862] ? find_held_lock+0x35/0x130 [ 2080.153850][T23862] ? get_pid_task+0x11d/0x210 [ 2080.158537][T23862] ? __fget_light+0x1a9/0x230 [ 2080.163227][T23862] ? __fdget+0x1b/0x20 [ 2080.167307][T23862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2080.173562][T23862] ? sockfd_lookup_light+0xcb/0x180 [ 2080.178775][T23862] __sys_sendmmsg+0x1bf/0x4d0 [ 2080.183451][T23862] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2080.188513][T23862] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2080.194788][T23862] ? fput_many+0x12c/0x1a0 [ 2080.199226][T23862] ? fput+0x1b/0x20 [ 2080.203048][T23862] ? ksys_write+0x1cf/0x290 [ 2080.207568][T23862] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2080.213041][T23862] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2080.218510][T23862] ? do_syscall_64+0x26/0x790 00:28:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2403000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2080.223197][T23862] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2080.229295][T23862] ? do_syscall_64+0x26/0x790 [ 2080.233986][T23862] __x64_sys_sendmmsg+0x9d/0x100 [ 2080.238952][T23862] do_syscall_64+0xfa/0x790 [ 2080.243470][T23862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2080.249378][T23862] RIP: 0033:0x45a6f9 [ 2080.253271][T23862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2080.272880][T23862] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2080.281302][T23862] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2080.289282][T23862] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2080.297612][T23862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2080.305594][T23862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2080.313579][T23862] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a [ 2080.475183][ T178] tipc: TX() has been purged, node left! 00:28:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x25fa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x190, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc88a8ffff000c000400040082c10500ea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}, {&(0x7f0000000180)="0f880a94aee331798c7c5bbbf1d15ddafe0f54b734f59ce444ea7551829a71754cb9889e8b10b12498e8bb62101d2630ee7ea991434d767e9ff38aec79b6b8d1cddf68c2f97e663607bfb4cab2b33d0866dcf621d525794e6e1238f8d730a9ba5b0e4d6c1af525177ec359bc8058f33a7f491c909909b11bfec6959edd7f5dc81ba8d1264daed45fd835dc2c038e3206fc45720899f1e49336241e2ed3b707897ee8d3f9ffeebec61f365fe4b52ac686ec7c4727", 0xb4}, {&(0x7f00000002c0)="499036a6db6614a1962f589d598388468410b3b5d59a947d5b45423da51e8547a3349cc0656ef057d3db8adf7bc95b03c65ea4d702f7a2a5e9728b4a0fd1532d8271298564dd8ee06334102634cc92375bf9076c2dc665fe02fb1d658de20de2e8a0adacdf8e98f213fff31f20cd10428f9b51599d0e58619d1419f92d3a5182ee276a41141b8909fba15b353daf7a0d1d9b6aad0c05bdcbaa52581fce874f229a10166e5273e245d8fe1725bdb9e6a62ac1406c4c4897c66a729ccd672af0af8064a5fe1ec763f564ed1556e1a02426d5", 0xd1}], 0x3, &(0x7f00000003c0)=[{0xe8, 0x100, 0x10001, "b274df7ebf8bfdac74dfc2fa0bd68c5a6dfd9135d910a26003e33543e61530db7d04456c7800ae21ea92dd6a5bbbcbdb8b9d250378a8b168c5a30775f701716b3db9b55ca2c7d3d9a0fa3553bee48441e3f17713bcf887c1059dc1c16a647f8b2cf339e1d669f82179d43c9ef08e6e696f99773b27ac8679fe5c58554eb79c2f2dd6eccb9bdd7c7abf9cc827954d1be1f7db4623e9c6789252439fd088fd3099d3ccbee467c6996839188f4a535b5a992c43c985534d87a73d3377c3181e6da6eb061616dd762f71db335cedcdb1b9c8af176cd1"}, {0x1010, 0x3a, 0xd6f9, "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"}, {0x38, 0x3a, 0x3, "678a35c4c4e4c9b71b5b1e018e6048aef56efb506d320a9de4c0477ba3868a203c358794"}, {0xe0, 0x10e, 0x4, "84f9d13ded95f167f39eca3999787c7434513b6c8d44c9a08a7a2ae1c00704ff22f8a5bb8a9db39bce958ccd3d81edeafad85bc38123f5b6ccafc0536b66174d34f92b1e2af2255423abb87ae371cf1b441156fd1c78cbb17cd63e2911846788bf2277fa5b49f3cdde59d411ce7126afd508eac66f621347c62b34fcc2aa0250d7fa8e9cc6c7bc542d265746aa0868ba12a33ae2a2a8db16ae506d9d5d7f277a9154baef18bfde34c7546e6e3e863bf7b86b8012d999d9761631ed6f324db19e4b8e5a56e04f9a17891b"}, {0x90, 0x111, 0x1, "38a5bc09d0da5de27d363c37c1c7aa3ea7d8943750e811752166fac18dfefbd484d4af617adaef452e1a352df63c4c1b62384d932f37bb4fedfc9bdcaac458873888e588998abeb00b0f14a376cce8a27a13687784330dba80f2854355d0ea4539a5d5a901561215ec4d1b67e06cd4f91fbdd80c4a5fe0d7bde8666d6b58f245"}], 0x12a0}, 0x1008) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x5}}, 0x1c) socket$inet6(0xa, 0x0, 0x0) 00:28:31 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb000000) 00:28:31 executing program 4 (fault-call:20 fault-nth:4): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\a', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:28:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2404000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:31 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x0) shutdown(r0, 0x1) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:28:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:28:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2405000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:31 