001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:20:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x11, 0x28) 08:20:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0xfffffdef}}, 0x0) 08:20:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x80000000) 08:20:58 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000000079) ioctl$KVM_SET_PIT2(r0, 0x8038550a, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e23, @multicast2}, 0x80) fcntl$notify(r1, 0x402, 0x10) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000280)={0xfff, 0x7, 0x1, 0x3, 0x8, 0x7, 0x3f, 0x22, 0x2, 0x5, 0x4}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x7) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc010643a, &(0x7f0000000040)={0x20000001, 0xfffffffffffffffa, 0x11}) 08:20:58 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:20:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x11, 0x28) 08:20:58 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:20:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x2}, 0x0) 08:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe4\xb4_ 0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:20:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000030) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@v2={0x7, 0x0, 0x7, 0x800, 0xae, "1ceaf8672448ebb3b82b0d9aeb4c9cd15b88590f9b45935a94310020cd3ea81ba259bb89b203b3161bb90abc72fd8de020fe33e80bc5c2a0ada1e5b833cbe644ca35baa337e1b6bc76067bb5fac00d1fe540d8c2976e1ce6c9a145bbccb3f51df5124abb40022acc4bf65b97ac90dd24426220bb196bd0411ee52c56146a0b6ee238abbe5fdc3cfd58ace2718b147bb331a4c73abf5a53b8651e0b012951919b79684cde9377e6078e41b01552cd"}, 0xb8, 0x2) fcntl$notify(r0, 0x402, 0x80000010) fcntl$notify(r1, 0x402, 0x28) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x518eb5ad, 0x7, 0x80, 0x6, 0x8, 0x2, 0x6, 0x6, 0xfd, 0x40, 0x12, 0x7ff, 0x100, 0x38, 0x1, 0x100000001, 0xffffffffffffb401, 0x7}, [{0x5, 0x5, 0x0, 0x6d7a03, 0x5, 0x5, 0x8, 0x3}], "ac9ec498bf9da5bc83b4fa9a7630a212f594d3bdb9ff8cc19802aab6", [[], [], [], [], []]}, 0x594) 08:20:58 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:20:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0xfb, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:20:59 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:20:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x81) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x3f}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0xa2, "2cde988d93e29d1a9a8348df485fb2b261470a219fb80b9cb6c8cb5d0f88f2362111eebbbc1a09aa288f3d7605841b04c616db6fb5b95c5aa9cf589629dc09dad2620204020a13e7784d655ab0e2c4b59ab44bce5257995bcf7128d20445f5ab5ce4997406acb9502c9fab528af9ad60648bf37c1a0f4e3849154f207b684db8a8427523723c28bfe0f483e009633170208abb00c6e97fcda3bfe6ceb4ab56327067"}, &(0x7f00000003c0)=0xaa) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) fcntl$notify(r2, 0x402, 0x28) 08:20:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x80000000) 08:20:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:20:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x3}, 0x0) 08:20:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x5}, 0x0) 08:20:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x7, 0x28) 08:20:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:20:59 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10001, 0x28) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x9, [0x100000001, 0xc15, 0x5, 0x2, 0x8, 0xcd, 0x81, 0x7, 0x100000000]}, &(0x7f0000000080)=0x16) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:20:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='/\x00~WM\x00\x00\x00\x00\x90\"\xcf\xde&\x9f\xde\xb9L\xcb5-yn\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xb5\xd4+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:20:59 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:20:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0xfc, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:20:59 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:20:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x7, 0x4, 0x8001, 0x81, 0x0, 0xfd, 0x200, 0x2, 0x4, 0x100000000, 0x7, 0x5fe3, 0x9, 0x7, 0xfffffffffffffffb, 0x2, 0xb4, 0x920b, 0x8d, 0x8, 0xfe2b, 0x1, 0x2, 0x1, 0xffffffffffffffc1, 0x3, 0x9, 0x1e, 0x200, 0x1000, 0xfffffffffffff8a5, 0x1ff, 0x10001, 0x1f, 0x40, 0x7, 0x0, 0x3ff, 0x5, @perf_config_ext={0x8000, 0x120}, 0x2031, 0x3ff, 0x1, 0x0, 0x8001, 0xe063}, r2, 0xb, 0xffffffffffffff9c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) 08:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) r3 = openat(r1, &(0x7f0000000280)='.\x00', 0x500, 0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e24, 0xfffffffffffffff9, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x26}}, 0x1}}, 0xcb, 0x646a}, &(0x7f0000000240)=0x88) r4 = openat$cgroup_ro(r1, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x061\xd3\xf6sX\xd3\xbd\xf3\xb4A\x88\xfa`\x9e\xe8\x06\xeaZjn6YDElPOo\x8d\xd0ja)*Ok\xfcI\x96eP\xac\xf4Z\xbacv\xebia\xdcl_\xc8<\x85\x8d\xd4\x8b\x15\x92\xda\xee\x85\xc1\x9eN\xb8\xdcz,\xec\x88)nRg\\\xdf\x18\x19\x17\x01p\x8f\xd6\x18\xe7V\xfbi\x96\x9c\xa2/\xf5R~\\s\x9f\x8a\xd47\x19\xad{', 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000080)={0x5, 0x1000, 0x1, 0x404}) write$P9_RWSTAT(r3, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) fcntl$notify(r4, 0x402, 0x10) 08:20:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:20:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x8}, 0x0) [ 1818.593489] FAULT_INJECTION: forcing a failure. [ 1818.593489] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.649008] CPU: 1 PID: 21651 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1818.655905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1818.665269] Call Trace: [ 1818.665300] dump_stack+0x172/0x1f0 [ 1818.665324] should_fail.cold+0xa/0x15 [ 1818.665346] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1818.665373] ? ___might_sleep+0x163/0x280 [ 1818.665394] __should_failslab+0x121/0x190 [ 1818.688958] should_failslab+0x9/0x14 [ 1818.692776] kmem_cache_alloc_node+0x264/0x710 [ 1818.697379] __alloc_skb+0xd5/0x5e0 [ 1818.697399] ? skb_trim+0x190/0x190 [ 1818.697418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.704670] ? netlink_autobind.isra.0+0x228/0x310 [ 1818.704693] netlink_sendmsg+0x97b/0xd70 [ 1818.704716] ? netlink_unicast+0x720/0x720 [ 1818.723454] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1818.728326] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1818.733105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.738655] ? security_socket_sendmsg+0x93/0xc0 [ 1818.738674] ? netlink_unicast+0x720/0x720 [ 1818.738693] sock_sendmsg+0xdd/0x130 [ 1818.738712] ___sys_sendmsg+0x806/0x930 [ 1818.738731] ? copy_msghdr_from_user+0x430/0x430 [ 1818.751426] ? lock_downgrade+0x880/0x880 [ 1818.751450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.751470] ? kasan_check_read+0x11/0x20 [ 1818.760202] ? __fget+0x367/0x540 [ 1818.760228] ? ksys_dup3+0x3e0/0x3e0 [ 1818.781177] ? lock_downgrade+0x880/0x880 [ 1818.785351] ? __fget_light+0x1a9/0x230 [ 1818.789340] ? __fdget+0x1b/0x20 [ 1818.792715] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1818.798268] __sys_sendmsg+0x105/0x1d0 [ 1818.802168] ? __ia32_sys_shutdown+0x80/0x80 [ 1818.806583] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1818.806600] ? fput+0x128/0x1a0 [ 1818.806627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1818.806644] ? do_fast_syscall_32+0xd1/0xc98 [ 1818.815459] ? entry_SYSENTER_compat+0x70/0x7f [ 1818.815477] ? do_fast_syscall_32+0xd1/0xc98 [ 1818.815504] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1818.815522] do_fast_syscall_32+0x281/0xc98 [ 1818.824682] entry_SYSENTER_compat+0x70/0x7f 08:21:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0xb}, 0x0) [ 1818.824696] RIP: 0023:0xf7f4e869 [ 1818.824712] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1818.838431] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1818.869412] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1818.869423] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1818.869437] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1818.869446] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1818.869455] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:00 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x244282) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000280)=0x8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0xc}, @multicast1, @rand_addr=0x101}, 0xc) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) 08:21:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:21:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0xf}, 0x0) 08:21:00 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1819.248105] FAULT_INJECTION: forcing a failure. [ 1819.248105] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.275812] CPU: 0 PID: 21685 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1819.282719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1819.292081] Call Trace: [ 1819.294688] dump_stack+0x172/0x1f0 [ 1819.298333] should_fail.cold+0xa/0x15 [ 1819.302238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1819.307366] ? ___might_sleep+0x163/0x280 [ 1819.311533] __should_failslab+0x121/0x190 [ 1819.315781] should_failslab+0x9/0x14 [ 1819.319596] kmem_cache_alloc_node_trace+0x270/0x720 [ 1819.324725] __kmalloc_node_track_caller+0x3d/0x70 [ 1819.324749] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1819.324770] __alloc_skb+0x10b/0x5e0 [ 1819.334378] ? skb_trim+0x190/0x190 [ 1819.334400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.334417] ? netlink_autobind.isra.0+0x228/0x310 [ 1819.334438] netlink_sendmsg+0x97b/0xd70 [ 1819.341780] ? netlink_unicast+0x720/0x720 [ 1819.341800] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1819.341823] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1819.356352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.356371] ? security_socket_sendmsg+0x93/0xc0 [ 1819.356389] ? netlink_unicast+0x720/0x720 [ 1819.356407] sock_sendmsg+0xdd/0x130 [ 1819.356427] ___sys_sendmsg+0x806/0x930 [ 1819.356447] ? copy_msghdr_from_user+0x430/0x430 [ 1819.356469] ? lock_downgrade+0x880/0x880 [ 1819.356486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.370305] ? kasan_check_read+0x11/0x20 [ 1819.370329] ? __fget+0x367/0x540 [ 1819.370353] ? ksys_dup3+0x3e0/0x3e0 [ 1819.370369] ? lock_downgrade+0x880/0x880 [ 1819.380659] ? __fget_light+0x1a9/0x230 [ 1819.380678] ? __fdget+0x1b/0x20 [ 1819.380695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1819.380715] __sys_sendmsg+0x105/0x1d0 [ 1819.388643] ? __ia32_sys_shutdown+0x80/0x80 [ 1819.388663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1819.388679] ? fput+0x128/0x1a0 [ 1819.397408] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1819.397424] ? do_fast_syscall_32+0xd1/0xc98 [ 1819.397439] ? entry_SYSENTER_compat+0x70/0x7f [ 1819.397454] ? do_fast_syscall_32+0xd1/0xc98 [ 1819.397480] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1819.397497] do_fast_syscall_32+0x281/0xc98 [ 1819.397515] entry_SYSENTER_compat+0x70/0x7f [ 1819.397526] RIP: 0023:0xf7f4e869 [ 1819.397542] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1819.397551] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1819.397570] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1819.407244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1819.407255] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1819.407263] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1819.407272] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0xfd, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) fcntl$notify(r0, 0x402, 0x28) open$dir(&(0x7f00000000c0)='./file0\x00', 0x2800, 0x4) 08:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x10}, 0x0) 08:21:01 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0xc) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'veth0_to_bond\x00', 0x0}) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'veth1_to_bridge\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000500)={@multicast2, @loopback, 0x0}, &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'nr0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000840)={0x0, @multicast1, @empty}, &(0x7f0000000880)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000008c0)={@broadcast, @local, 0x0}, &(0x7f0000000900)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001240)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) getsockname$packet(r0, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d80)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000e80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000ec0)={'bridge_slave_1\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001000)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001040)={0x0, @dev, @empty}, &(0x7f0000001080)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001180)={'gretap0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000011c0)={0x11, 0x0, 0x0}, &(0x7f0000001200)=0x14) clock_gettime(0x0, &(0x7f0000006200)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000006140)=[{{&(0x7f0000001840)=@rc, 0x80, &(0x7f0000003cc0)=[{&(0x7f00000018c0)=""/132, 0x84}, {&(0x7f0000001980)=""/106, 0x6a}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000003a00)=""/211, 0xd3}, {&(0x7f0000003b00)=""/43, 0x2b}, {&(0x7f0000003b40)=""/152, 0x98}, {&(0x7f0000003c00)=""/162, 0xa2}], 0x8, &(0x7f0000003d00)=""/49, 0x31}, 0x7}, {{&(0x7f0000003d40)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000004240)=[{&(0x7f0000003dc0)=""/97, 0x61}, {&(0x7f0000003e40)=""/70, 0x46}, {&(0x7f0000003ec0)=""/246, 0xf6}, {&(0x7f0000003fc0)=""/83, 0x53}, {&(0x7f0000004040)=""/118, 0x76}, {&(0x7f00000040c0)=""/34, 0x22}, {&(0x7f0000004100)=""/53, 0x35}, {&(0x7f0000004140)=""/248, 0xf8}], 0x8, &(0x7f0000004280)=""/247, 0xf7}, 0x40}, {{&(0x7f0000004380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000004680)=[{&(0x7f0000004400)=""/175, 0xaf}, {&(0x7f00000044c0)=""/106, 0x6a}, {&(0x7f0000004540)=""/112, 0x70}, {&(0x7f00000045c0)=""/179, 0xb3}], 0x4, &(0x7f00000046c0)=""/33, 0x21}, 0xfffffffffffffc00}, {{&(0x7f0000004700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000005a00)=[{&(0x7f0000004780)=""/144, 0x90}, {&(0x7f0000004840)=""/185, 0xb9}, {&(0x7f0000004900)=""/136, 0x88}, {&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/62, 0x3e}], 0x5, &(0x7f0000005a40)=""/67, 0x43}, 0xff}, {{&(0x7f0000005ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000005e00)=[{&(0x7f0000005b40)=""/174, 0xae}, {&(0x7f0000005c00)=""/158, 0x9e}, {&(0x7f0000005cc0)=""/220, 0xdc}, {&(0x7f0000005dc0)=""/36, 0x24}], 0x4, &(0x7f0000005e40)=""/192, 0xc0}, 0x7}, {{&(0x7f0000005f00)=@nfc, 0x80, &(0x7f0000006100)=[{&(0x7f0000005f80)=""/43, 0x2b}, {&(0x7f0000005fc0)=""/142, 0x8e}, {&(0x7f0000006080)=""/16, 0x10}, {&(0x7f00000060c0)=""/47, 0x2f}], 0x4}, 0x9}], 0x6, 0x10000, &(0x7f0000006240)={r21, r22+10000000}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000006280)={@loopback, 