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc000000) [ 2089.181755][T23902] FAULT_INJECTION: forcing a failure. [ 2089.181755][T23902] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.215058][T23902] CPU: 1 PID: 23902 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 00:28:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00\b', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 2089.223793][T23902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2089.233860][T23902] Call Trace: [ 2089.237183][T23902] dump_stack+0x197/0x210 [ 2089.241539][T23902] should_fail.cold+0xa/0x15 [ 2089.246155][T23902] ? fault_create_debugfs_attr+0x180/0x180 [ 2089.251985][T23902] ? ___might_sleep+0x163/0x2c0 [ 2089.256861][T23902] __should_failslab+0x121/0x190 [ 2089.261827][T23902] should_failslab+0x9/0x14 [ 2089.266606][T23902] kmem_cache_alloc_node_trace+0x274/0x750 [ 2089.272949][T23902] ? rcu_read_lock_any_held.part.0+0x50/0x50 00:28:31 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2406000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2089.278945][T23902] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2089.284778][T23902] __kmalloc_node_track_caller+0x3d/0x70 [ 2089.290431][T23902] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2089.295829][T23902] __alloc_skb+0x10b/0x5e0 [ 2089.300262][T23902] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2089.305831][T23902] alloc_skb_with_frags+0x93/0x590 [ 2089.310956][T23902] ? __kasan_check_read+0x11/0x20 [ 2089.315991][T23902] ? __lock_acquire+0x16f2/0x4a00 [ 2089.321203][T23902] ? __lock_acquire+0x16f2/0x4a00 [ 2089.326245][T23902] sock_alloc_send_pskb+0x7ad/0x920 00:28:31 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe000000) [ 2089.331457][T23902] ? release_sock+0x156/0x1c0 [ 2089.336146][T23902] ? sock_wmalloc+0x120/0x120 [ 2089.340832][T23902] ? _raw_spin_unlock_bh+0x2c/0x30 [ 2089.345962][T23902] ? __local_bh_enable_ip+0x15a/0x270 [ 2089.351343][T23902] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2089.356641][T23902] ? release_sock+0x156/0x1c0 [ 2089.361328][T23902] ? trace_hardirqs_on+0x67/0x240 [ 2089.366363][T23902] ? release_sock+0x156/0x1c0 [ 2089.371072][T23902] sock_alloc_send_skb+0x32/0x40 [ 2089.376086][T23902] dccp_sendmsg+0x2c2/0xd20 [ 2089.380601][T23902] ? aa_af_perm+0x2a0/0x2a0 [ 2089.385116][T23902] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2089.390768][T23902] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2089.396327][T23902] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2089.402583][T23902] inet_sendmsg+0x9e/0xe0 [ 2089.406928][T23902] ? inet_send_prepare+0x4e0/0x4e0 [ 2089.412089][T23902] sock_sendmsg+0xd7/0x130 [ 2089.416515][T23902] ____sys_sendmsg+0x358/0x880 [ 2089.421294][T23902] ? kernel_sendmsg+0x50/0x50 [ 2089.425987][T23902] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2089.431542][T23902] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2089.437979][T23902] ? find_held_lock+0x35/0x130 [ 2089.442780][T23902] ___sys_sendmsg+0x100/0x170 [ 2089.447477][T23902] ? sendmsg_copy_msghdr+0x70/0x70 [ 2089.452601][T23902] ? __kasan_check_read+0x11/0x20 [ 2089.457646][T23902] ? __might_fault+0x12b/0x1e0 [ 2089.462420][T23902] ? find_held_lock+0x35/0x130 [ 2089.467197][T23902] ? __might_fault+0x12b/0x1e0 [ 2089.471974][T23902] ? ksys_dup3+0x3e0/0x3e0 [ 2089.476579][T23902] ? lock_downgrade+0x920/0x920 [ 2089.481450][T23902] ? ___might_sleep+0x163/0x2c0 [ 2089.486297][T23902] __sys_sendmmsg+0x1bf/0x4d0 [ 2089.486316][T23902] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2089.486348][T23902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2089.486362][T23902] ? fput_many+0x12c/0x1a0 [ 2089.486379][T23902] ? fput+0x1b/0x20 [ 2089.496050][T23902] ? ksys_write+0x1cf/0x290 [ 2089.496071][T23902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2089.496085][T23902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2089.496104][T23902] ? do_syscall_64+0x26/0x790 [ 2089.506721][T23902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2089.506735][T23902] ? do_syscall_64+0x26/0x790 [ 2089.506762][T23902] __x64_sys_sendmmsg+0x9d/0x100 [ 2089.506780][T23902] do_syscall_64+0xfa/0x790 [ 2089.515057][T23902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2089.525924][T23902] RIP: 0033:0x45a6f9 [ 2089.525940][T23902] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2089.525947][T23902] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2089.525961][T23902] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2089.525969][T23902] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2089.525982][T23902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2089.536694][T23902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2089.536702][T23902] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a 