0x0}, &(0x7f00000062c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006300)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000006340)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000006440)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006480)={0x0, @broadcast, @remote}, &(0x7f00000064c0)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000006500)={0x0, @remote, @multicast2}, &(0x7f0000006540)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000006f80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000006f40)={&(0x7f0000006580)=ANY=[@ANYBLOB="98090000", @ANYRES16=r1, @ANYBLOB="080029bd7000ffdbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="500002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r3, @ANYBLOB="1c0102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000200000008000600", @ANYRES32=r6, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000340004001e384000070900004100000703000000000807010200000005000604080000000900580901000000a8050502ffffff7f08000100", @ANYRES32=r7, @ANYBLOB="9c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000600000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000018000034000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000040004003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000008000100", @ANYRES32=r10, @ANYBLOB="0401020064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000340004001f0005ff0400000003006c030500000002000004ff070000090008ff751a0000ff002cc102000000b400c500faffffff38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000400000064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000034000400ff0f02f4090000000500030101f8ffff25060003040000000700ff0301000000040004ff00040000000007084d34000008000100", @ANYRES32=r11, @ANYBLOB="8c0002004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="8400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000600", @ANYRES32=r15, @ANYBLOB="08000100", @ANYRES32=r16, @ANYBLOB="bc01020044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004006129000008000600", @ANYRES32=r17, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r23, @ANYBLOB="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", @ANYRES32=r24, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="08000100", @ANYRES32=r26, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000400000008000100", @ANYRES32=r27, @ANYBLOB="dc00a6d70cca0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff0f000008000000", @ANYRES32=r28, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c00040042bab2080180000013f0c4001f00000003000801ba0f000003000900020000008000000001000000"], 0x998}, 0x1, 0x0, 0x0, 0xc5}, 0x0) r29 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r29, 0x402, 0x10) 08:21:01 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1819.725943] FAULT_INJECTION: forcing a failure. [ 1819.725943] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.777037] CPU: 0 PID: 21697 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1819.783939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1819.793307] Call Trace: [ 1819.795918] dump_stack+0x172/0x1f0 [ 1819.799569] should_fail.cold+0xa/0x15 [ 1819.803470] ? debug_smp_processor_id+0x3c/0x280 [ 1819.808245] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1819.813374] __should_failslab+0x121/0x190 [ 1819.817626] should_failslab+0x9/0x14 [ 1819.821437] kmem_cache_alloc+0x47/0x6f0 [ 1819.825511] ? lock_acquire+0x16f/0x3f0 [ 1819.829499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.835051] skb_clone+0x150/0x3b0 [ 1819.838608] netlink_deliver_tap+0x952/0xbf0 [ 1819.843039] netlink_unicast+0x5a7/0x720 [ 1819.847120] ? netlink_attachskb+0x770/0x770 [ 1819.851544] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1819.856570] ? __check_object_size+0x3d/0x42f [ 1819.861089] netlink_sendmsg+0x8ae/0xd70 [ 1819.865170] ? netlink_unicast+0x720/0x720 [ 1819.869416] ? aa_sock_msg_perm.isra.0+0xba/0x170 08:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000200)=""/215) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x14}, 0x0) [ 1819.874279] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1819.879045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.879062] ? security_socket_sendmsg+0x93/0xc0 [ 1819.879081] ? netlink_unicast+0x720/0x720 [ 1819.879102] sock_sendmsg+0xdd/0x130 [ 1819.879120] ___sys_sendmsg+0x806/0x930 [ 1819.897342] ? copy_msghdr_from_user+0x430/0x430 [ 1819.897368] ? lock_downgrade+0x880/0x880 [ 1819.897384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.897404] ? kasan_check_read+0x11/0x20 [ 1819.915798] ? __fget+0x367/0x540 [ 1819.915821] ? ksys_dup3+0x3e0/0x3e0 08:21:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 1819.915845] ? lock_downgrade+0x880/0x880 [ 1819.915871] ? __fget_light+0x1a9/0x230 [ 1819.915887] ? __fdget+0x1b/0x20 [ 1819.915903] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1819.915925] __sys_sendmsg+0x105/0x1d0 [ 1819.915946] ? __ia32_sys_shutdown+0x80/0x80 [ 1819.927240] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1819.927257] ? fput+0x128/0x1a0 [ 1819.927283] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1819.927299] ? do_fast_syscall_32+0xd1/0xc98 [ 1819.927315] ? entry_SYSENTER_compat+0x70/0x7f 08:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x39}, 0x0) [ 1819.927331] ? do_fast_syscall_32+0xd1/0xc98 [ 1819.927356] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1819.927373] do_fast_syscall_32+0x281/0xc98 [ 1819.927393] entry_SYSENTER_compat+0x70/0x7f [ 1819.927404] RIP: 0023:0xf7f4e869 [ 1819.927420] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1819.927429] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1819.927444] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1819.927453] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1819.927462] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1819.927471] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1819.927479] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 08:21:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x1ff, {{0x2, 0x4e20, @multicast1}}}, 0x84) fcntl$notify(r1, 0x402, 0x28) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 08:21:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0xfe, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1fc}, 0x0) 08:21:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 08:21:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) write$P9_RLOCK(r0, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x3}, 0x8) 08:21:01 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:01 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0xccef82ee64fbba81, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000440)={0x0, 0x7, 0x10, 0x80000000, 0x6}, &(0x7f0000000480)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000500)={r1, 0xecb1}, 0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000540)={r1, 0x10000, 0x30}, 0x65fa406d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000400)={&(0x7f0000000000)=@ax25={{0x3, @null}, [@rose, @remote, @default, @netrom, @remote, @rose, @netrom, @default]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/238, 0xee}, {&(0x7f0000000080)=""/30, 0x1e}, {&(0x7f00000000c0)}], 0x3, &(0x7f00000003c0)=""/57, 0x39}, 0x40000000) fcntl$notify(r2, 0x402, 0x10) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000004c0)=0x6, 0x4) [ 1820.641665] FAULT_INJECTION: forcing a failure. [ 1820.641665] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.653010] CPU: 1 PID: 21742 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1820.659877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.669249] Call Trace: [ 1820.669281] dump_stack+0x172/0x1f0 [ 1820.669307] should_fail.cold+0xa/0x15 [ 1820.669328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1820.669350] ? mark_held_locks+0xf0/0xf0 [ 1820.669367] ? perf_trace_lock+0x510/0x510 [ 1820.684568] __should_failslab+0x121/0x190 [ 1820.684590] should_failslab+0x9/0x14 [ 1820.684607] kmem_cache_alloc+0x47/0x6f0 [ 1820.692900] ? lock_acquire+0x16f/0x3f0 [ 1820.692918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.692940] skb_clone+0x150/0x3b0 [ 1820.700971] dev_queue_xmit_nit+0x2f0/0x980 [ 1820.700989] ? validate_xmit_xfrm+0x42d/0xf30 [ 1820.701014] dev_hard_start_xmit+0xbb/0x980 [ 1820.714573] __dev_queue_xmit+0x25ff/0x3030 [ 1820.714591] ? __lock_acquire+0x548/0x3fb0 [ 1820.714609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.714631] ? netdev_pick_tx+0x300/0x300 [ 1820.745333] ? __copy_skb_header+0x210/0x560 [ 1820.745356] ? __skb_checksum_complete+0x3f0/0x3f0 [ 1820.745370] ? skb_clone+0x150/0x3b0 [ 1820.745389] ? rcu_read_lock_sched_held+0x110/0x130 [ 1820.745411] ? kasan_check_write+0x14/0x20 [ 1820.745427] ? __skb_clone+0x5c8/0x820 [ 1820.745451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.762627] dev_queue_xmit+0x18/0x20 [ 1820.762644] ? dev_queue_xmit+0x18/0x20 [ 1820.762662] netlink_deliver_tap+0x8e7/0xbf0 [ 1820.762686] netlink_unicast+0x5a7/0x720 [ 1820.793488] ? netlink_attachskb+0x770/0x770 [ 1820.793507] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1820.793523] ? __check_object_size+0x3d/0x42f [ 1820.793549] netlink_sendmsg+0x8ae/0xd70 [ 1820.807025] ? netlink_unicast+0x720/0x720 [ 1820.807043] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1820.807064] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1820.807081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.807097] ? security_socket_sendmsg+0x93/0xc0 [ 1820.807111] ? netlink_unicast+0x720/0x720 [ 1820.807130] sock_sendmsg+0xdd/0x130 [ 1820.819909] ___sys_sendmsg+0x806/0x930 [ 1820.829496] ? copy_msghdr_from_user+0x430/0x430 [ 1820.829517] ? lock_downgrade+0x880/0x880 [ 1820.829531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.829552] ? kasan_check_read+0x11/0x20 [ 1820.829572] ? __fget+0x367/0x540 [ 1820.844092] ? ksys_dup3+0x3e0/0x3e0 [ 1820.844109] ? lock_downgrade+0x880/0x880 [ 1820.844132] ? __fget_light+0x1a9/0x230 [ 1820.866239] ? __fdget+0x1b/0x20 [ 1820.866257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1820.866278] __sys_sendmsg+0x105/0x1d0 [ 1820.866294] ? __ia32_sys_shutdown+0x80/0x80 [ 1820.866310] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1820.866326] ? fput+0x128/0x1a0 [ 1820.866352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1820.916431] ? do_fast_syscall_32+0xd1/0xc98 [ 1820.920874] ? entry_SYSENTER_compat+0x70/0x7f [ 1820.925534] ? do_fast_syscall_32+0xd1/0xc98 [ 1820.929971] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1820.934750] do_fast_syscall_32+0x281/0xc98 [ 1820.939088] entry_SYSENTER_compat+0x70/0x7f [ 1820.943508] RIP: 0023:0xf7f4e869 [ 1820.946887] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1820.965803] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1820.973538] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1820.980821] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 08:21:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 08:21:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 08:21:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 1820.988122] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1820.995408] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1821.002700] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:02 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) 08:21:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x300}, 0x0) [ 1821.415342] net_ratelimit: 25 callbacks suppressed [ 1821.415351] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.415356] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.415407] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.420631] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.425747] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.445843] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.505320] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.510479] protocol 88fb is buggy, dev hsr_slave_1 [ 1821.515650] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.520705] protocol 88fb is buggy, dev hsr_slave_1 08:21:02 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x102, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1, 0x80000, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x0, 0x2) r2 = openat$cgroup_ro(r1, &(0x7f0000000380)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) sendto$unix(r2, &(0x7f0000000040)="964e3bf99b32bfa89a66960ef7fa5dbfaf5d4c7a7bfee2917ab82a1edb5dcfb9d3304807134a62077fc24bdc4a877ffe166d4b3222662e4a375fffba5a9c2b99f71bb2d9a8d35b10abfd4f957a00aab720a113294a6e43d25363566c6a6984bc0fa9fd259881e6755dea6c83a44330e73029", 0x72, 0x4, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e23}, 0x6e) fcntl$notify(r2, 0x402, 0x28) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x7, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000018c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f00000019c0)=0xe8) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000000c0)={0x1, 0x8001}) bind$packet(r2, &(0x7f0000001a00)={0x11, 0xd, r3, 0x1, 0x8, 0x6, @dev={[], 0x1b}}, 0x14) 08:21:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:02 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0xb600}, 0x0) 08:21:02 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1821.642774] FAULT_INJECTION: forcing a failure. [ 1821.642774] name failslab, interval 1, probability 0, space 0, times 0 08:21:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0xffffff1f}, 0x0) [ 1821.703888] CPU: 0 PID: 21789 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1821.710804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1821.720189] Call Trace: [ 1821.722797] dump_stack+0x172/0x1f0 [ 1821.726458] should_fail.cold+0xa/0x15 [ 1821.730374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1821.735504] ? ___might_sleep+0x163/0x280 [ 1821.739669] __should_failslab+0x121/0x190 [ 1821.744003] should_failslab+0x9/0x14 [ 1821.747815] kmem_cache_alloc_trace+0x2d1/0x760 [ 1821.752518] rtnl_newlink+0x4b/0xa0 [ 1821.756160] ? __rtnl_newlink+0x16c0/0x16c0 [ 1821.760496] rtnetlink_rcv_msg+0x465/0xb00 [ 1821.764751] ? rtnetlink_put_metrics+0x560/0x560 [ 1821.769515] ? __lockdep_free_key_range+0x120/0x120 [ 1821.774560] ? netdev_pick_tx+0x300/0x300 [ 1821.778722] ? netlink_deliver_tap+0x22d/0xbf0 [ 1821.783308] ? find_held_lock+0x35/0x130 [ 1821.787384] netlink_rcv_skb+0x17a/0x460 [ 1821.791455] ? rtnetlink_put_metrics+0x560/0x560 [ 1821.796224] ? netlink_ack+0xb50/0xb50 [ 1821.800120] ? kasan_check_read+0x11/0x20 [ 1821.804278] ? netlink_deliver_tap+0x254/0xbf0 [ 1821.808883] rtnetlink_rcv+0x1d/0x30 [ 1821.812601] netlink_unicast+0x536/0x720 [ 1821.816680] ? netlink_attachskb+0x770/0x770 [ 1821.821099] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1821.826121] ? __check_object_size+0x3d/0x42f [ 1821.830634] netlink_sendmsg+0x8ae/0xd70 [ 1821.834709] ? netlink_unicast+0x720/0x720 [ 1821.838975] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1821.843829] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1821.848601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.854146] ? security_socket_sendmsg+0x93/0xc0 [ 1821.858912] ? netlink_unicast+0x720/0x720 [ 1821.863157] sock_sendmsg+0xdd/0x130 [ 1821.866885] ___sys_sendmsg+0x806/0x930 [ 1821.870872] ? copy_msghdr_from_user+0x430/0x430 [ 1821.875639] ? lock_downgrade+0x880/0x880 [ 