00:28:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\x14\xbd\xf9\xdf-\xea\xc8\xc1w\x00\x17\x12H\xe9\x11\x93Q0\x80oEu\ro}\xe6]\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x<\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRES64=r1], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x2, 0x6, 0x0, 0x8, 0x3, 0x0, 0x1, 0x363, 0x40, 0x1ba, 0xfffffffc, 0x9, 0x38, 0x2, 0x0, 0x1, 0x8001}, [{0x6474e551, 0xb493, 0x5, 0x8, 0x400, 0x6, 0x10000, 0x80000000}, {0x7, 0x7, 0xfffffffffffffffd, 0x1, 0x0, 0x100, 0x29, 0x3034}], "78ce62fb92dadb315eef465867954e0faa5bc0a7f49f16111ca1e1fc391fb8789615cb8ddafe3c7bfc91ec731c3a53913ea17f7ac5a1d249b4fd3791bb98da601ae4f9eb16be3a53d368da92a5e1774d8393f0a4d9b700ff1d331e3a1acfd5a4b1e5df32345ecf7fd54a8c52892e84e136180edc4de61e95136c"}, 0x12a) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000180)={0xffffffe1, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x28}}}}, 0x88) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0100001000f3790000000000000000ff0100000000000000000000000000017f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES16], 0x4}}, 0x0) 00:28:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00H', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:28:39 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2407000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:39 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf000000) 00:28:39 executing program 4 (fault-call:20 fault-nth:5): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 2097.714979][T23953] FAULT_INJECTION: forcing a failure. [ 2097.714979][T23953] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.755857][T23953] CPU: 0 PID: 23953 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2097.764556][T23953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.774793][T23953] Call Trace: [ 2097.778108][T23953] dump_stack+0x197/0x210 [ 2097.782467][T23953] should_fail.cold+0xa/0x15 [ 2097.787056][T23953] ? __kasan_check_read+0x11/0x20 [ 2097.787078][T23953] ? fault_create_debugfs_attr+0x180/0x180 [ 2097.787090][T23953] ? memcpy+0x46/0x50 [ 2097.787109][T23953] ? dccp_insert_fn_opt+0x241/0x310 [ 2097.787131][T23953] __should_failslab+0x121/0x190 [ 2097.787148][T23953] should_failslab+0x9/0x14 [ 2097.787159][T23953] kmem_cache_alloc+0x47/0x710 [ 2097.787176][T23953] ? dccp_feat_clone_list+0x4c0/0x4c0 [ 2097.787194][T23953] dccp_ackvec_update_records+0x30/0x430 [ 2097.787209][T23953] dccp_insert_options+0x9c5/0xc70 [ 2097.787229][T23953] dccp_transmit_skb+0x1c4/0x12a0 [ 2097.802023][T23953] dccp_xmit_packet+0x1f6/0x660 [ 2097.802042][T23953] dccp_write_xmit+0x17f/0x1e0 00:28:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="240f000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2097.802060][T23953] dccp_sendmsg+0xa87/0xd20 [ 2097.802082][T23953] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2097.802103][T23953] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2097.868499][T23953] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2097.874763][T23953] inet_sendmsg+0x9e/0xe0 [ 2097.879108][T23953] ? inet_send_prepare+0x4e0/0x4e0 [ 2097.884231][T23953] sock_sendmsg+0xd7/0x130 [ 2097.888659][T23953] ____sys_sendmsg+0x358/0x880 [ 2097.893432][T23953] ? kernel_sendmsg+0x50/0x50 [ 2097.898114][T23953] ? rcu_read_lock_sched_held+0x9c/0xd0 00:28:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2448000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:40 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x10000000) [ 2097.903694][T23953] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2097.909676][T23953] ? find_held_lock+0x35/0x130 [ 2097.914453][T23953] ___sys_sendmsg+0x100/0x170 [ 2097.919141][T23953] ? sendmsg_copy_msghdr+0x70/0x70 [ 2097.924260][T23953] ? __kasan_check_read+0x11/0x20 [ 2097.929299][T23953] ? __might_fault+0x12b/0x1e0 [ 2097.934070][T23953] ? find_held_lock+0x35/0x130 [ 2097.938841][T23953] ? __might_fault+0x12b/0x1e0 [ 2097.943614][T23953] ? ksys_dup3+0x3e0/0x3e0 [ 2097.948040][T23953] ? lock_downgrade+0x920/0x920 [ 2097.952909][T23953] ? ___might_sleep+0x163/0x2c0 [ 2097.957791][T23953] __sys_sendmmsg+0x1bf/0x4d0 [ 2097.962518][T23953] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2097.967572][T23953] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2097.973857][T23953] ? fput_many+0x12c/0x1a0 [ 2097.978298][T23953] ? fput+0x1b/0x20 [ 2097.982119][T23953] ? ksys_write+0x1cf/0x290 [ 2097.986634][T23953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2097.986650][T23953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2097.986666][T23953] ? do_syscall_64+0x26/0x790 [ 2097.986682][T23953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2097.986693][T23953] ? do_syscall_64+0x26/0x790 [ 2097.986714][T23953] __x64_sys_sendmmsg+0x9d/0x100 [ 2097.986729][T23953] do_syscall_64+0xfa/0x790 [ 2097.986746][T23953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2097.986757][T23953] RIP: 0033:0x45a6f9 [ 2097.986770][T23953] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:28:40 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x11000000) [ 