1821.879813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.885368] ? kasan_check_read+0x11/0x20 [ 1821.889530] ? __fget+0x367/0x540 [ 1821.892996] ? ksys_dup3+0x3e0/0x3e0 [ 1821.896715] ? lock_downgrade+0x880/0x880 [ 1821.900890] ? __fget_light+0x1a9/0x230 [ 1821.904875] ? __fdget+0x1b/0x20 [ 1821.908248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1821.913795] __sys_sendmsg+0x105/0x1d0 [ 1821.917687] ? __ia32_sys_shutdown+0x80/0x80 [ 1821.922105] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1821.927651] ? fput+0x128/0x1a0 [ 1821.930953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1821.935714] ? do_fast_syscall_32+0xd1/0xc98 [ 1821.940130] ? entry_SYSENTER_compat+0x70/0x7f [ 1821.944717] ? do_fast_syscall_32+0xd1/0xc98 [ 1821.949144] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1821.953910] do_fast_syscall_32+0x281/0xc98 [ 1821.958246] entry_SYSENTER_compat+0x70/0x7f [ 1821.962654] RIP: 0023:0xf7f4e869 [ 1821.966023] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1821.984939] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1821.992660] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 08:21:03 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) sync_file_range(r0, 0x3, 0xfffffffffffffffa, 0x4) 08:21:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x80, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000380)) fcntl$notify(r1, 0x402, 0x10) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000300), &(0x7f0000000340)=0x4) fcntl$notify(r1, 0x402, 0x28) futex(&(0x7f0000000000)=0x2, 0x9, 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x2) [ 1821.999932] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1822.007212] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1822.014485] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1822.021778] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:03 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) [ 1822.585738] FAULT_INJECTION: forcing a failure. [ 1822.585738] name failslab, interval 1, probability 0, space 0, times 0 [ 1822.598092] CPU: 1 PID: 21809 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1822.604969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1822.614340] Call Trace: [ 1822.616987] dump_stack+0x172/0x1f0 [ 1822.620680] should_fail.cold+0xa/0x15 [ 1822.624634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1822.629841] ? ___might_sleep+0x163/0x280 [ 1822.634069] __should_failslab+0x121/0x190 [ 1822.638336] should_failslab+0x9/0x14 [ 1822.642133] kmem_cache_alloc_node_trace+0x270/0x720 [ 1822.647229] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1822.652503] __kmalloc_node+0x3d/0x70 [ 1822.656294] kvmalloc_node+0xbd/0x100 [ 1822.660078] alloc_netdev_mqs+0x98/0xd30 [ 1822.664126] ? ns_capable+0x23/0x30 [ 1822.667739] ? __bond_opt_init+0xb0/0xb0 [ 1822.671792] rtnl_create_link+0x22d/0xac0 [ 1822.675941] __rtnl_newlink+0xf7b/0x16c0 [ 1822.679997] ? rtnl_link_unregister+0x250/0x250 [ 1822.684650] ? lock_downgrade+0x880/0x880 [ 1822.688782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.694314] ? is_bpf_text_address+0xd3/0x170 [ 1822.698798] ? kernel_text_address+0x73/0xf0 [ 1822.703194] ? __kernel_text_address+0xd/0x40 [ 1822.707678] ? unwind_get_return_address+0x61/0xa0 [ 1822.712595] ? __save_stack_trace+0x8a/0xf0 [ 1822.716913] ? save_stack+0xa9/0xd0 [ 1822.720529] ? save_stack+0x45/0xd0 [ 1822.724142] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1822.729233] ? kasan_kmalloc+0x9/0x10 [ 1822.733018] ? kmem_cache_alloc_trace+0x151/0x760 [ 1822.737852] ? rtnl_newlink+0x4b/0xa0 [ 1822.741640] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1822.746081] rtnl_newlink+0x69/0xa0 [ 1822.749694] ? __rtnl_newlink+0x16c0/0x16c0 [ 1822.754005] rtnetlink_rcv_msg+0x465/0xb00 [ 1822.758230] ? rtnetlink_put_metrics+0x560/0x560 [ 1822.762972] ? __lockdep_free_key_range+0x120/0x120 [ 1822.767975] ? netdev_pick_tx+0x300/0x300 [ 1822.772112] ? netlink_deliver_tap+0x22d/0xbf0 [ 1822.776686] ? find_held_lock+0x35/0x130 [ 1822.780739] netlink_rcv_skb+0x17a/0x460 [ 1822.784809] ? rtnetlink_put_metrics+0x560/0x560 [ 1822.789559] ? netlink_ack+0xb50/0xb50 [ 1822.793433] ? kasan_check_read+0x11/0x20 [ 1822.797579] ? netlink_deliver_tap+0x254/0xbf0 [ 1822.802152] rtnetlink_rcv+0x1d/0x30 [ 1822.805862] netlink_unicast+0x536/0x720 [ 1822.809914] ? netlink_attachskb+0x770/0x770 [ 1822.814313] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1822.819317] ? __check_object_size+0x3d/0x42f [ 1822.823805] netlink_sendmsg+0x8ae/0xd70 [ 1822.827868] ? netlink_unicast+0x720/0x720 [ 1822.832089] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1822.836923] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1822.841669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.847193] ? security_socket_sendmsg+0x93/0xc0 [ 1822.851942] ? netlink_unicast+0x720/0x720 [ 1822.856168] sock_sendmsg+0xdd/0x130 [ 1822.859872] ___sys_sendmsg+0x806/0x930 [ 1822.863859] ? copy_msghdr_from_user+0x430/0x430 [ 1822.868611] ? lock_downgrade+0x880/0x880 [ 1822.872747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.878273] ? kasan_check_read+0x11/0x20 [ 1822.882412] ? __fget+0x367/0x540 [ 1822.885864] ? ksys_dup3+0x3e0/0x3e0 [ 1822.889562] ? lock_downgrade+0x880/0x880 [ 1822.893720] ? __fget_light+0x1a9/0x230 [ 1822.897684] ? __fdget+0x1b/0x20 [ 1822.901038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1822.906585] __sys_sendmsg+0x105/0x1d0 [ 1822.910468] ? __ia32_sys_shutdown+0x80/0x80 [ 1822.914870] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1822.920396] ? fput+0x128/0x1a0 [ 1822.923672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1822.928417] ? do_fast_syscall_32+0xd1/0xc98 [ 1822.932816] ? entry_SYSENTER_compat+0x70/0x7f [ 1822.937390] ? do_fast_syscall_32+0xd1/0xc98 [ 1822.941794] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1822.946541] do_fast_syscall_32+0x281/0xc98 [ 1822.950863] entry_SYSENTER_compat+0x70/0x7f [ 1822.955261] RIP: 0023:0xf7f4e869 [ 1822.958613] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1822.977504] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1822.985227] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1822.992497] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1822.999759] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1823.007021] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1823.014283] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:04 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x103, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=[&(0x7f0000000040)='@-(\x00'], &(0x7f0000000480)=[&(0x7f00000000c0)='self&.[:security--(-\xc8\x00', &(0x7f0000000280)='selfvboxnet1)]wlan1\x00', &(0x7f00000002c0)='loem1)\x00', &(0x7f0000000300)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) socket$rxrpc(0x21, 0x2, 0xa) 08:21:04 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x800000000000010) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000500)={0x592, 0x5, 0x6d5}) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4601000111060000000000000003003e0001040000d603000038000000550200000100000000102000010080ff810000000000000006000000000000003d00000000000000000000006800000001010000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c70000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x258) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x4, 0x80000001, 0x4, 0x5}, 0x1}, 0x20, 0x1, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000000)) 08:21:04 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x3}, 0x0) [ 1823.167559] FAULT_INJECTION: forcing a failure. [ 1823.167559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1823.179424] CPU: 0 PID: 21840 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1823.186274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.195635] Call Trace: [ 1823.198242] dump_stack+0x172/0x1f0 [ 1823.201899] should_fail.cold+0xa/0x15 [ 1823.205815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.210955] ? debug_smp_processor_id+0x3c/0x280 08:21:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0)=0x0, 0xfffffffffffffffe, &(0x7f0000000300)=0x0) write$P9_RGETATTR(r0, &(0x7f0000000340)={0xa0, 0x19, 0x2, {0xc, {0x20, 0x3, 0x6}, 0x80, r1, r3, 0x9, 0x52, 0x5, 0x19, 0x3f, 0x8, 0x0, 0x9, 0x7d, 0x0, 0x401, 0x8, 0xed, 0x8, 0x1}}, 0xa0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f00000004c0)={0xd88, 0xfffffffffffffffe, 0x2, [{{0x6, 0x0, 0x5, 0xfffffffffffff6b5, 0x7fffffff, 0x1, {0x2, 0x8, 0x8, 0x81, 0x3, 0x8, 0x4, 0xfffffffffffff126, 0x5, 0x1, 0x0, r1, r3, 0x2, 0x401}}, {0x0, 0x100000000, 0x154, 0x8000, '/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}}, {{0x0, 0x0, 0x6, 0x7, 0x100000000, 0x5, {0x0, 0x9, 0x8, 0xdd, 0x2, 0x9, 0x7f, 0x23, 0x80, 0x2, 0x0, r1, r3, 0x7fff, 0xfc4b}}, {0x1, 0x400, 0x154, 0x7, '/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}}, {{0x1, 0x2, 0x5, 0xfc1, 0x3, 0x6, {0x3, 0x2d8, 0xfffffffffffffe00, 0x42, 0x7, 0x1, 0xfffffffffffffff8, 0x8, 0x1, 0xc989, 0x6, r1, r3, 0x2}}, {0x5, 0x7f, 0x154, 0x100000001, '/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}}, {{0x4, 0x3, 0xffffffffbe71c188, 0x4, 0x7, 0x2, {0x5, 0x8, 0x5e1f, 0x40, 0x0, 0x6, 0x2, 0x5, 0x1, 0x10000, 0x0, r4, r2, 0x3, 0x9}}, {0x1, 0x2, 0x154, 0x0, '/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}}, {{0x2, 0x0, 0x11, 0x2, 0x2, 0x8f22, {0x6, 0x14, 0x2, 0x7fffffff, 0x5, 0x5, 0x1f, 0x81, 0x100000000, 0x0, 0x7fffffff, r1, r3, 0x2, 0x6ae}}, {0x3, 0x8, 0x8, 0x8ff, '@/\'!ppp0'}}, {{0x4, 0x3, 0xb7, 0x400, 0x6, 0x7, {0x2, 0x5, 0x5, 0x4, 0x66a5, 0xbdc, 0x400, 0x20, 0x7, 0x1, 0xf391, r1, r3, 0x1, 0xc2}}, {0x4, 0xffffffff, 0x0, 0x3}}, {{0x0, 0x2, 0x101, 0x81, 0x3000000000, 0x5, {0x5, 0x401, 0x1, 0x800, 0x100, 0x40, 0x67, 0xffffffff, 0x400, 0x40, 0x525c, r1, r2, 0x8, 0x1}}, {0x5, 0x100, 0x154, 0xa72e, '/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}}, {{0x2, 0x1, 0x2, 0x8, 0xffffffffffffffe0, 0x2, {0x0, 0x2, 0x4, 0xffffffff, 0x0, 0x5, 0x8, 0x0, 0xc1, 0x7, 0x2, r1, r2, 0x88a, 0x9}}, {0x6, 0x4, 0x2, 0x4e3, '-&'}}, {{0x1, 0x1, 0x81, 0x8, 0x1, 0x1, {0x5, 0x4, 0x3ff, 0x9, 0x80000001, 0xfff, 0x6, 0x9, 0x0, 0x2, 0xb9, r1, r3, 0x8, 0x7ec}}, {0x3, 0x2, 0x154, 0x8, '/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}}]}, 0xd88) fcntl$notify(r0, 0x402, 0x28) [ 1823.215737] ? perf_trace_lock+0xeb/0x510 [ 1823.219905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.225475] should_fail_alloc_page+0x50/0x60 [ 1823.229988] __alloc_pages_nodemask+0x1a1/0x710 [ 1823.234679] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1823.239705] ? find_held_lock+0x35/0x130 [ 1823.243789] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.248952] cache_grow_begin+0x9c/0x8c0 [ 1823.253038] ? __kmalloc_node+0x3d/0x70 [ 1823.257038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1823.262596] kmem_cache_alloc_node_trace+0x658/0x720 [ 1823.262626] __kmalloc_node+0x3d/0x70 [ 1823.271709] kvmalloc_node+0xbd/0x100 [ 1823.275524] alloc_netdev_mqs+0x98/0xd30 [ 1823.275546] ? ns_capable+0x23/0x30 [ 1823.275563] ? __bond_opt_init+0xb0/0xb0 [ 1823.275582] rtnl_create_link+0x22d/0xac0 [ 1823.275607] __rtnl_newlink+0xf7b/0x16c0 [ 1823.275638] ? rtnl_link_unregister+0x250/0x250 [ 1823.275652] ? lock_downgrade+0x880/0x880 [ 1823.275668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.275695] ? is_bpf_text_address+0xd3/0x170 08:21:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4}, 0x0) [ 1823.275712] ? kernel_text_address+0x73/0xf0 [ 1823.318852] ? __kernel_text_address+0xd/0x40 [ 1823.323360] ? unwind_get_return_address+0x61/0xa0 [ 1823.328297] ? __save_stack_trace+0x8a/0xf0 [ 1823.332652] ? save_stack+0xa9/0xd0 [ 1823.336293] ? save_stack+0x45/0xd0 [ 1823.339931] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1823.345050] ? kasan_kmalloc+0x9/0x10 [ 1823.348873] ? kmem_cache_alloc_trace+0x151/0x760 [ 1823.353725] ? rtnl_newlink+0x4b/0xa0 [ 1823.357541] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1823.362055] rtnl_newlink+0x69/0xa0 [ 1823.365699] ? __rtnl_newlink+0x16c0/0x16c0 [ 1823.370031] rtnetlink_rcv_msg+0x465/0xb00 [ 1823.370056] ? rtnetlink_put_metrics+0x560/0x560 [ 1823.370073] ? __lockdep_free_key_range+0x120/0x120 [ 1823.379058] ? netdev_pick_tx+0x300/0x300 [ 1823.379077] ? netlink_deliver_tap+0x22d/0xbf0 [ 1823.379093] ? find_held_lock+0x35/0x130 [ 1823.379115] netlink_rcv_skb+0x17a/0x460 [ 1823.379133] ? rtnetlink_put_metrics+0x560/0x560 [ 1823.379151] ? netlink_ack+0xb50/0xb50 [ 1823.379169] ? kasan_check_read+0x11/0x20 [ 1823.379189] ? netlink_deliver_tap+0x254/0xbf0 [ 1823.379212] rtnetlink_rcv+0x1d/0x30 [ 1823.422057] netlink_unicast+0x536/0x720 [ 1823.426142] ? netlink_attachskb+0x770/0x770 [ 1823.430566] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1823.435591] ? __check_object_size+0x3d/0x42f [ 1823.440107] netlink_sendmsg+0x8ae/0xd70 [ 1823.440134] ? netlink_unicast+0x720/0x720 [ 1823.440151] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1823.440170] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1823.440190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.463580] ? security_socket_sendmsg+0x93/0xc0 [ 1823.468346] ? netlink_unicast+0x720/0x720 [ 1823.472593] sock_sendmsg+0xdd/0x130 [ 1823.476321] ___sys_sendmsg+0x806/0x930 [ 1823.480312] ? copy_msghdr_from_user+0x430/0x430 [ 1823.480337] ? lock_downgrade+0x880/0x880 [ 1823.480354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.480375] ? kasan_check_read+0x11/0x20 [ 1823.480396] ? __fget+0x367/0x540 [ 1823.502446] ? ksys_dup3+0x3e0/0x3e0 [ 1823.506169] ? lock_downgrade+0x880/0x880 [ 1823.510335] ? __fget_light+0x1a9/0x230 [ 1823.510355] ? __fdget+0x1b/0x20 08:21:04 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 08:21:04 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x40100, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x10) close(r0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) [ 1823.510372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1823.510394] __sys_sendmsg+0x105/0x1d0 [ 1823.510410] ? __ia32_sys_shutdown+0x80/0x80 [ 1823.523277] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1823.523296] ? fput+0x128/0x1a0 [ 1823.523326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1823.523342] ? do_fast_syscall_32+0xd1/0xc98 [ 1823.523360] ? entry_SYSENTER_compat+0x70/0x7f [ 1823.537182] ? do_fast_syscall_32+0xd1/0xc98 [ 1823.537210] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1823.545557] do_fast_syscall_32+0x281/0xc98 [ 1823.545580] entry_SYSENTER_compat+0x70/0x7f [ 1823.545591] RIP: 0023:0xf7f4e869 [ 1823.545606] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1823.545615] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1823.545629] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1823.545638] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1823.545646] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1823.545655] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1823.545663] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x5}, 0x0) 08:21:05 executing program 3 (fault-call:1 fault-nth:7): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1823.889817] FAULT_INJECTION: forcing a failure. [ 1823.889817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1823.901684] CPU: 1 PID: 21877 