2097.986777][T23953] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2097.986789][T23953] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2097.986797][T23953] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2097.986806][T23953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2097.986815][T23953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2097.986821][T23953] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a 00:28:40 executing program 4 (fault-call:20 fault-nth:6): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:40 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="244c000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2098.338524][T23984] FAULT_INJECTION: forcing a failure. [ 2098.338524][T23984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2098.351777][T23984] CPU: 1 PID: 23984 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2098.360452][T23984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2098.370515][T23984] Call Trace: [ 2098.373909][T23984] dump_stack+0x197/0x210 [ 2098.378264][T23984] should_fail.cold+0xa/0x15 [ 2098.382861][T23984] ? fault_create_debugfs_attr+0x180/0x180 [ 2098.388653][T23984] ? __kasan_check_read+0x11/0x20 [ 2098.393675][T23984] ? __lock_acquire+0x16f2/0x4a00 [ 2098.398780][T23984] ? alloc_skb_with_frags+0x93/0x590 [ 2098.404120][T23984] should_fail_alloc_page+0x50/0x60 [ 2098.409383][T23984] __alloc_pages_nodemask+0x1a1/0x910 [ 2098.414801][T23984] ? fs_reclaim_release+0xf/0x30 [ 2098.419734][T23984] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2098.425619][T23984] ? fs_reclaim_release+0xf/0x30 [ 2098.430551][T23984] ? fault_create_debugfs_attr+0x180/0x180 [ 2098.436376][T23984] cache_grow_begin+0x90/0xc60 [ 2098.441136][T23984] ? __kmalloc_node_track_caller+0x3d/0x70 [ 2098.446939][T23984] ? trace_hardirqs_off+0x62/0x240 [ 2098.452037][T23984] kmem_cache_alloc_node_trace+0x689/0x750 [ 2098.457839][T23984] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2098.463810][T23984] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2098.469601][T23984] __kmalloc_node_track_caller+0x3d/0x70 [ 2098.475219][T23984] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2098.480599][T23984] __alloc_skb+0x10b/0x5e0 [ 2098.485029][T23984] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 2098.490588][T23984] alloc_skb_with_frags+0x93/0x590 [ 2098.495706][T23984] ? __kasan_check_read+0x11/0x20 [ 2098.500738][T23984] ? __lock_acquire+0x16f2/0x4a00 [ 2098.505761][T23984] ? __lock_acquire+0x16f2/0x4a00 [ 2098.505784][T23984] sock_alloc_send_pskb+0x7ad/0x920 [ 2098.505799][T23984] ? release_sock+0x156/0x1c0 [ 2098.505817][T23984] ? sock_wmalloc+0x120/0x120 [ 2098.516004][T23984] ? _raw_spin_unlock_bh+0x2c/0x30 [ 2098.516016][T23984] ? __local_bh_enable_ip+0x15a/0x270 [ 2098.516029][T23984] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2098.516041][T23984] ? release_sock+0x156/0x1c0 [ 2098.516056][T23984] ? trace_hardirqs_on+0x67/0x240 [ 2098.516073][T23984] ? release_sock+0x156/0x1c0 [ 2098.555804][T23984] sock_alloc_send_skb+0x32/0x40 [ 2098.560750][T23984] dccp_sendmsg+0x2c2/0xd20 [ 2098.565253][T23984] ? aa_af_perm+0x2a0/0x2a0 [ 2098.569868][T23984] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2098.575507][T23984] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2098.581052][T23984] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2098.587309][T23984] inet_sendmsg+0x9e/0xe0 [ 2098.591630][T23984] ? inet_send_prepare+0x4e0/0x4e0 [ 2098.596742][T23984] sock_sendmsg+0xd7/0x130 [ 2098.601142][T23984] ____sys_sendmsg+0x358/0x880 [ 2098.605898][T23984] ? kernel_sendmsg+0x50/0x50 [ 2098.610563][T23984] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2098.616270][T23984] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2098.622234][T23984] ? find_held_lock+0x35/0x130 [ 2098.627255][T23984] ___sys_sendmsg+0x100/0x170 [ 2098.631938][T23984] ? sendmsg_copy_msghdr+0x70/0x70 [ 2098.637031][T23984] ? __kasan_check_read+0x11/0x20 [ 2098.642116][T23984] ? __might_fault+0x12b/0x1e0 [ 2098.646865][T23984] ? find_held_lock+0x35/0x130 [ 2098.651723][T23984] ? __might_fault+0x12b/0x1e0 [ 2098.656475][T23984] ? ksys_dup3+0x3e0/0x3e0 [ 2098.660886][T23984] ? lock_downgrade+0x920/0x920 [ 2098.665724][T23984] ? ___might_sleep+0x163/0x2c0 [ 2098.670686][T23984] __sys_sendmmsg+0x1bf/0x4d0 [ 2098.675355][T23984] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2098.680419][T23984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2098.686648][T23984] ? fput_many+0x12c/0x1a0 [ 2098.691047][T23984] ? fput+0x1b/0x20 [ 2098.694840][T23984] ? ksys_write+0x1cf/0x290 [ 2098.699325][T23984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2098.704769][T23984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2098.710225][T23984] ? do_syscall_64+0x26/0x790 [ 2098.714887][T23984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2098.720940][T23984] ? do_syscall_64+0x26/0x790 [ 2098.725601][T23984] __x64_sys_sendmmsg+0x9d/0x100 [ 2098.730535][T23984] do_syscall_64+0xfa/0x790 [ 2098.735021][T23984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2098.740903][T23984] RIP: 0033:0x45a6f9 [ 2098.744787][T23984] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2098.765669][T23984] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2098.774067][T23984] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2098.782019][T23984] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2098.790065][T23984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2098.798363][T23984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2098.806312][T23984] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a 00:28:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010066710000340002000800050000010000080006000000000008000200000000000800080000000000080009000000000008000300000000004a83bbcd97fb91b3b57fa9c92810a347a34e03643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b079aa287d272cc36afee99cd1c647fb5cbdacf09f9df2c5e1280214552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4dc32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c999173d8996fe497e4c35b875acbdfd5f41f830cbc05071692302fae7258707b90b311fd45dc7dba15b0df17904638d05a5c7e21fc53bda34e14253bda1d72b272e86154d1031eed2dd7207b3adabbbf2bc1067b9eda4de66381dd01d56505a72646febb8e2e16763a4272842ef64eb0fd0c469c07a26579a66d59250b72e448f82626a4860517feac71323779f939fccbf82dbd9db7ed357e8f0003d1dab5a4d124562f3088fecbde3d90baf91854866c70c4eae954ee3b24573c63a60a125d1a6ac6c0bf6284b3322a02217cdc64de8aaa96607a6c1aabfe7f6defe2761436f00"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x12000000) 00:28:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00L', {0x2, 0x0, @rand_addr=0xfdfdffff}}) 00:28:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2460000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:28:50 executing program 4 (fault-call:20 fault-nth:7): getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) write$binfmt_script(r1, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) mmap(&(0x7f0000d2e000/0x3000)=nil, 0x3000, 0x4, 0x40010, r4, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0), 0xc) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:28:50 executing program 5: socket(0x4000000001d, 0xa, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, 0xfffffffffffffffe) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, 0xfffffffffffffffe) r3 = socket(0x2c1a92186580bee2, 0x3, 0x66) accept4$netrom(r3, &(0x7f0000000140)={{0x3, @netrom}, [@remote, @netrom, @rose, @remote, @rose, @netrom, @bcast, @null]}, &(0x7f0000000100)=0xd3ad0862, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, 0xfffffffffffffffe) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f0000000000)={0x6, 'bcsf0\x00', {}, 0x7}) 00:28:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x13000000) 00:28:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2468000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2108.216818][T23996] FAULT_INJECTION: forcing a failure. [ 2108.216818][T23996] name failslab, interval 1, probability 0, space 0, times 0 [ 2108.241224][T23996] CPU: 0 PID: 23996 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2108.249943][T23996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2108.259996][T23996] Call Trace: [ 2108.263309][T23996] dump_stack+0x197/0x210 [ 2108.267664][T23996] should_fail.cold+0xa/0x15 [ 2108.272275][T23996] ? fault_create_debugfs_attr+0x180/0x180 [ 2108.278110][T23996] ? ___might_sleep+0x163/0x2c0 [ 2108.282994][T23996] __should_failslab+0x121/0x190 [ 2108.287950][T23996] should_failslab+0x9/0x14 [ 2108.292738][T23996] kmem_cache_alloc_trace+0x2d3/0x790 [ 2108.298231][T23996] dccp_feat_entry_new+0x1b6/0x3b0 [ 2108.303893][T23996] dccp_feat_push_confirm+0x2c/0x250 [ 2108.309223][T23996] dccp_feat_parse_options+0x1643/0x1bc0 [ 2108.314995][T23996] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2108.320939][T23996] ? dccp_feat_server_ccid_dependencies+0x2a0/0x2a0 [ 2108.327553][T23996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2108.333818][T23996] ? dccp_ackvec_parsed_add+0x1c8/0x250 [ 2108.339395][T23996] dccp_parse_options+0x69d/0x1250 [ 2108.344551][T23996] dccp_rcv_established+0x42/0xb0 [ 2108.349671][T23996] dccp_v4_do_rcv+0x139/0x190 [ 2108.354635][T23996] __release_sock+0x129/0x390 [ 2108.359341][T23996] release_sock+0x59/0x1c0 [ 2108.363777][T23996] dccp_sendmsg+0x6be/0xd20 [ 2108.368301][T23996] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2108.373978][T23996] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2108.379543][T23996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2108.385804][T23996] inet_sendmsg+0x9e/0xe0 [ 2108.391717][T23996] ? inet_send_prepare+0x4e0/0x4e0 [ 2108.396836][T23996] sock_sendmsg+0xd7/0x130 [ 2108.401249][T23996] ____sys_sendmsg+0x358/0x880 [ 2108.406111][T23996] ? kernel_sendmsg+0x50/0x50 [ 2108.410844][T23996] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2108.416401][T23996] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2108.422473][T23996] ? find_held_lock+0x35/0x130 [ 2108.427263][T23996] ___sys_sendmsg+0x100/0x170 [ 2108.431961][T23996] ? sendmsg_copy_msghdr+0x70/0x70 [ 2108.431981][T23996] ? __kasan_check_read+0x11/0x20 [ 2108.442754][T23996] ? __might_fault+0x12b/0x1e0 [ 2108.447615][T23996] ? find_held_lock+0x35/0x130 [ 2108.447630][T23996] ? __might_fault+0x12b/0x1e0 [ 2108.447649][T23996] ? ksys_dup3+0x3e0/0x3e0 [ 2108.461599][T23996] ? lock_downgrade+0x920/0x920 00:28:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x14000000) 00:28:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="246c000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2108.466499][T23996] ? ___might_sleep+0x163/0x2c0 [ 2108.471367][T23996] __sys_sendmmsg+0x1bf/0x4d0 [ 2108.476063][T23996] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2108.481126][T23996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2108.487384][T23996] ? fput_many+0x12c/0x1a0 [ 2108.491817][T23996] ? fput+0x1b/0x20 [ 2108.495632][T23996] ? ksys_write+0x1cf/0x290 [ 2108.500675][T23996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.506181][T23996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.511651][T23996] ? do_syscall_64+0x26/0x790 00:28:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="2474000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) 00:28:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x30000000) [ 2108.516347][T23996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.522424][T23996] ? do_syscall_64+0x26/0x790 [ 2108.527122][T23996] __x64_sys_sendmmsg+0x9d/0x100 [ 2108.532108][T23996] do_syscall_64+0xfa/0x790 [ 2108.536632][T23996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.542724][T23996] RIP: 0033:0x45a6f9 [ 2108.546625][T23996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2108.568080][T23996] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2108.577811][T23996] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2108.577819][T23996] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2108.577827][T23996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2108.577834][T23996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 00:28:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'syz_tun\x00\x00\x00\x00\x00\x00\x00\x00h', {0x2, 0x0, @rand_addr=0xfdfdffff}}) [ 2108.577842][T23996] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a [ 2108.581465][T23996] dccp_parse_options: DCCP(000000000f9430ae): Option 32 (len=7) error=9 [ 2108.644028][T23996] ================================================================== [ 2108.653842][T23996] BUG: KASAN: use-after-free in ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2108.662089][T23996] Read of size 1 at addr ffff8880990a649d by task syz-executor.4/23996 [ 2108.662120][T23996] [ 2108.662139][T23996] CPU: 0 PID: 23996 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2108.682682][T23996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2108.693025][T23996] Call Trace: [ 2108.696333][T23996] dump_stack+0x197/0x210 [ 2108.700692][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2108.706630][T23996] print_address_description.constprop.0.cold+0xd4/0x30b 00:28:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r1, &(0x7f000018efdc)="247a000052001f0014f9f407000904000a00071002000700feffffff0800000000000000", 0x24) [ 2108.713665][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2108.719475][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2108.719493][T23996] __kasan_report.cold+0x1b/0x41 [ 2108.719510][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2108.719526][T23996] kasan_report+0x12/0x20 [ 2108.719540][T23996] __asan_report_load1_noabort+0x14/0x20 [ 2108.719552][T23996] ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2108.719578][T23996] ? ccid2_hc_tx_rto_expire+0x6f0/0x6f0 [ 2108.757770][T23996] dccp_deliver_input_to_ccids+0x1f8/0x270 [ 2108.763603][T23996] dccp_rcv_established+0x83/0xb0 00:28:50 executing program 2: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="600000002a000700006eec100000000000400000", @ANYRES32=r2, @ANYBLOB="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"/493], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x31030000) [ 2108.768649][T23996] dccp_v4_do_rcv+0x139/0x190 [ 2108.773348][T23996] __release_sock+0x129/0x390 [ 2108.778037][T23996] release_sock+0x59/0x1c0 [ 2108.778054][T23996] dccp_sendmsg+0x6be/0xd20 [ 2108.778074][T23996] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2108.778095][T23996] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2108.778120][T23996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2108.778137][T23996] inet_sendmsg+0x9e/0xe0 [ 2108.778154][T23996] ? inet_send_prepare+0x4e0/0x4e0 [ 2108.814954][T23996] sock_sendmsg+0xd7/0x130 [ 2108.814975][T23996] ____sys_sendmsg+0x358/0x880 [ 2108.814994][T23996] ? kernel_sendmsg+0x50/0x50 [ 2108.815011][T23996] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2108.815030][T23996] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2108.840708][T23996] ? find_held_lock+0x35/0x130 [ 2108.840738][T23996] ___sys_sendmsg+0x100/0x170 [ 2108.840758][T23996] ? sendmsg_copy_msghdr+0x70/0x70 [ 2108.840772][T23996] ? __kasan_check_read+0x11/0x20 [ 2108.840791][T23996] ? __might_fault+0x12b/0x1e0 [ 2108.865165][T23996] ? find_held_lock+0x35/0x130 [ 2108.869947][T23996] ? __might_fault+0x12b/0x1e0 [ 2108.874728][T23996] ? ksys_dup3+0x3e0/0x3e0 [ 2108.879194][T23996] ? lock_downgrade+0x920/0x920 [ 2108.884071][T23996] ? ___might_sleep+0x163/0x2c0 [ 2108.888939][T23996] __sys_sendmmsg+0x1bf/0x4d0 [ 2108.893732][T23996] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2108.898791][T23996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2108.905047][T23996] ? fput_many+0x12c/0x1a0 [ 2108.909485][T23996] ? fput+0x1b/0x20 [ 2108.913307][T23996] ? ksys_write+0x1cf/0x290 [ 2108.917833][T23996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.923313][T23996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2108.928786][T23996] ? do_syscall_64+0x26/0x790 [ 2108.933481][T23996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.939572][T23996] ? do_syscall_64+0x26/0x790 [ 2108.944278][T23996] __x64_sys_sendmmsg+0x9d/0x100 [ 2108.949243][T23996] do_syscall_64+0xfa/0x790 [ 2108.953768][T23996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2108.959667][T23996] RIP: 0033:0x45a6f9 [ 2108.963574][T23996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2108.983190][T23996] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2108.991617][T23996] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2108.999602][T23996] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2109.007855][T23996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2109.007864][T23996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2109.007871][T23996] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a [ 2109.007892][T23996] [ 2109.007900][T23996] Allocated by task 23996: [ 2109.007917][T23996] save_stack+0x23/0x90 [ 2109.007935][T23996] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2109.035143][T23996] kasan_kmalloc+0x9/0x10 [ 2109.035157][T23996] __kmalloc_node_track_caller+0x4e/0x70 [ 2109.035171][T23996] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2109.035187][T23996] __alloc_skb+0x10b/0x5e0 [ 2109.060107][T23996] dccp_send_ack+0xd6/0x360 [ 2109.060122][T23996] ccid2_hc_rx_packet_recv+0x139/0x1b0 [ 2109.060135][T23996] dccp_deliver_input_to_ccids+0xeb/0x270 [ 2109.060152][T23996] dccp_rcv_established+0x83/0xb0 [ 2109.074422][T23996] dccp_v4_do_rcv+0x139/0x190 [ 2109.074437][T23996] __sk_receive_skb+0x335/0xc60 [ 2109.074447][T23996] dccp_v4_rcv+0xf7c/0x1dd2 [ 2109.074538][T23996] ip_protocol_deliver_rcu+0x5a/0x880 [ 2109.095287][T23996] ip_local_deliver_finish+0x23b/0x380 [ 2109.095301][T23996] ip_local_deliver+0x1e9/0x520 [ 2109.095311][T23996] ip_rcv_finish+0x1db/0x2f0 [ 2109.095326][T23996] ip_rcv+0xe8/0x3f0 [ 2109.104649][T23996] __netif_receive_skb_one_core+0x113/0x1a0 [ 2109.104662][T23996] __netif_receive_skb+0x2c/0x1d0 [ 2109.104675][T23996] process_backlog+0x206/0x750 [ 2109.104690][T23996] net_rx_action+0x508/0x1120 [ 2109.149171][T23996] __do_softirq+0x262/0x98c [ 2109.153675][T23996] [ 2109.156016][T23996] Freed by task 23996: [ 2109.160097][T23996] save_stack+0x23/0x90 [ 2109.164260][T23996] __kasan_slab_free+0x102/0x150 00:28:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 2109.169386][T23996] kasan_slab_free+0xe/0x10 [ 2109.173896][T23996] kfree+0x10a/0x2c0 [ 2109.178654][T23996] skb_free_head+0x93/0xb0 [ 2109.183094][T23996] skb_release_data+0x551/0x8d0 [ 2109.187959][T23996] skb_release_all+0x4d/0x60 [ 2109.192553][T23996] kfree_skb+0x101/0x420 [ 2109.196792][T23996] dccp_v4_do_rcv+0x160/0x190 [ 2109.196803][T23996] __release_sock+0x129/0x390 [ 2109.196813][T23996] release_sock+0x59/0x1c0 [ 2109.196823][T23996] dccp_sendmsg+0x6be/0xd20 [ 2109.196835][T23996] inet_sendmsg+0x9e/0xe0 [ 2109.196847][T23996] sock_sendmsg+0xd7/0x130 [ 2109.196857][T23996] ____sys_sendmsg+0x358/0x880 [ 2109.196874][T23996] ___sys_sendmsg+0x100/0x170 [ 2109.233279][T23996] __sys_sendmmsg+0x1bf/0x4d0 [ 2109.237976][T23996] __x64_sys_sendmmsg+0x9d/0x100 [ 2109.242934][T23996] do_syscall_64+0xfa/0x790 [ 2109.247460][T23996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.253493][T23996] [ 2109.255826][T23996] The buggy address belongs to the object at ffff8880990a6000 [ 2109.255826][T23996] which belongs to the cache kmalloc-2k of size 2048 [ 2109.269863][T23996] The buggy address is located 1181 bytes inside of [ 2109.269863][T23996] 2048-byte region [ffff8880990a6000, ffff8880990a6800) [ 2109.283300][T23996] The buggy address belongs to the page: [ 2109.288926][T23996] page:ffffea0002642980 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 [ 2109.298023][T23996] raw: 00fffe0000000200 ffffea00025dfe48 ffffea00027c3ec8 ffff8880aa400e00 [ 2109.306604][T23996] raw: 0000000000000000 ffff8880990a6000 0000000100000001 0000000000000000 [ 2109.315191][T23996] page dumped because: kasan: bad access detected [ 2109.322803][T23996] [ 2109.325112][T23996] Memory state around the buggy address: [ 2109.330728][T23996] ffff8880990a6380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2109.338799][T23996] ffff8880990a6400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2109.346863][T23996] >ffff8880990a6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2109.354986][T23996] ^ [ 2109.359823][T23996] ffff8880990a6500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2109.367875][T23996] ffff8880990a6580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2109.376785][T23996] ================================================================== [ 2109.384838][T23996] Disabling lock debugging due to kernel taint [ 2109.392744][T23996] Kernel panic - not syncing: panic_on_warn set ... [ 2109.399351][T23996] CPU: 0 PID: 23996 Comm: syz-executor.4 Tainted: G B 5.5.0-rc1-syzkaller #0 [ 2109.409519][T23996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2109.419560][T23996] Call Trace: [ 2109.422840][T23996] dump_stack+0x197/0x210 [ 2109.427157][T23996] panic+0x2e3/0x75c [ 2109.431074][T23996] ? add_taint.cold+0x16/0x16 [ 2109.435836][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2109.441643][T23996] ? preempt_schedule+0x4b/0x60 [ 2109.446502][T23996] ? ___preempt_schedule+0x16/0x18 [ 2109.451623][T23996] ? trace_hardirqs_on+0x5e/0x240 [ 2109.456819][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2109.462611][T23996] end_report+0x47/0x4f [ 2109.466751][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2109.472886][T23996] __kasan_report.cold+0xe/0x41 [ 2109.477722][T23996] ? ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2109.483778][T23996] kasan_report+0x12/0x20 [ 2109.488111][T23996] __asan_report_load1_noabort+0x14/0x20 [ 2109.493732][T23996] ccid2_hc_tx_packet_recv+0x21cf/0x2240 [ 2109.499358][T23996] ? ccid2_hc_tx_rto_expire+0x6f0/0x6f0 [ 2109.504889][T23996] dccp_deliver_input_to_ccids+0x1f8/0x270 [ 2109.510679][T23996] dccp_rcv_established+0x83/0xb0 [ 2109.515695][T23996] dccp_v4_do_rcv+0x139/0x190 [ 2109.520365][T23996] __release_sock+0x129/0x390 [ 2109.525028][T23996] release_sock+0x59/0x1c0 [ 2109.529484][T23996] dccp_sendmsg+0x6be/0xd20 [ 2109.533990][T23996] ? perf_trace_dccp_probe+0x1000/0x1000 [ 2109.539815][T23996] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2109.545349][T23996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2109.551611][T23996] inet_sendmsg+0x9e/0xe0 [ 2109.555950][T23996] ? inet_send_prepare+0x4e0/0x4e0 [ 2109.561050][T23996] sock_sendmsg+0xd7/0x130 [ 2109.565468][T23996] ____sys_sendmsg+0x358/0x880 [ 2109.570227][T23996] ? kernel_sendmsg+0x50/0x50 [ 2109.574902][T23996] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2109.580442][T23996] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2109.586499][T23996] ? find_held_lock+0x35/0x130 [ 2109.591262][T23996] ___sys_sendmsg+0x100/0x170 [ 2109.595930][T23996] ? sendmsg_copy_msghdr+0x70/0x70 [ 2109.601022][T23996] ? __kasan_check_read+0x11/0x20 [ 2109.606135][T23996] ? __might_fault+0x12b/0x1e0 [ 2109.610879][T23996] ? find_held_lock+0x35/0x130 [ 2109.615650][T23996] ? __might_fault+0x12b/0x1e0 [ 2109.620413][T23996] ? ksys_dup3+0x3e0/0x3e0 [ 2109.624814][T23996] ? lock_downgrade+0x920/0x920 [ 2109.629660][T23996] ? ___might_sleep+0x163/0x2c0 [ 2109.634505][T23996] __sys_sendmmsg+0x1bf/0x4d0 [ 2109.639167][T23996] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 2109.644188][T23996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2109.650415][T23996] ? fput_many+0x12c/0x1a0 [ 2109.657937][T23996] ? fput+0x1b/0x20 [ 2109.661740][T23996] ? ksys_write+0x1cf/0x290 [ 2109.666237][T23996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2109.671811][T23996] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2109.677260][T23996] ? do_syscall_64+0x26/0x790 [ 2109.682526][T23996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.688672][T23996] ? do_syscall_64+0x26/0x790 [ 2109.693348][T23996] __x64_sys_sendmmsg+0x9d/0x100 [ 2109.698268][T23996] do_syscall_64+0xfa/0x790 [ 2109.702754][T23996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2109.708634][T23996] RIP: 0033:0x45a6f9 [ 2109.712528][T23996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2109.732426][T23996] RSP: 002b:00007f1615f8ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 2109.740825][T23996] RAX: ffffffffffffffda RBX: 00007f1615f8ec90 RCX: 000000000045a6f9 [ 2109.748780][T23996] RDX: 04000000000001e6 RSI: 0000000020000c00 RDI: 0000000000000005 [ 2109.756739][T23996] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2109.764702][T23996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1615f8f6d4 [ 2109.772662][T23996] R13: 00000000004c9063 R14: 00000000004e0c68 R15: 000000000000000a [ 2109.782342][T23996] Kernel Offset: disabled [ 2109.786669][T23996] Rebooting in 86400 seconds..