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1823.908545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.917917] Call Trace: [ 1823.920532] dump_stack+0x172/0x1f0 [ 1823.924184] should_fail.cold+0xa/0x15 [ 1823.928097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.933230] ? debug_smp_processor_id+0x3c/0x280 [ 1823.938011] ? perf_trace_lock+0xeb/0x510 [ 1823.942181] should_fail_alloc_page+0x50/0x60 [ 1823.946695] __alloc_pages_nodemask+0x1a1/0x710 [ 1823.951389] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1823.956417] ? find_held_lock+0x35/0x130 [ 1823.956448] ? kasan_check_write+0x14/0x20 [ 1823.956474] cache_grow_begin+0x9c/0x8c0 [ 1823.965036] ? kasan_check_read+0x11/0x20 [ 1823.965056] ? do_raw_spin_unlock+0x57/0x270 [ 1823.965077] ____cache_alloc_node+0x17c/0x1e0 [ 1823.973276] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1823.973300] kmem_cache_alloc_node_trace+0xec/0x720 [ 1823.973328] __kmalloc_node+0x3d/0x70 [ 1823.982220] kvmalloc_node+0xbd/0x100 [ 1823.982241] alloc_netdev_mqs+0x98/0xd30 [ 1823.982265] ? ns_capable+0x23/0x30 [ 1824.008083] ? __bond_opt_init+0xb0/0xb0 [ 1824.012164] rtnl_create_link+0x22d/0xac0 [ 1824.016337] __rtnl_newlink+0xf7b/0x16c0 [ 1824.020434] ? rtnl_link_unregister+0x250/0x250 [ 1824.025128] ? lock_downgrade+0x880/0x880 [ 1824.029292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.034849] ? is_bpf_text_address+0xd3/0x170 [ 1824.039336] ? kernel_text_address+0x73/0xf0 [ 1824.043736] ? __kernel_text_address+0xd/0x40 [ 1824.048223] ? unwind_get_return_address+0x61/0xa0 [ 1824.053144] ? __save_stack_trace+0x8a/0xf0 [ 1824.057469] ? save_stack+0xa9/0xd0 [ 1824.061088] ? save_stack+0x45/0xd0 [ 1824.064704] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1824.069793] ? kasan_kmalloc+0x9/0x10 [ 1824.073579] ? kmem_cache_alloc_trace+0x151/0x760 [ 1824.078435] ? rtnl_newlink+0x4b/0xa0 [ 1824.082250] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1824.086690] rtnl_newlink+0x69/0xa0 [ 1824.090308] ? __rtnl_newlink+0x16c0/0x16c0 [ 1824.094618] rtnetlink_rcv_msg+0x465/0xb00 [ 1824.098871] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.103627] ? __lockdep_free_key_range+0x120/0x120 [ 1824.108632] ? netdev_pick_tx+0x300/0x300 [ 1824.112769] ? netlink_deliver_tap+0x22d/0xbf0 [ 1824.117341] ? find_held_lock+0x35/0x130 [ 1824.121410] netlink_rcv_skb+0x17a/0x460 [ 1824.125483] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.130233] ? netlink_ack+0xb50/0xb50 [ 1824.134110] ? kasan_check_read+0x11/0x20 [ 1824.138256] ? netlink_deliver_tap+0x254/0xbf0 [ 1824.142870] rtnetlink_rcv+0x1d/0x30 [ 1824.146592] netlink_unicast+0x536/0x720 [ 1824.150648] ? netlink_attachskb+0x770/0x770 [ 1824.155054] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1824.160061] ? __check_object_size+0x3d/0x42f [ 1824.164571] netlink_sendmsg+0x8ae/0xd70 [ 1824.168648] ? netlink_unicast+0x720/0x720 [ 1824.172874] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1824.177718] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1824.182484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.188034] ? security_socket_sendmsg+0x93/0xc0 [ 1824.192797] ? netlink_unicast+0x720/0x720 [ 1824.197042] sock_sendmsg+0xdd/0x130 [ 1824.200789] ___sys_sendmsg+0x806/0x930 [ 1824.204770] ? copy_msghdr_from_user+0x430/0x430 [ 1824.209538] ? lock_downgrade+0x880/0x880 [ 1824.213688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.219224] ? kasan_check_read+0x11/0x20 [ 1824.223369] ? __fget+0x367/0x540 [ 1824.226824] ? ksys_dup3+0x3e0/0x3e0 [ 1824.230537] ? lock_downgrade+0x880/0x880 [ 1824.234688] ? __fget_light+0x1a9/0x230 [ 1824.238659] ? __fdget+0x1b/0x20 [ 1824.242019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1824.247553] __sys_sendmsg+0x105/0x1d0 [ 1824.251444] ? __ia32_sys_shutdown+0x80/0x80 [ 1824.255860] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1824.261412] ? fput+0x128/0x1a0 [ 1824.264729] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1824.269499] ? do_fast_syscall_32+0xd1/0xc98 [ 1824.273917] ? entry_SYSENTER_compat+0x70/0x7f [ 1824.278499] ? do_fast_syscall_32+0xd1/0xc98 [ 1824.282913] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1824.287686] do_fast_syscall_32+0x281/0xc98 [ 1824.292005] entry_SYSENTER_compat+0x70/0x7f [ 1824.296410] RIP: 0023:0xf7f4e869 [ 1824.299794] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1824.318702] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1824.326406] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1824.333669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1824.340931] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1824.348203] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1824.355476] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:05 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x104, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:21:05 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000002c0)={0x1, 0x0, {0x101, 0x0, 0x4, 0x357a62ad}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@local, @in6=@loopback}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) fcntl$notify(r0, 0x402, 0x10) 08:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req={0x6, 0x7fffffff, 0xf16b, 0xffffffffffffffc1}, 0x10) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x6}, 0x0) 08:21:06 executing program 3 (fault-call:1 fault-nth:8): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1824.700180] FAULT_INJECTION: forcing a failure. [ 1824.700180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1824.734663] CPU: 1 PID: 21897 Comm: syz-executor.3 Not tainted 5.0.0+ #9 08:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000040)=""/74, 0x1000000, 0x1800, 0x80}, 0x18) fcntl$notify(r1, 0x402, 0x28) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000000)='securityvmnet0*trusted\'md5sum\x00', 0x1e) 08:21:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x7}, 0x0) [ 1824.741573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1824.750946] Call Trace: [ 1824.753560] dump_stack+0x172/0x1f0 [ 1824.757216] should_fail.cold+0xa/0x15 [ 1824.761127] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1824.766252] ? ___might_sleep+0x163/0x280 [ 1824.770428] should_fail_alloc_page+0x50/0x60 [ 1824.774963] __alloc_pages_nodemask+0x1a1/0x710 [ 1824.779655] ? __lockdep_free_key_range+0x120/0x120 [ 1824.784704] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1824.789829] ? cache_grow_begin+0x5a2/0x8c0 [ 1824.794282] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1824.798956] ? trace_hardirqs_on+0x67/0x230 [ 1824.803358] cache_grow_begin+0x9c/0x8c0 [ 1824.807518] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1824.813206] ? __cpuset_node_allowed+0x136/0x540 [ 1824.818057] fallback_alloc+0x1fd/0x2d0 [ 1824.822113] ____cache_alloc_node+0x1be/0x1e0 [ 1824.826680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1824.832282] kmem_cache_alloc_node_trace+0xec/0x720 [ 1824.837345] __kmalloc_node+0x3d/0x70 [ 1824.841176] kvmalloc_node+0xbd/0x100 [ 1824.844994] alloc_netdev_mqs+0x98/0xd30 08:21:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffb) [ 1824.849069] ? ns_capable+0x23/0x30 [ 1824.852710] ? __bond_opt_init+0xb0/0xb0 [ 1824.856789] rtnl_create_link+0x22d/0xac0 [ 1824.860955] __rtnl_newlink+0xf7b/0x16c0 [ 1824.865041] ? rtnl_link_unregister+0x250/0x250 [ 1824.869719] ? lock_downgrade+0x880/0x880 [ 1824.869735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.869760] ? is_bpf_text_address+0xd3/0x170 [ 1824.869775] ? kernel_text_address+0x73/0xf0 [ 1824.869790] ? __kernel_text_address+0xd/0x40 [ 1824.869808] ? unwind_get_return_address+0x61/0xa0 [ 1824.892882] ? __save_stack_trace+0x8a/0xf0 [ 1824.892919] ? save_stack+0xa9/0xd0 [ 1824.892939] ? save_stack+0x45/0xd0 [ 1824.902205] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1824.914544] ? kasan_kmalloc+0x9/0x10 [ 1824.918363] ? kmem_cache_alloc_trace+0x151/0x760 [ 1824.923220] ? rtnl_newlink+0x4b/0xa0 [ 1824.927036] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1824.931547] rtnl_newlink+0x69/0xa0 [ 1824.935194] ? __rtnl_newlink+0x16c0/0x16c0 [ 1824.939530] rtnetlink_rcv_msg+0x465/0xb00 [ 1824.943783] ? rtnetlink_put_metrics+0x560/0x560 08:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020026bd7000fddb003a0000000800000017000000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000) [ 1824.948557] ? __lockdep_free_key_range+0x120/0x120 [ 1824.953591] ? netdev_pick_tx+0x300/0x300 [ 1824.957758] ? netlink_deliver_tap+0x22d/0xbf0 [ 1824.962353] ? find_held_lock+0x35/0x130 [ 1824.966435] netlink_rcv_skb+0x17a/0x460 [ 1824.970518] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.975290] ? netlink_ack+0xb50/0xb50 [ 1824.979200] ? kasan_check_read+0x11/0x20 [ 1824.983366] ? netlink_deliver_tap+0x254/0xbf0 [ 1824.987977] rtnetlink_rcv+0x1d/0x30 [ 1824.991708] netlink_unicast+0x536/0x720 [ 1824.995788] ? netlink_attachskb+0x770/0x770 [ 1824.995807] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1824.995844] ? __check_object_size+0x3d/0x42f [ 1825.005267] netlink_sendmsg+0x8ae/0xd70 [ 1825.005296] ? netlink_unicast+0x720/0x720 [ 1825.018080] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1825.022947] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1825.027727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.033287] ? security_socket_sendmsg+0x93/0xc0 [ 1825.038064] ? netlink_unicast+0x720/0x720 [ 1825.042326] sock_sendmsg+0xdd/0x130 [ 1825.046063] ___sys_sendmsg+0x806/0x930 08:21:06 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="b9000000f799480e51a8bd6ad9f5e3da83f1dab9c35c462e5fb8823fc20b8da1ab98363d441e56a6607bc028a214a40a857a853b0ba521228f8706193e96b51d193a02f995ef191c59a70e60d66ef2f250b8c82157d5d9246b80744fbcd2f8ef4440324cd2db054ef5876dbadcb3d95764339a657461d5294045a313f1972d9c0aa8fe43ece83d0d7892c77d8945224c7b3c03f3a0f3dd99a861ad3871ddc79a2ff85431774505b29ee84dddf67865c9d236199c26ad5d5a826737949d"], &(0x7f0000000080)=0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0xfffffffffffffffc, 0x8008, 0x2, 0x3, r1}, &(0x7f0000000500)=0x10) r2 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xd6a8}, 0x0, 0x0, 0xffffffffffffffff, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x0, 0x154, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0xffffffffffffffff}, 0x30) fcntl$lock(r2, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x6, 0x8d, r3}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x10) [ 1825.050062] ? copy_msghdr_from_user+0x430/0x430 [ 1825.054849] ? lock_downgrade+0x880/0x880 [ 1825.059011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.064571] ? kasan_check_read+0x11/0x20 [ 1825.068736] ? __fget+0x367/0x540 [ 1825.072207] ? ksys_dup3+0x3e0/0x3e0 [ 1825.075931] ? lock_downgrade+0x880/0x880 [ 1825.080107] ? __fget_light+0x1a9/0x230 [ 1825.084101] ? __fdget+0x1b/0x20 [ 1825.087480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1825.087503] __sys_sendmsg+0x105/0x1d0 [ 1825.087518] ? __ia32_sys_shutdown+0x80/0x80 08:21:06 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) [ 1825.087535] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1825.087552] ? fput+0x128/0x1a0 [ 1825.096988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1825.097006] ? do_fast_syscall_32+0xd1/0xc98 [ 1825.097022] ? entry_SYSENTER_compat+0x70/0x7f [ 1825.097037] ? do_fast_syscall_32+0xd1/0xc98 [ 1825.097063] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1825.097081] do_fast_syscall_32+0x281/0xc98 [ 1825.137564] entry_SYSENTER_compat+0x70/0x7f [ 1825.141993] RIP: 0023:0xf7f4e869 [ 1825.145366] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1825.164286] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1825.172012] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1825.179296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1825.186584] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1825.193884] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1825.201168] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:06 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x105, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000003c000000540000004b000000d8864056ebf98d2bd5f8c6ad365016560043c1532454df2957d1f82601be4bd4adc103e74b59690e9520a3fedeb8aa0c529cfd265bda2303b8d6b7000900000000000000cbd681201d9d8e0de1a4450f1d8137950dd36f075963fe04103992544b127359e1cee7b79171d441feb63b8f5213692f58ff1d4a72ee136418a1fe4e837a9869d3e3e4"], &(0x7f0000000080)=""/116, 0x5c, 0x74, 0x1}, 0x20) r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:21:06 executing program 3 (fault-call:1 fault-nth:9): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8}, 0x0) 08:21:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 1825.696960] FAULT_INJECTION: forcing a failure. [ 1825.696960] name failslab, interval 1, probability 0, space 0, times 0 08:21:07 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) write$binfmt_aout(r0, &(0x7f0000000680)={{0x108, 0x2, 0xfffffffffffffffb, 0x15d, 0x3be, 0x6, 0x1fa, 0x9}, "eb78e15be709615565fbeb89c62f648f479ade3c529c89dfe3d2aaf2a1968bd785c77e1f08f0cf8d0466512e517e3e3c47c5635c071788a85ab3709c466b8d9a1bd0abf4da38ad6f73a4a619e1a77a261ad51bdb9b9f0a8549c02be817643a74151c242813eeda24f016105e54ba4778bf37fc8a0b0b4e0d2b02d6952756eff6eecc885a2c78e75760e212275a4a3f994ad68bd57ee6837980edceb6f397a516b74f7bb57ed3638598d0adf9b9863b3085559db92e1ff1fc1e819189a4359628b05367baeab0f56a784c8589465dfb6dc27ba0a8cdf55c82109a6f942d06504e91bb8bc3c17dfbbc04feb6dce4587513b7fd137286de1124", [[], [], []]}, 0x418) sendfile(r0, r1, 0x0, 0x7) [ 1825.765731] CPU: 1 PID: 21944 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1825.772629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1825.782023] Call Trace: [ 1825.784635] dump_stack+0x172/0x1f0 [ 1825.788288] should_fail.cold+0xa/0x15 [ 1825.792200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1825.797340] __should_failslab+0x121/0x190 [ 1825.801592] should_failslab+0x9/0x14 [ 1825.805412] kmem_cache_alloc_trace+0x4b/0x760 [ 1825.810026] __hw_addr_create_ex+0x5e/0x310 [ 1825.810046] __hw_addr_add_ex+0x1ef/0x2b0 [ 1825.818508] dev_addr_init+0x118/0x200 [ 1825.818523] ? dev_mc_flush+0x40/0x40 [ 1825.818543] ? __kmalloc_node+0x4e/0x70 [ 1825.818568] alloc_netdev_mqs+0x142/0xd30 [ 1825.834367] ? ns_capable+0x23/0x30 [ 1825.838006] ? __bond_opt_init+0xb0/0xb0 [ 1825.842091] rtnl_create_link+0x22d/0xac0 [ 1825.846258] __rtnl_newlink+0xf7b/0x16c0 [ 1825.850340] ? rtnl_link_unregister+0x250/0x250 [ 1825.855023] ? lock_downgrade+0x880/0x880 [ 1825.859188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.864752] ? is_bpf_text_address+0xd3/0x170 [ 1825.869265] ? kernel_text_address+0x73/0xf0 [ 1825.873689] ? __kernel_text_address+0xd/0x40 [ 1825.878202] ? unwind_get_return_address+0x61/0xa0 [ 1825.883147] ? __save_stack_trace+0x8a/0xf0 [ 1825.887504] ? save_stack+0xa9/0xd0 [ 1825.891147] ? save_stack+0x45/0xd0 [ 1825.894790] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1825.899905] ? kasan_kmalloc+0x9/0x10 [ 1825.903721] ? kmem_cache_alloc_trace+0x151/0x760 [ 1825.908580] ? rtnl_newlink+0x4b/0xa0 [ 1825.912390] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1825.916883] ? l2tp_session_free+0x20/0x1a0 [ 1825.921244] rtnl_newlink+0x69/0xa0 [ 1825.924883] ? __rtnl_newlink+0x16c0/0x16c0 [ 1825.929223] rtnetlink_rcv_msg+0x465/0xb00 [ 1825.933485] ? rtnetlink_put_metrics+0x560/0x560 [ 1825.938254] ? __lockdep_free_key_range+0x120/0x120 [ 1825.943280] ? netdev_pick_tx+0x300/0x300 [ 1825.947444] ? netlink_deliver_tap+0x22d/0xbf0 [ 1825.947462] ? find_held_lock+0x35/0x130 [ 1825.947486] netlink_rcv_skb+0x17a/0x460 [ 1825.960180] ? rtnetlink_put_metrics+0x560/0x560 08:21:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xa}, 0x0) 08:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x38c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) [ 1825.964956] ? netlink_ack+0xb50/0xb50 [ 1825.968864] ? kasan_check_read+0x11/0x20 [ 1825.973033] ? netlink_deliver_tap+0x254/0xbf0 [ 1825.977639] rtnetlink_rcv+0x1d/0x30 [ 1825.977658] netlink_unicast+0x536/0x720 [ 1825.977682] ? netlink_attachskb+0x770/0x770 [ 1825.977699] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1825.977714] ? __check_object_size+0x3d/0x42f [ 1825.977737] netlink_sendmsg+0x8ae/0xd70 [ 1825.985516] ? netlink_unicast+0x720/0x720 [ 1825.985533] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1825.985555] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1825.985571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.985586] ? security_socket_sendmsg+0x93/0xc0 [ 1825.985601] ? netlink_unicast+0x720/0x720 [ 1825.985621] sock_sendmsg+0xdd/0x130 [ 1826.035586] ___sys_sendmsg+0x806/0x930 [ 1826.039586] ? copy_msghdr_from_user+0x430/0x430 [ 1826.044362] ? lock_downgrade+0x880/0x880 [ 1826.048524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.054078] ? kasan_check_read+0x11/0x20 [ 1826.058244] ? __fget+0x367/0x540 [ 1826.061713] ? ksys_dup3+0x3e0/0x3e0 08:21:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0x7ff, @ipv4={[], [], @broadcast}, 0x1}}, 0x8000, 0x3f, 0x5, 0x2, 0x8}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x8}, 0x8) fcntl$notify(r0, 0x402, 0x28) [ 1826.065435] ? lock_downgrade+0x880/0x880 [ 1826.069617] ? __fget_light+0x1a9/0x230 [ 1826.073610] ? __fdget+0x1b/0x20 [ 1826.076986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1826.082545] __sys_sendmsg+0x105/0x1d0 [ 1826.086446] ? __ia32_sys_shutdown+0x80/0x80 [ 1826.090877] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1826.096430] ? fput+0x128/0x1a0 [ 1826.096469] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.096486] ? do_fast_syscall_32+0xd1/0xc98 [ 1826.096501] ? entry_SYSENTER_compat+0x70/0x7f [ 1826.096515] ? do_fast_syscall_32+0xd1/0xc98 [ 1826.096540] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1826.104579] do_fast_syscall_32+0x281/0xc98 [ 1826.104604] entry_SYSENTER_compat+0x70/0x7f [ 1826.104617] RIP: 0023:0xf7f4e869 [ 1826.104634] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1826.104644] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 08:21:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) r2 = getpgid(0xffffffffffffffff) ioctl$int_out(r0, 0x2, &(0x7f0000001740)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x2, r2}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001700)={0x53, 0xfffffffffffffffb, 0xa6, 0x1, @scatter={0x6, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/198, 0xc6}, {&(0x7f0000000040)=""/29, 0x1d}, {&(0x7f0000001380)=""/214, 0xd6}, {&(0x7f0000001480)=""/147, 0x93}, {&(0x7f0000000080)=""/20, 0x14}]}, &(0x7f0000001540)="1c2d7257cc66ae264b2d7a788f8971e54a2e92ed878906703cad1ae27248dd6b2d57a9062d6ea8ff4e7e7bb1420d3e1e15cf6041a50cf34fd22655475ba3aeaa08d5b4777d739c868e7134fe8a1faf1be436a177186a1b426535a3702970d74b7f899d377b33ef092157c185545f2a733f066b91dd88ac6ef09abee6a82e93e9fa4c8cdf5d61d47f30f5e0b4c8735c0b52c4ffa19c2f5548946c262e00ec9a83e901396b8e5a", &(0x7f0000001600)=""/136, 0x8, 0x1, 0x1, &(0x7f00000016c0)}) [ 1826.104659] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1826.104671] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1826.175996] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1826.183273] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1826.190554] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:07 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x106, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:07 executing program 3 (fault-call:1 fault-nth:10): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xc}, 0x0) 08:21:08 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000010) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000000)={0x81, 0x100000001}) 08:21:08 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000400)=""/85) fcntl$notify(r0, 0x402, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x7fffffff, 0x8, 0x7fff, 0x9}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0x7, 0x8, 0x9, 0x4, r1}, &(0x7f00000002c0)=0x10) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x9, 0x8, 0x1, 0x3, 0x0, 0xffffffff, 0x20000, 0x0, 0xffff, 0x80, 0x8, 0xffff, 0x5, 0x400, 0x62, 0x1, 0x400, 0x1, 0x100000000, 0x0, 0x3183, 0xfffffffffffffff8, 0x4, 0x20, 0xffff, 0x7ff, 0x1, 0x8, 0x3, 0x9, 0x3, 0x0, 0x7, 0x9, 0x7f, 0x400, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300), 0xb}, 0x20, 0x8, 0x1ff, 0x0, 0x5, 0x0, 0x3}, r2, 0xa, 0xffffffffffffffff, 0x2) fcntl$notify(r0, 0x402, 0x28) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'ip6erspan0\x00'}}, 0x1e) 08:21:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:21:08 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$getown(r0, 0x9) 08:21:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f00000003c0)) fcntl$notify(r0, 0x402, 0x28) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x800}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={r1, 0xbc, "45fae6a8984f2cfc683b4e10ce075ad4c1b4b92bb1fc52535339a488814188ba132499181597ae43e48662bc10b924af3a38e959cd57455fd2ac711aee2655167f4cdb48143b6ba281a8557061ffcf47360f5cb2cbd65143d469758ebae0fff323fe3ab5ab4e86a90d890b874f64b021b0ff01e306d94c2295b29449227d8d43030de9ab080ecc2ab19fdc91539c513ddcbf3ee505f698f1a6c2ffd77e6e6d675b17b75ed4759d886d5b4c88945df50a72b944386c7e3fcc3337f279"}, &(0x7f0000000380)=0xc4) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x9, 0x2fffc) [ 1826.812522] FAULT_INJECTION: forcing a failure. [ 1826.812522] name failslab, interval 1, probability 0, space 0, times 0 [ 1826.860221] CPU: 1 PID: 21998 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1826.867116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1826.876480] Call Trace: [ 1826.879095] dump_stack+0x172/0x1f0 [ 1826.882749] should_fail.cold+0xa/0x15 [ 1826.886662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1826.891797] ? ___might_sleep+0x163/0x280 [ 1826.895982] __should_failslab+0x121/0x190 [ 1826.896006] should_failslab+0x9/0x14 [ 1826.896024] kmem_cache_alloc_node_trace+0x270/0x720 [ 1826.904061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.914677] ? dev_addr_init+0x17f/0x200 [ 1826.918760] __kmalloc_node+0x3d/0x70 [ 1826.922576] kvmalloc_node+0xbd/0x100 [ 1826.926394] alloc_netdev_mqs+0x67f/0xd30 [ 1826.930566] ? __bond_opt_init+0xb0/0xb0 [ 1826.934653] rtnl_create_link+0x22d/0xac0 [ 1826.938828] __rtnl_newlink+0xf7b/0x16c0 [ 1826.942959] ? rtnl_link_unregister+0x250/0x250 [ 1826.947641] ? lock_downgrade+0x880/0x880 [ 1826.951800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.957373] ? is_bpf_text_address+0xd3/0x170 [ 1826.961883] ? kernel_text_address+0x73/0xf0 [ 1826.966302] ? __kernel_text_address+0xd/0x40 [ 1826.970812] ? unwind_get_return_address+0x61/0xa0 [ 1826.975765] ? __save_stack_trace+0x8a/0xf0 [ 1826.980118] ? save_stack+0xa9/0xd0 [ 1826.983759] ? save_stack+0x45/0xd0 [ 1826.987400] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1826.992518] ? kasan_kmalloc+0x9/0x10 [ 1826.996331] ? kmem_cache_alloc_trace+0x151/0x760 [ 1827.001183] ? rtnl_newlink+0x4b/0xa0 [ 1827.004992] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1827.009504] rtnl_newlink+0x69/0xa0 [ 1827.013149] ? __rtnl_newlink+0x16c0/0x16c0 [ 1827.017490] rtnetlink_rcv_msg+0x465/0xb00 [ 1827.021748] ? rtnetlink_put_metrics+0x560/0x560 [ 1827.026519] ? __lockdep_free_key_range+0x120/0x120 [ 1827.031552] ? netdev_pick_tx+0x300/0x300 [ 1827.035714] ? netlink_deliver_tap+0x22d/0xbf0 [ 1827.040310] ? find_held_lock+0x35/0x130 [ 1827.044393] netlink_rcv_skb+0x17a/0x460 [ 1827.048475] ? rtnetlink_put_metrics+0x560/0x560 [ 1827.053252] ? netlink_ack+0xb50/0xb50 [ 1827.057152] ? kasan_check_read+0x11/0x20 [ 1827.057174] ? netlink_deliver_tap+0x254/0xbf0 [ 1827.057198] rtnetlink_rcv+0x1d/0x30 [ 1827.057214] netlink_unicast+0x536/0x720 [ 1827.057236] ? netlink_attachskb+0x770/0x770 [ 1827.057254] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1827.065979] ? __check_object_size+0x3d/0x42f [ 1827.066006] netlink_sendmsg+0x8ae/0xd70 [ 1827.066031] ? netlink_unicast+0x720/0x720 [ 1827.066048] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1827.066067] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1827.066084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:21:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:21:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000040)={{0xe3, 0x200000000000, 0xfff}, 'syz0\x00', 0x37}) fcntl$notify(r1, 0x402, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000000)=""/21, 0x15) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000300)) fcntl$notify(r1, 0x402, 0x28) 08:21:08 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8df, 0x800) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x1, 0x5, 0x7ff, 0x1, 0x7ff}, 0x14) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r1, r2/1000+30000}, {0x77359400}}, 0x0) mq_timedsend(r0, &(0x7f0000000680)="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", 0x1000, 0x40, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000380)) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000002c0)=""/130) fcntl$notify(r0, 0x402, 0x2) [ 1827.111130] ? security_socket_sendmsg+0x93/0xc0 [ 1827.115907] ? netlink_unicast+0x720/0x720 [ 1827.120160] sock_sendmsg+0xdd/0x130 [ 1827.123886] ___sys_sendmsg+0x806/0x930 [ 1827.127894] ? copy_msghdr_from_user+0x430/0x430 [ 1827.132670] ? lock_downgrade+0x880/0x880 [ 1827.136848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.142405] ? kasan_check_read+0x11/0x20 [ 1827.146585] ? __fget+0x367/0x540 [ 1827.150062] ? ksys_dup3+0x3e0/0x3e0 [ 1827.153789] ? lock_downgrade+0x880/0x880 [ 1827.157968] ? __fget_light+0x1a9/0x230 [ 1827.161963] ? __fdget+0x1b/0x20 [ 1827.165343] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1827.170900] __sys_sendmsg+0x105/0x1d0 [ 1827.174802] ? __ia32_sys_shutdown+0x80/0x80 [ 1827.179240] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1827.184794] ? fput+0x128/0x1a0 [ 1827.188099] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1827.192878] ? do_fast_syscall_32+0xd1/0xc98 [ 1827.197298] ? entry_SYSENTER_compat+0x70/0x7f [ 1827.201891] ? do_fast_syscall_32+0xd1/0xc98 [ 1827.206322] __ia32_compat_sys_sendmsg+0x7a/0xb0 08:21:08 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x2, 0x5, 0xd79e, 0x6]}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x103200, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.contro\x00ler3\x00 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1827.242182] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1827.242199] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1827.242207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1827.242215] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1827.242223] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1827.242231] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1827.655301] net_ratelimit: 25 callbacks suppressed [ 1827.655310] protocol 88fb is buggy, dev hsr_slave_0 [ 1827.655348] protocol 88fb is buggy, dev hsr_slave_1 [ 1827.660386] protocol 88fb is buggy, dev hsr_slave_1 [ 1827.665449] protocol 88fb is buggy, dev hsr_slave_0 [ 1827.680461] protocol 88fb is buggy, dev hsr_slave_1 08:21:09 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x107, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8}]}}}]}, 0x3c}}, 0x0) 08:21:09 executing program 3 (fault-call:1 fault-nth:11): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:09 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0xd8, r2, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x33}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6cc}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) 08:21:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x140011, r1, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0x40, 0x8000]) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000000)) fcntl$notify(r0, 0x402, 0x800000080000000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) syz_open_procfs(r3, &(0x7f0000000200)='attr/current\x00') 08:21:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xe}, 0x0) [ 1827.745369] protocol 88fb is buggy, dev hsr_slave_0 [ 1827.750490] protocol 88fb is buggy, dev hsr_slave_1 [ 1827.755669] protocol 88fb is buggy, dev hsr_slave_0 [ 1827.760744] protocol 88fb is buggy, dev hsr_slave_1 [ 1827.821294] FAULT_INJECTION: forcing a failure. [ 1827.821294] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1827.833153] CPU: 1 PID: 22048 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1827.839999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.849354] Call Trace: [ 1827.849384] dump_stack+0x172/0x1f0 [ 1827.849411] should_fail.cold+0xa/0x15 [ 1827.849432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1827.859521] ? debug_smp_processor_id+0x3c/0x280 [ 1827.859543] ? perf_trace_lock+0xeb/0x510 [ 1827.859559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.859579] should_fail_alloc_page+0x50/0x60 [ 1827.883591] __alloc_pages_nodemask+0x1a1/0x710 [ 1827.888271] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1827.888287] ? find_held_lock+0x35/0x130 [ 1827.888313] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1827.888336] cache_grow_begin+0x9c/0x8c0 [ 1827.888353] ? __kmalloc_node+0x3d/0x70 [ 1827.888371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1827.888393] kmem_cache_alloc_node_trace+0x658/0x720 [ 1827.888418] __kmalloc_node+0x3d/0x70 [ 1827.925009] kvmalloc_node+0xbd/0x100 [ 1827.928825] alloc_netdev_mqs+0x67f/0xd30 [ 1827.928860] ? __bond_opt_init+0xb0/0xb0 [ 1827.928882] rtnl_create_link+0x22d/0xac0 [ 1827.928913] __rtnl_newlink+0xf7b/0x16c0 [ 1827.941270] ? rtnl_link_unregister+0x250/0x250 [ 1827.941287] ? lock_downgrade+0x880/0x880 [ 1827.941303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.941331] ? is_bpf_text_address+0xd3/0x170 [ 1827.964201] ? kernel_text_address+0x73/0xf0 [ 1827.968625] ? __kernel_text_address+0xd/0x40 [ 1827.973131] ? unwind_get_return_address+0x61/0xa0 [ 1827.978073] ? __save_stack_trace+0x8a/0xf0 [ 1827.982423] ? save_stack+0xa9/0xd0 [ 1827.986063] ? save_stack+0x45/0xd0 [ 1827.986081] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1827.986097] ? kasan_kmalloc+0x9/0x10 [ 1827.986112] ? kmem_cache_alloc_trace+0x151/0x760 [ 1827.986129] ? rtnl_newlink+0x4b/0xa0 [ 1827.986143] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1827.986235] rtnl_newlink+0x69/0xa0 [ 1827.994913] ? __rtnl_newlink+0x16c0/0x16c0 [ 1827.994932] rtnetlink_rcv_msg+0x465/0xb00 [ 1827.994955] ? rtnetlink_put_metrics+0x560/0x560 [ 1827.994972] ? __lockdep_free_key_range+0x120/0x120 [ 1827.994989] ? netdev_pick_tx+0x300/0x300 [ 1827.995007] ? netlink_deliver_tap+0x22d/0xbf0 [ 1828.042644] ? find_held_lock+0x35/0x130 [ 1828.046729] netlink_rcv_skb+0x17a/0x460 [ 1828.050809] ? rtnetlink_put_metrics+0x560/0x560 [ 1828.055587] ? netlink_ack+0xb50/0xb50 [ 1828.059552] ? kasan_check_read+0x11/0x20 [ 1828.063714] ? netlink_deliver_tap+0x254/0xbf0 [ 1828.068321] rtnetlink_rcv+0x1d/0x30 [ 1828.072044] netlink_unicast+0x536/0x720 [ 1828.076119] ? netlink_attachskb+0x770/0x770 [ 1828.080544] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1828.085566] ? __check_object_size+0x3d/0x42f [ 1828.090085] netlink_sendmsg+0x8ae/0xd70 [ 1828.094166] ? netlink_unicast+0x720/0x720 [ 1828.098411] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1828.103283] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1828.108054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.113606] ? security_socket_sendmsg+0x93/0xc0 [ 1828.118381] ? netlink_unicast+0x720/0x720 [ 1828.122627] sock_sendmsg+0xdd/0x130 [ 1828.126361] ___sys_sendmsg+0x806/0x930 [ 1828.130355] ? copy_msghdr_from_user+0x430/0x430 [ 1828.135130] ? lock_downgrade+0x880/0x880 [ 1828.139285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.144846] ? kasan_check_read+0x11/0x20 [ 1828.149021] ? __fget+0x367/0x540 [ 1828.152488] ? ksys_dup3+0x3e0/0x3e0 [ 1828.156214] ? lock_downgrade+0x880/0x880 [ 1828.160387] ? __fget_light+0x1a9/0x230 [ 1828.164377] ? __fdget+0x1b/0x20 [ 1828.167754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1828.173307] __sys_sendmsg+0x105/0x1d0 [ 1828.177209] ? __ia32_sys_shutdown+0x80/0x80 [ 1828.181634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1828.187187] ? fput+0x128/0x1a0 [ 1828.190499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1828.195270] ? do_fast_syscall_32+0xd1/0xc98 [ 1828.199690] ? entry_SYSENTER_compat+0x70/0x7f [ 1828.204284] ? do_fast_syscall_32+0xd1/0xc98 [ 1828.208717] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1828.213495] do_fast_syscall_32+0x281/0xc98 [ 1828.217850] entry_SYSENTER_compat+0x70/0x7f [ 1828.222269] RIP: 0023:0xf7f4e869 [ 1828.225642] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1828.244561] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1828.252286] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1828.259570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1828.266860] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1828.274136] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1828.281436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1828.301603] Unknown ioctl 1074283779 [ 1828.333047] Unknown ioctl 4730 [ 1828.333184] Unknown ioctl 35075 08:21:09 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x14) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:09 executing program 3 (fault-call:1 fault-nth:12): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1828.455311] protocol 88fb is buggy, dev hsr_slave_0 [ 1828.661835] FAULT_INJECTION: forcing a failure. [ 1828.661835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1828.673711] CPU: 1 PID: 22069 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1828.680565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.689935] Call Trace: [ 1828.692548] dump_stack+0x172/0x1f0 [ 1828.696196] should_fail.cold+0xa/0x15 [ 1828.700096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.705655] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1828.710771] ? debug_smp_processor_id+0x3c/0x280 [ 1828.715551] ? perf_trace_lock+0xeb/0x510 [ 1828.719731] should_fail_alloc_page+0x50/0x60 [ 1828.724240] __alloc_pages_nodemask+0x1a1/0x710 [ 1828.728928] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1828.733952] ? find_held_lock+0x35/0x130 [ 1828.738034] ? kasan_check_write+0x14/0x20 [ 1828.742283] cache_grow_begin+0x9c/0x8c0 [ 1828.746354] ? kasan_check_read+0x11/0x20 [ 1828.750514] ? do_raw_spin_unlock+0x57/0x270 [ 1828.754948] ____cache_alloc_node+0x17c/0x1e0 [ 1828.759456] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1828.765013] kmem_cache_alloc_node_trace+0xec/0x720 [ 1828.770056] __kmalloc_node+0x3d/0x70 [ 1828.773873] kvmalloc_node+0xbd/0x100 [ 1828.773895] alloc_netdev_mqs+0x67f/0xd30 [ 1828.773915] ? __bond_opt_init+0xb0/0xb0 [ 1828.785941] rtnl_create_link+0x22d/0xac0 [ 1828.790118] __rtnl_newlink+0xf7b/0x16c0 [ 1828.794206] ? rtnl_link_unregister+0x250/0x250 [ 1828.798894] ? lock_downgrade+0x880/0x880 [ 1828.803059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.808624] ? is_bpf_text_address+0xd3/0x170 [ 1828.813129] ? kernel_text_address+0x73/0xf0 [ 1828.817551] ? __kernel_text_address+0xd/0x40 [ 1828.822058] ? unwind_get_return_address+0x61/0xa0 [ 1828.827005] ? __save_stack_trace+0x8a/0xf0 [ 1828.831354] ? save_stack+0xa9/0xd0 [ 1828.834997] ? save_stack+0x45/0xd0 [ 1828.838637] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1828.843753] ? kasan_kmalloc+0x9/0x10 [ 1828.847564] ? kmem_cache_alloc_trace+0x151/0x760 [ 1828.852419] ? rtnl_newlink+0x4b/0xa0 [ 1828.856236] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1828.860729] rtnl_newlink+0x69/0xa0 [ 1828.864371] ? __rtnl_newlink+0x16c0/0x16c0 [ 1828.868702] rtnetlink_rcv_msg+0x465/0xb00 [ 1828.872954] ? rtnetlink_put_metrics+0x560/0x560 [ 1828.877712] ? __lockdep_free_key_range+0x120/0x120 [ 1828.882719] ? netdev_pick_tx+0x300/0x300 [ 1828.886874] ? netlink_deliver_tap+0x22d/0xbf0 [ 1828.891449] ? find_held_lock+0x35/0x130 [ 1828.895503] netlink_rcv_skb+0x17a/0x460 [ 1828.899558] ? rtnetlink_put_metrics+0x560/0x560 [ 1828.904317] ? netlink_ack+0xb50/0xb50 [ 1828.908207] ? kasan_check_read+0x11/0x20 [ 1828.912347] ? netlink_deliver_tap+0x254/0xbf0 [ 1828.916925] rtnetlink_rcv+0x1d/0x30 [ 1828.920629] netlink_unicast+0x536/0x720 [ 1828.924698] ? netlink_attachskb+0x770/0x770 [ 1828.929113] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1828.934132] ? __check_object_size+0x3d/0x42f [ 1828.938640] netlink_sendmsg+0x8ae/0xd70 [ 1828.942739] ? netlink_unicast+0x720/0x720 [ 1828.946974] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1828.951822] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1828.956578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.962137] ? security_socket_sendmsg+0x93/0xc0 [ 1828.966899] ? netlink_unicast+0x720/0x720 [ 1828.971128] sock_sendmsg+0xdd/0x130 [ 1828.974858] ___sys_sendmsg+0x806/0x930 [ 1828.978849] ? copy_msghdr_from_user+0x430/0x430 [ 1828.983599] ? lock_downgrade+0x880/0x880 [ 1828.987747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.993306] ? kasan_check_read+0x11/0x20 [ 1828.997452] ? __fget+0x367/0x540 [ 1829.000897] ? ksys_dup3+0x3e0/0x3e0 [ 1829.004598] ? lock_downgrade+0x880/0x880 [ 1829.008765] ? __fget_light+0x1a9/0x230 [ 1829.012832] ? __fdget+0x1b/0x20 [ 1829.016199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1829.021726] __sys_sendmsg+0x105/0x1d0 [ 1829.025602] ? __ia32_sys_shutdown+0x80/0x80 [ 1829.029999] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1829.035540] ? fput+0x128/0x1a0 [ 1829.038852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1829.043628] ? do_fast_syscall_32+0xd1/0xc98 [ 1829.048040] ? entry_SYSENTER_compat+0x70/0x7f [ 1829.052613] ? do_fast_syscall_32+0xd1/0xc98 [ 1829.057016] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1829.061765] do_fast_syscall_32+0x281/0xc98 [ 1829.066081] entry_SYSENTER_compat+0x70/0x7f [ 1829.070477] RIP: 0023:0xf7f4e869 [ 1829.073834] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1829.092741] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1829.100455] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 08:21:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) connect$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x24}, 0x20}}, 0x24) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) fcntl$notify(0xffffffffffffffff, 0x402, 0x28) [ 1829.107722] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1829.114989] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1829.122256] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1829.129533] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8}]}}}]}, 0x3c}}, 0x0) 08:21:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x518e}, &(0x7f0000000080)=0xff6d) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r0, 0x10000, 0x30}, &(0x7f0000000140)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf}, 0x0) 08:21:11 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x108, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:11 executing program 3 (fault-call:1 fault-nth:13): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)) r0 = openat$cachefiles(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x0, r1}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe7, 0xfffffffffffff530, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffff9c, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x100) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r3, 0x402, 0x28) 08:21:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x10}, 0x0) 08:21:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8}]}}}]}, 0x3c}}, 0x0) 08:21:11 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000540)=0xe8) r6 = getuid() getresuid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000680)) getresgid(&(0x7f00000006c0), &(0x7f0000000700)=0x0, &(0x7f0000000740)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000900)=[0xee01, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() getgroups(0x2, &(0x7f0000000a00)=[0xee00, 0xee00]) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000010007000000000002000400", @ANYRES32=r2, @ANYBLOB="02000700", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r5, @ANYBLOB="02000500", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="040007000000000008000700", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="08000300", @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32=r12, @ANYBLOB="893f000056675bd21e44736b0827230b35214cdb67c79c250e4939a89910260e71326f25af06f1a48265d09498759d762b3dd734c9b3abb166f415076fa7905a92a2d4b351af79b2d89463736c02153f29e5da6336179d", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="10000400000000002000030000000000"], 0x8c, 0x3) [ 1829.977536] FAULT_INJECTION: forcing a failure. [ 1829.977536] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1830.015430] CPU: 1 PID: 22105 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1830.022335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.031701] Call Trace: [ 1830.034308] dump_stack+0x172/0x1f0 [ 1830.037955] should_fail.cold+0xa/0x15 [ 1830.037981] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1830.038001] ? ___might_sleep+0x163/0x280 [ 1830.038031] should_fail_alloc_page+0x50/0x60 [ 1830.038048] __alloc_pages_nodemask+0x1a1/0x710 [ 1830.038066] ? __lockdep_free_key_range+0x120/0x120 [ 1830.038090] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1830.047090] ? cache_grow_begin+0x5a2/0x8c0 08:21:11 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x111, 0x81, 0x0, 0x968, 0x1000, 0x81, 0x0, 0x7f, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e22, 0x6ea6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fffffff}}}, 0x84) [ 1830.047108] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1830.047126] ? trace_hardirqs_on+0x67/0x230 [ 1830.047147] cache_grow_begin+0x9c/0x8c0 [ 1830.047167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1830.047181] ? __cpuset_node_allowed+0x136/0x540 [ 1830.047200] fallback_alloc+0x1fd/0x2d0 [ 1830.047223] ____cache_alloc_node+0x1be/0x1e0 [ 1830.047240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1830.056056] kmem_cache_alloc_node_trace+0xec/0x720 [ 1830.056087] __kmalloc_node+0x3d/0x70 [ 1830.056111] kvmalloc_node+0xbd/0x100 [ 1830.056132] alloc_netdev_mqs+0x67f/0xd30 [ 1830.056162] ? __bond_opt_init+0xb0/0xb0 [ 1830.056188] rtnl_create_link+0x22d/0xac0 [ 1830.056212] __rtnl_newlink+0xf7b/0x16c0 [ 1830.056239] ? rtnl_link_unregister+0x250/0x250 [ 1830.056256] ? lock_downgrade+0x880/0x880 [ 1830.056273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.056306] ? is_bpf_text_address+0xd3/0x170 [ 1830.056327] ? kernel_text_address+0x73/0xf0 [ 1830.056339] ? __kernel_text_address+0xd/0x40 [ 1830.056371] ? unwind_get_return_address+0x61/0xa0 [ 1830.071266] ? __save_stack_trace+0x8a/0xf0 [ 1830.071309] ? save_stack+0xa9/0xd0 [ 1830.071325] ? save_stack+0x45/0xd0 [ 1830.071348] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1830.080364] ? kasan_kmalloc+0x9/0x10 [ 1830.080378] ? kmem_cache_alloc_trace+0x151/0x760 [ 1830.080400] ? rtnl_newlink+0x4b/0xa0 [ 1830.080416] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1830.080516] rtnl_newlink+0x69/0xa0 [ 1830.125728] ? __rtnl_newlink+0x16c0/0x16c0 [ 1830.125748] rtnetlink_rcv_msg+0x465/0xb00 [ 1830.125773] ? rtnetlink_put_metrics+0x560/0x560 08:21:11 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x7, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x320, 0x0, 0x580, 0x1, 0x2, 0x1f, 0x1, 0x905, 0x10000, 0x9, 0x2, 0xffffffffffffff3d, 0x5, 0x6, 0x6, 0x7, 0x3, 0x8, 0x9, 0x7fff, 0x3, 0x2, 0x8, 0x4, 0x3, 0x6, 0x3ff, 0x26b4, 0xc148, 0x4, 0x0, 0x8, 0x3, @perf_config_ext={0x0, 0xa8}, 0x225bda83597b1de5, 0x7, 0x6, 0xf, 0x6, 0x6, 0x3f}, r1, 0x1, r0, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) [ 1830.133971] ? __lockdep_free_key_range+0x120/0x120 [ 1830.133989] ? netdev_pick_tx+0x300/0x300 [ 1830.134011] ? netlink_deliver_tap+0x22d/0xbf0 [ 1830.191438] ? find_held_lock+0x35/0x130 [ 1830.191472] netlink_rcv_skb+0x17a/0x460 [ 1830.191493] ? rtnetlink_put_metrics+0x560/0x560 [ 1830.200138] ? netlink_ack+0xb50/0xb50 [ 1830.200159] ? kasan_check_read+0x11/0x20 [ 1830.200182] ? netlink_deliver_tap+0x254/0xbf0 [ 1830.200209] rtnetlink_rcv+0x1d/0x30 [ 1830.200225] netlink_unicast+0x536/0x720 [ 1830.272245] ? netlink_attachskb+0x770/0x770 [ 1830.276669] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1830.281701] ? __check_object_size+0x3d/0x42f [ 1830.286217] netlink_sendmsg+0x8ae/0xd70 [ 1830.290300] ? netlink_unicast+0x720/0x720 [ 1830.294546] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1830.299409] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1830.304188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.309737] ? security_socket_sendmsg+0x93/0xc0 [ 1830.314510] ? netlink_unicast+0x720/0x720 [ 1830.318762] sock_sendmsg+0xdd/0x130 [ 1830.322500] ___sys_sendmsg+0x806/0x930 08:21:11 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x396, 0x301c02) 08:21:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) lseek(r1, 0x0, 0x3) fcntl$notify(r2, 0x402, 0x28) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) [ 1830.326494] ? copy_msghdr_from_user+0x430/0x430 [ 1830.331270] ? lock_downgrade+0x880/0x880 [ 1830.335424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.340997] ? kasan_check_read+0x11/0x20 [ 1830.345168] ? __fget+0x367/0x540 [ 1830.348641] ? ksys_dup3+0x3e0/0x3e0 [ 1830.352368] ? lock_downgrade+0x880/0x880 [ 1830.356541] ? __fget_light+0x1a9/0x230 [ 1830.360535] ? __fdget+0x1b/0x20 [ 1830.363915] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1830.369470] __sys_sendmsg+0x105/0x1d0 [ 1830.373369] ? __ia32_sys_shutdown+0x80/0x80 [ 1830.377790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1830.383345] ? fput+0x128/0x1a0 [ 1830.386654] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1830.391423] ? do_fast_syscall_32+0xd1/0xc98 [ 1830.395862] ? entry_SYSENTER_compat+0x70/0x7f [ 1830.400464] ? do_fast_syscall_32+0xd1/0xc98 [ 1830.404903] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1830.409677] do_fast_syscall_32+0x281/0xc98 [ 1830.414338] entry_SYSENTER_compat+0x70/0x7f [ 1830.418757] RIP: 0023:0xf7f4e869 [ 1830.422137] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1830.441050] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1830.448869] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1830.456154] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1830.463433] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1830.470722] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1830.478006] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:11 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x390b5b71, 0x181100) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x800, 0x8000000000c, 0x7, 0x3, 0x0, 0x8000, 0x0, 0x40, 0x0, 0xcee, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1000000000000000, 0x7, 0x1, 0x3f}, 0x0, 0x0, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x463, 0x20081) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000280)=0x8000) write$P9_ROPEN(r2, &(0x7f0000000380)={0x18, 0x71, 0x1, {{0x50, 0x1}, 0x3f}}, 0x18) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000500)={0xfe, 0x10005, 0x6}) fcntl$notify(r1, 0x402, 0x10) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x201) openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.memory_migrate\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc00c6419, &(0x7f0000001680)={0xffffffffffffffe6, &(0x7f0000000040)=""/60, &(0x7f00000003c0)=[{0x80000001, 0x0, 0x45, &(0x7f00000016c0)=""/250}, {0xffffffff, 0x149, 0x7, &(0x7f00000017c0)=""/136}, {0x81, 0x0, 0x6, &(0x7f0000000480)=""/102}, {0x8000, 0x0, 0x2, &(0x7f0000001900)=""/61}]}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000340)={0x3, 0x39565559, 0x100000000, 0xde, 0x3, @stepwise={{0x2f}, {0x2}, {0x5, 0x9}}}) 08:21:11 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1410c0, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x44) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.memory_pres\xd5|\xd6\xf1sure\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r3, 0x8, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x11, 0x0, @l2={'eth', 0x3a, 'rose0\x00'}}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x4000000) fcntl$notify(r2, 0x402, 0x28) 08:21:12 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x109, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:12 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='\xa0\xc4\xd7\xb8\xe7*i\xea\x8e\x8dt=\x98\x88r\x8e\xa8a.c\xbe\x16\xf0\xc3}\xce_\xd5\x89\xb6\x92L\xf2\xdcJD]\x8abD%\xb3I><\xa5F$x\xcc\x8eW\x81~\xa5\xd8\x8dO[\xc6\x15:FtM\xca\xd8\v:l#\x88\x16\xafBJT\xea?\xe3\xf35n\x97\xd8upHR\t\xecv\x82z!\x06?\xf1\vY\xca\xa4S\xf2\x95\x01\xcb\xa9\xfbb\xbeko\xf4\xdb\xee\xd6\x7f\xf1\xff\xff\xc1/\xa1A\xd3\xef\xb7\x9f\xca\n/\x10\x03lRjJn\x15\x84\x13f\xae}\xaa\xa6\xaf\f\xe7\xe4\xdbT\xd2\xb9A[K3.\x11 \x16\xce\xf0\xd8\xdd6\x82\x8e\xc6\xdc\xf7X\xa7\v\xdf\xc0\xe0\x8aj\xd7\xc0\xa6\x972\xed\xaa\xebP\xe3`B<\xe1_d\xa5\'\xe6\xc4\xc1\x8eL0x(!3*-\xceRbf\xd4\xb5\xea\xc4\xb1Y\xdf\xccd\xddM\x16\x84\x1c,?8\a\x90\xf0\xb0\xb8c-L[]\xce.\xd5\x14o@|\x97(\x8a+W|\xf0F\a$\x19\xfa\x89\x12c\x85', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 08:21:12 executing program 3 (fault-call:1 fault-nth:14): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x60}, 0x0) 08:21:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x140011, r1, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0x40, 0x8000]) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000000)) fcntl$notify(r0, 0x402, 0x800000080000000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) syz_open_procfs(r3, &(0x7f0000000200)='attr/current\x00') 08:21:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) fcntl$notify(r1, 0x402, 0x28) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x93, 0x5, 0x101, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x2, 0x9, 0x4, 0xe5b, 0x4df4, 0x1, 0x5, 0x9, 0x800, 0x8001, 0x80000001, 0x597, 0x7, 0x9, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0x7, 0x3d3, 0x0, 0x1, 0x3, 0x5d4, 0x3f, 0x9, 0x7d0, 0x22d, 0x9, 0x0, 0x5, 0x0, @perf_bp, 0x100, 0x20, 0x2, 0x0, 0xff, 0x8001, 0x71c2}, 0xffffffffffffffff, 0x8, r0, 0xa) [ 1831.150902] FAULT_INJECTION: forcing a failure. [ 1831.150902] name failslab, interval 1, probability 0, space 0, times 0 [ 1831.157891] Unknown ioctl 1074283779 08:21:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf0}, 0x0) 08:21:12 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40087447, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x6, 0x1ff, 0x100000000}]}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0x384) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x1, 0x101, 0x20, 0x400, 0x1daa}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in=@loopback, 0x4e21, 0x398, 0x4e22, 0x2, 0xa, 0x20, 0xa0, 0x3b, r1, r2}, {0x5, 0xafee, 0x1, 0x6, 0x3ff, 0x7, 0x891, 0x3}, {0x3, 0x3, 0x7}, 0x96a2, 0x6e6bb9, 0x0, 0x0, 0x2}, {{@in=@multicast2, 0x4d6, 0x6c}, 0x2, @in=@multicast2, 0x34ff, 0x7, 0x0, 0xd8fa, 0x7fff, 0x0, 0xfffffffffffffffc}}, 0xe8) fcntl$notify(r0, 0x402, 0x10) fdatasync(r0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x776, 0x0) [ 1831.205650] CPU: 1 PID: 22154 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1831.212546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1831.221913] Call Trace: [ 1831.224523] dump_stack+0x172/0x1f0 [ 1831.228179] should_fail.cold+0xa/0x15 [ 1831.232093] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1831.237221] ? ___might_sleep+0x163/0x280 [ 1831.237246] __should_failslab+0x121/0x190 [ 1831.237269] should_failslab+0x9/0x14 [ 1831.249448] kmem_cache_alloc_node_trace+0x270/0x720 [ 1831.254572] ? kasan_unpoison_shadow+0x35/0x50 [ 1831.254600] __kmalloc_node+0x3d/0x70 [ 1831.254622] kvmalloc_node+0x68/0x100 [ 1831.254641] alloc_netdev_mqs+0x821/0xd30 [ 1831.270967] rtnl_create_link+0x22d/0xac0 [ 1831.275142] __rtnl_newlink+0xf7b/0x16c0 [ 1831.279238] ? rtnl_link_unregister+0x250/0x250 [ 1831.283920] ? lock_downgrade+0x880/0x880 [ 1831.288081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.293651] ? is_bpf_text_address+0xd3/0x170 [ 1831.298156] ? kernel_text_address+0x73/0xf0 [ 1831.298173] ? __kernel_text_address+0xd/0x40 [ 1831.298194] ? unwind_get_return_address+0x61/0xa0 [ 1831.312026] ? __save_stack_trace+0x8a/0xf0 [ 1831.316375] ? save_stack+0xa9/0xd0 [ 1831.316394] ? save_stack+0x45/0xd0 [ 1831.316410] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1831.316427] ? kasan_kmalloc+0x9/0x10 [ 1831.332563] ? kmem_cache_alloc_trace+0x151/0x760 [ 1831.337417] ? rtnl_newlink+0x4b/0xa0 [ 1831.341005] Unknown ioctl 4730 [ 1831.341232] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1831.341327] rtnl_newlink+0x69/0xa0 [ 1831.348898] ? __rtnl_newlink+0x16c0/0x16c0 [ 1831.356825] rtnetlink_rcv_msg+0x465/0xb00 [ 1831.356856] ? rtnetlink_put_metrics+0x560/0x560 [ 1831.356872] ? __lockdep_free_key_range+0x120/0x120 [ 1831.356888] ? netdev_pick_tx+0x300/0x300 [ 1831.356906] ? netlink_deliver_tap+0x22d/0xbf0 [ 1831.379613] ? find_held_lock+0x35/0x130 [ 1831.383698] netlink_rcv_skb+0x17a/0x460 [ 1831.387782] ? rtnetlink_put_metrics+0x560/0x560 [ 1831.391551] Unknown ioctl 35075 [ 1831.392552] ? netlink_ack+0xb50/0xb50 [ 1831.392572] ? kasan_check_read+0x11/0x20 08:21:12 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r1, 0x4, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x44804}, 0x8000) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x154) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$notify(r0, 0x402, 0x10) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000400)=0x8) [ 1831.392595] ? netlink_deliver_tap+0x254/0xbf0 [ 1831.392621] rtnetlink_rcv+0x1d/0x30 [ 1831.392637] netlink_unicast+0x536/0x720 [ 1831.392658] ? netlink_attachskb+0x770/0x770 [ 1831.420688] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1831.425715] ? __check_object_size+0x3d/0x42f [ 1831.430232] netlink_sendmsg+0x8ae/0xd70 [ 1831.434314] ? netlink_unicast+0x720/0x720 [ 1831.438566] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1831.443427] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1831.448199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.453752] ? security_socket_sendmsg+0x93/0xc0 [ 1831.458520] ? netlink_unicast+0x720/0x720 [ 1831.462770] sock_sendmsg+0xdd/0x130 [ 1831.466504] ___sys_sendmsg+0x806/0x930 [ 1831.470498] ? copy_msghdr_from_user+0x430/0x430 [ 1831.475268] ? retint_kernel+0x2d/0x2d [ 1831.479173] ? lock_downgrade+0x880/0x880 [ 1831.483334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.488895] ? kasan_check_read+0x11/0x20 [ 1831.493073] ? __fget+0x367/0x540 [ 1831.496549] ? ksys_dup3+0x3e0/0x3e0 [ 1831.500271] ? lock_downgrade+0x880/0x880 08:21:12 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = getuid() r3 = getegid() fchown(r0, r2, r3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x403c5404, &(0x7f00000001c0)={{0x3, 0x3, 0x8}, 0x0, 0xfff}) r4 = openat$cgroup_ro(r1, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x6, 0x70, 0x9, 0x3, 0x4, 0x6fb, 0x0, 0x99, 0x801, 0x8, 0x1, 0x5, 0x8, 0x7, 0x6b, 0x6, 0x5, 0x3, 0xfffffffffffffff8, 0x5, 0x800, 0x6, 0x3, 0x1f, 0x1a5, 0xd26, 0x4c7e, 0x20, 0xc8e, 0x5f8, 0x8, 0x1, 0x7d, 0x3, 0x10000, 0x70d1, 0x2, 0x1bca, 0x0, 0x400, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0x9, 0x2bb, 0x5, 0x1f, 0x1, 0xfffffffffffffffa}, r4, 0x3, 0xffffffffffffffff, 0x4) fcntl$notify(r1, 0x402, 0x20) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f00000000c0)=0xc0000000000000) getsockopt$sock_buf(r4, 0x1, 0x3d, &(0x7f0000000100)=""/86, &(0x7f0000000180)=0x56) [ 1831.504435] ? __fget_light+0x1a9/0x230 [ 1831.508434] ? __fdget+0x1b/0x20 [ 1831.511823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1831.517385] __sys_sendmsg+0x105/0x1d0 [ 1831.521279] ? __ia32_sys_shutdown+0x80/0x80 [ 1831.525707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1831.531253] ? fput+0x128/0x1a0 [ 1831.534556] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1831.539329] ? do_fast_syscall_32+0xd1/0xc98 [ 1831.543749] ? entry_SYSENTER_compat+0x70/0x7f [ 1831.548822] ? do_fast_syscall_32+0xd1/0xc98 08:21:12 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0x19}}}, 0x1e) [ 1831.553268] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1831.558045] do_fast_syscall_32+0x281/0xc98 [ 1831.562392] entry_SYSENTER_compat+0x70/0x7f [ 1831.566807] RIP: 0023:0xf7f4e869 [ 1831.570191] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1831.589102] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1831.596826] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 08:21:13 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000040)={{0xe3, 0x200000000000, 0xfff}, 'syz0\x00', 0x37}) fcntl$notify(r1, 0x402, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000000)=""/21, 0x15) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f0000000300)) fcntl$notify(r1, 0x402, 0x28) [ 1831.604120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1831.611398] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1831.618670] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1831.618681] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:13 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8374}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2}, 0x8) fcntl$notify(r1, 0x402, 0x10) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000000)=0x1) 08:21:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x140, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000280)="0f20e06635000001000f22e0f9f20f2a49b26766c7442400149f584e6766c7442402640000006766c744240600000000670f011c2466b8dc7d00000f23d00f21f86635300000080f23f8baf80c66b85001668b66efbafc0c66b80058000066ef66b9880a000066b80b1f000066ba000000000f306766c7442400002800006766c7442402001800006766c744240600000000670f011c24b82f018ee00f17bf7300", 0xa1}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000440)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) fcntl$notify(r3, 0x402, 0x10) setsockopt(r1, 0x1, 0x7, &(0x7f0000000380)="947d76aeb2e5bad77a2a8b3ccb0b9d4c5d5757ca33f26ecca3ef198e791dcf66bd09efaa65310ea32c94084b5bd2c10b481adf25741b8d8e9d685136953c239b3c103d3aacda5ca1cca023b182b8f1a4dc2b011a4fa144290cc58ffb894f550c237664eea08e2fc5776a32056077dae90ecc08b358c7269e69ed6f41d488e12d625eb649c61bb0db82fbf394cd4864006a505b7491cc8f3d5682607bea17ffd46c33c01c03aca94618b13c119f42b69aed936837465123", 0xb7) fcntl$notify(r3, 0x402, 0x28) r4 = getpid() perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x2, 0x7, 0x1, 0x5fad7b02, 0x0, 0x3, 0x1, 0xc, 0x1, 0xb7c4, 0x1000, 0x1000, 0x3, 0x10000, 0xa8, 0xffffffffffffff81, 0xbdc9, 0x72db, 0x200, 0x7fffffff, 0x200, 0x1000, 0x2, 0x8, 0x20, 0xa44, 0x7, 0x5cba, 0x9, 0x5, 0xffffffffffffff3f, 0x2, 0x100000000, 0x8, 0x4, 0xf71, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000580), 0x9}, 0x20008, 0x1, 0xb727, 0x3, 0x2, 0x0, 0x9}, r4, 0x4000000, r0, 0x2) 08:21:13 executing program 3 (fault-call:1 fault-nth:15): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x300}, 0x0) 08:21:13 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x10a, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000040)=""/74, 0x1000000, 0x1800, 0x80}, 0x18) fcntl$notify(r1, 0x402, 0x28) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000000)='securityvmnet0*trusted\'md5sum\x00', 0x1e) [ 1832.026230] FAULT_INJECTION: forcing a failure. [ 1832.026230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1832.038084] CPU: 0 PID: 22208 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1832.038096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1832.038103] Call Trace: [ 1832.038130] dump_stack+0x172/0x1f0 [ 1832.038157] should_fail.cold+0xa/0x15 [ 1832.038181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1832.038199] ? debug_smp_processor_id+0x3c/0x280 [ 1832.038218] ? perf_trace_lock+0xeb/0x510 [ 1832.038236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.038258] should_fail_alloc_page+0x50/0x60 [ 1832.038274] __alloc_pages_nodemask+0x1a1/0x710 [ 1832.038298] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1832.038312] ? find_held_lock+0x35/0x130 [ 1832.038339] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1832.038365] cache_grow_begin+0x9c/0x8c0 [ 1832.038384] ? __kmalloc_node+0x3d/0x70 [ 1832.038400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1832.038421] kmem_cache_alloc_node_trace+0x658/0x720 [ 1832.064710] __kmalloc_node+0x3d/0x70 [ 1832.093342] kvmalloc_node+0xbd/0x100 [ 1832.093364] alloc_netdev_mqs+0x67f/0xd30 [ 1832.093387] ? __bond_opt_init+0xb0/0xb0 [ 1832.093408] rtnl_create_link+0x22d/0xac0 [ 1832.093431] __rtnl_newlink+0xf7b/0x16c0 [ 1832.121145] ? rtnl_link_unregister+0x250/0x250 [ 1832.142008] ? lock_downgrade+0x880/0x880 [ 1832.142025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.142057] ? is_bpf_text_address+0xd3/0x170 [ 1832.142073] ? kernel_text_address+0x73/0xf0 [ 1832.142089] ? __kernel_text_address+0xd/0x40 [ 1832.154965] ? unwind_get_return_address+0x61/0xa0 [ 1832.154984] ? __save_stack_trace+0x8a/0xf0 [ 1832.155020] ? save_stack+0xa9/0xd0 [ 1832.155037] ? save_stack+0x45/0xd0 [ 1832.187325] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1832.187341] ? kasan_kmalloc+0x9/0x10 [ 1832.187357] ? kmem_cache_alloc_trace+0x151/0x760 [ 1832.187374] ? rtnl_newlink+0x4b/0xa0 [ 1832.187390] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1832.187482] rtnl_newlink+0x69/0xa0 [ 1832.187498] ? __rtnl_newlink+0x16c0/0x16c0 [ 1832.187517] rtnetlink_rcv_msg+0x465/0xb00 [ 1832.187537] ? rtnetlink_put_metrics+0x560/0x560 [ 1832.208601] ? __lockdep_free_key_range+0x120/0x120 [ 1832.208619] ? netdev_pick_tx+0x300/0x300 [ 1832.208637] ? netlink_deliver_tap+0x22d/0xbf0 [ 1832.208654] ? find_held_lock+0x35/0x130 [ 1832.208678] netlink_rcv_skb+0x17a/0x460 [ 1832.208698] ? rtnetlink_put_metrics+0x560/0x560 [ 1832.208717] ? netlink_ack+0xb50/0xb50 [ 1832.208735] ? kasan_check_read+0x11/0x20 [ 1832.208755] ? netlink_deliver_tap+0x254/0xbf0 [ 1832.208783] rtnetlink_rcv+0x1d/0x30 [ 1832.233888] netlink_unicast+0x536/0x720 [ 1832.233913] ? netlink_attachskb+0x770/0x770 [ 1832.233932] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1832.233955] ? __check_object_size+0x3d/0x42f [ 1832.233976] netlink_sendmsg+0x8ae/0xd70 [ 1832.280904] ? netlink_unicast+0x720/0x720 [ 1832.280924] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1832.307953] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1832.307973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.307987] ? security_socket_sendmsg+0x93/0xc0 [ 1832.308004] ? netlink_unicast+0x720/0x720 [ 1832.308023] sock_sendmsg+0xdd/0x130 [ 1832.308044] ___sys_sendmsg+0x806/0x930 [ 1832.308064] ? copy_msghdr_from_user+0x430/0x430 [ 1832.308087] ? lock_downgrade+0x880/0x880 [ 1832.308101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.308119] ? kasan_check_read+0x11/0x20 [ 1832.308138] ? __fget+0x367/0x540 [ 1832.339798] ? ksys_dup3+0x3e0/0x3e0 [ 1832.339815] ? lock_downgrade+0x880/0x880 [ 1832.339853] ? __fget_light+0x1a9/0x230 [ 1832.339871] ? __fdget+0x1b/0x20 [ 1832.364967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1832.377835] __sys_sendmsg+0x105/0x1d0 [ 1832.381778] ? __ia32_sys_shutdown+0x80/0x80 [ 1832.386203] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1832.391758] ? fput+0x128/0x1a0 [ 1832.395068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1832.399838] ? do_fast_syscall_32+0xd1/0xc98 [ 1832.404274] ? entry_SYSENTER_compat+0x70/0x7f [ 1832.408873] ? do_fast_syscall_32+0xd1/0xc98 [ 1832.413302] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1832.418449] do_fast_syscall_32+0x281/0xc98 [ 1832.422808] entry_SYSENTER_compat+0x70/0x7f 08:21:13 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:13 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socket$inet(0x2, 0x807, 0x9) fcntl$notify(r0, 0x402, 0x10) [ 1832.427248] RIP: 0023:0xf7f4e869 [ 1832.430630] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1832.449548] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1832.457275] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1832.464559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1832.471851] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1832.479134] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1832.486424] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x80, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000380)) fcntl$notify(r1, 0x402, 0x10) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000300), &(0x7f0000000340)=0x4) fcntl$notify(r1, 0x402, 0x28) futex(&(0x7f0000000000)=0x2, 0x9, 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x2) 08:21:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x500}, 0x0) 08:21:13 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0xfffdffff80000001) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000000140)='./file0\x00', 0x3) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000180)=""/7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffe98) r5 = getpgid(0xffffffffffffffff) ptrace$setregs(0xf, r5, 0x44aa, &(0x7f00000005c0)="77214dbae7716765d89a779003a4bccdd86da7eabe0b18ea13ff9779fa40bc5806ad522d9e6ea6a78d450c30faa311ae5dd7b76dd7f63be45275a1594daa0eac895d93858e1f79d6ca38d2aee85875956dc957798641f4e2324f5825ce8a") rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000340)='./file0\x00', 0x0) 08:21:14 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) unshare(0x10000) 08:21:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='/\x00~WM\x00\x00\x00\x00\x90\"\xcf\xde&\x9f\xde\xb9L\xcb5-yn\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xb5\xd4+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:14 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:14 executing program 3 (fault-call:1 fault-nth:16): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='/\x00~WM\x00\x00\x00\x00\x90\"\xcf\xde&\x9f\xde\xb9L\xcb5-yn\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xb5\xd4+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) [ 1833.224281] FAULT_INJECTION: forcing a failure. [ 1833.224281] name failslab, interval 1, probability 0, space 0, times 0 [ 1833.246324] CPU: 1 PID: 22271 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1833.253213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.262580] Call Trace: [ 1833.265194] dump_stack+0x172/0x1f0 [ 1833.268834] should_fail.cold+0xa/0x15 [ 1833.272727] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1833.277826] ? ___might_sleep+0x163/0x280 [ 1833.281985] __should_failslab+0x121/0x190 [ 1833.286230] should_failslab+0x9/0x14 [ 1833.290021] kmem_cache_alloc_node_trace+0x270/0x720 [ 1833.295114] ? kasan_unpoison_shadow+0x35/0x50 [ 1833.299697] __kmalloc_node+0x3d/0x70 [ 1833.303492] kvmalloc_node+0x68/0x100 [ 1833.307283] alloc_netdev_mqs+0x821/0xd30 [ 1833.311426] rtnl_create_link+0x22d/0xac0 [ 1833.315585] __rtnl_newlink+0xf7b/0x16c0 [ 1833.319645] ? rtnl_link_unregister+0x250/0x250 [ 1833.324303] ? lock_downgrade+0x880/0x880 [ 1833.328459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.334013] ? is_bpf_text_address+0xd3/0x170 [ 1833.338558] ? kernel_text_address+0x73/0xf0 [ 1833.342971] ? __kernel_text_address+0xd/0x40 [ 1833.347480] ? unwind_get_return_address+0x61/0xa0 [ 1833.352403] ? __save_stack_trace+0x8a/0xf0 [ 1833.356726] ? save_stack+0xa9/0xd0 [ 1833.360360] ? save_stack+0x45/0xd0 [ 1833.363990] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1833.369085] ? kasan_kmalloc+0x9/0x10 [ 1833.372890] ? kmem_cache_alloc_trace+0x151/0x760 [ 1833.377733] ? rtnl_newlink+0x4b/0xa0 [ 1833.381519] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1833.385966] rtnl_newlink+0x69/0xa0 [ 1833.389583] ? __rtnl_newlink+0x16c0/0x16c0 [ 1833.393894] rtnetlink_rcv_msg+0x465/0xb00 [ 1833.398141] ? rtnetlink_put_metrics+0x560/0x560 [ 1833.402894] ? __lockdep_free_key_range+0x120/0x120 [ 1833.407913] ? netdev_pick_tx+0x300/0x300 [ 1833.412057] ? netlink_deliver_tap+0x22d/0xbf0 [ 1833.416628] ? find_held_lock+0x35/0x130 [ 1833.420682] netlink_rcv_skb+0x17a/0x460 [ 1833.424746] ? rtnetlink_put_metrics+0x560/0x560 [ 1833.429493] ? netlink_ack+0xb50/0xb50 [ 1833.433369] ? kasan_check_read+0x11/0x20 [ 1833.437524] ? netlink_deliver_tap+0x254/0xbf0 [ 1833.442103] rtnetlink_rcv+0x1d/0x30 [ 1833.445816] netlink_unicast+0x536/0x720 [ 1833.449890] ? netlink_attachskb+0x770/0x770 [ 1833.454288] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1833.459290] ? __check_object_size+0x3d/0x42f [ 1833.463779] netlink_sendmsg+0x8ae/0xd70 [ 1833.467834] ? netlink_unicast+0x720/0x720 [ 1833.472082] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1833.476840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.482388] ? security_socket_sendmsg+0x93/0xc0 [ 1833.487143] ? netlink_unicast+0x720/0x720 [ 1833.491381] sock_sendmsg+0xdd/0x130 [ 1833.495100] ___sys_sendmsg+0x806/0x930 [ 1833.499065] ? copy_msghdr_from_user+0x430/0x430 [ 1833.503820] ? lock_downgrade+0x880/0x880 [ 1833.508015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.513602] ? kasan_check_read+0x11/0x20 [ 1833.517744] ? __fget+0x367/0x540 [ 1833.521190] ? ksys_dup3+0x3e0/0x3e0 [ 1833.524893] ? lock_downgrade+0x880/0x880 [ 1833.529036] ? __fget_light+0x1a9/0x230 [ 1833.532999] ? __fdget+0x1b/0x20 [ 1833.536353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1833.541880] __sys_sendmsg+0x105/0x1d0 [ 1833.545772] ? __ia32_sys_shutdown+0x80/0x80 [ 1833.550183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1833.555711] ? fput+0x128/0x1a0 [ 1833.558988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1833.563741] ? do_fast_syscall_32+0xd1/0xc98 [ 1833.568146] ? entry_SYSENTER_compat+0x70/0x7f [ 1833.572723] ? do_fast_syscall_32+0xd1/0xc98 [ 1833.577129] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1833.581882] do_fast_syscall_32+0x281/0xc98 [ 1833.586195] entry_SYSENTER_compat+0x70/0x7f [ 1833.590589] RIP: 0023:0xf7f4e869 [ 1833.593943] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1833.612865] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1833.620565] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1833.627829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1833.635108] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1833.642366] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1833.649634] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:15 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x10b, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:15 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc1e4, 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x60, 0x2) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3d) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94Pf\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:15 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0xfffdffff80000001) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000000140)='./file0\x00', 0x3) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000180)=""/7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffe98) r5 = getpgid(0xffffffffffffffff) ptrace$setregs(0xf, r5, 0x44aa, &(0x7f00000005c0)="77214dbae7716765d89a779003a4bccdd86da7eabe0b18ea13ff9779fa40bc5806ad522d9e6ea6a78d450c30faa311ae5dd7b76dd7f63be45275a1594daa0eac895d93858e1f79d6ca38d2aee85875956dc957798641f4e2324f5825ce8a") rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000340)='./file0\x00', 0x0) 08:21:15 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) openat$cgroup_ro(r0, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) 08:21:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x543}, 0x0) 08:21:15 executing program 3 (fault-call:1 fault-nth:17): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1833.895292] net_ratelimit: 24 callbacks suppressed [ 1833.895301] protocol 88fb is buggy, dev hsr_slave_0 [ 1833.895306] protocol 88fb is buggy, dev hsr_slave_0 [ 1833.895349] protocol 88fb is buggy, dev hsr_slave_1 [ 1833.900340] protocol 88fb is buggy, dev hsr_slave_1 [ 1833.905438] protocol 88fb is buggy, dev hsr_slave_0 [ 1833.913175] FAULT_INJECTION: forcing a failure. [ 1833.913175] name failslab, interval 1, probability 0, space 0, times 0 [ 1833.915441] protocol 88fb is buggy, dev hsr_slave_1 [ 1833.920474] CPU: 1 PID: 22282 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1833.948492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.957867] Call Trace: [ 1833.960474] dump_stack+0x172/0x1f0 [ 1833.964379] should_fail.cold+0xa/0x15 [ 1833.968289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1833.973405] ? ___might_sleep+0x163/0x280 [ 1833.973429] __should_failslab+0x121/0x190 [ 1833.973460] should_failslab+0x9/0x14 [ 1833.973478] kmem_cache_alloc_trace+0x2d1/0x760 [ 1833.973495] ? rcu_read_lock_sched_held+0x110/0x130 [ 1833.995343] ? __kmalloc+0x5d5/0x740 [ 1833.999070] ? perf_trace_lock+0xeb/0x510 [ 1834.003231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.008783] alloc_workqueue_attrs+0x82/0x120 [ 1834.008806] alloc_workqueue+0x167/0xe70 [ 1834.008820] ? bond_init+0x17a/0x800 [ 1834.008836] ? find_held_lock+0x35/0x130 [ 1834.008862] ? bond_init+0x17a/0x800 [ 1834.008879] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1834.008900] ? lock_downgrade+0x880/0x880 [ 1834.038041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.043601] bond_init+0x1b3/0x800 [ 1834.047151] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1834.051487] register_netdevice+0x300/0xff0 [ 1834.055823] ? netdev_change_features+0xb0/0xb0 [ 1834.060523] bond_newlink+0x4b/0x90 [ 1834.064166] ? bond_changelink+0x1ac0/0x1ac0 [ 1834.068592] __rtnl_newlink+0x107b/0x16c0 [ 1834.072772] ? rtnl_link_unregister+0x250/0x250 [ 1834.077451] ? lock_downgrade+0x880/0x880 [ 1834.081603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.087163] ? is_bpf_text_address+0xd3/0x170 [ 1834.091664] ? kernel_text_address+0x73/0xf0 [ 1834.096084] ? __kernel_text_address+0xd/0x40 [ 1834.100587] ? unwind_get_return_address+0x61/0xa0 [ 1834.105522] ? __save_stack_trace+0x8a/0xf0 [ 1834.109875] ? save_stack+0xa9/0xd0 [ 1834.113512] ? save_stack+0x45/0xd0 [ 1834.117143] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1834.122250] ? kasan_kmalloc+0x9/0x10 [ 1834.126057] ? kmem_cache_alloc_trace+0x151/0x760 [ 1834.130907] ? rtnl_newlink+0x4b/0xa0 [ 1834.134716] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1834.139188] ? __hda_codec_driver_register+0x40/0x230 [ 1834.144408] rtnl_newlink+0x69/0xa0 [ 1834.148049] ? __rtnl_newlink+0x16c0/0x16c0 [ 1834.152374] rtnetlink_rcv_msg+0x465/0xb00 [ 1834.156623] ? rtnetlink_put_metrics+0x560/0x560 [ 1834.161381] ? __lockdep_free_key_range+0x120/0x120 [ 1834.166406] ? netdev_pick_tx+0x300/0x300 [ 1834.170561] ? netlink_deliver_tap+0x22d/0xbf0 [ 1834.175150] ? find_held_lock+0x35/0x130 [ 1834.179225] netlink_rcv_skb+0x17a/0x460 [ 1834.183298] ? rtnetlink_put_metrics+0x560/0x560 [ 1834.188064] ? netlink_ack+0xb50/0xb50 [ 1834.191961] ? kasan_check_read+0x11/0x20 [ 1834.196122] ? netlink_deliver_tap+0x254/0xbf0 [ 1834.200722] rtnetlink_rcv+0x1d/0x30 [ 1834.204449] netlink_unicast+0x536/0x720 [ 1834.208526] ? netlink_attachskb+0x770/0x770 [ 1834.212938] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1834.217958] ? __check_object_size+0x3d/0x42f [ 1834.222470] netlink_sendmsg+0x8ae/0xd70 [ 1834.226546] ? netlink_unicast+0x720/0x720 [ 1834.230798] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1834.235656] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1834.240429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.245998] ? security_socket_sendmsg+0x93/0xc0 [ 1834.250771] ? netlink_unicast+0x720/0x720 [ 1834.255019] sock_sendmsg+0xdd/0x130 [ 1834.258748] ___sys_sendmsg+0x806/0x930 [ 1834.262741] ? copy_msghdr_from_user+0x430/0x430 [ 1834.267509] ? lock_downgrade+0x880/0x880 [ 1834.271673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.277224] ? kasan_check_read+0x11/0x20 [ 1834.281388] ? __fget+0x367/0x540 [ 1834.284859] ? ksys_dup3+0x3e0/0x3e0 [ 1834.288577] ? lock_downgrade+0x880/0x880 [ 1834.292742] ? __fget_light+0x1a9/0x230 [ 1834.296726] ? __fdget+0x1b/0x20 [ 1834.300096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1834.305644] __sys_sendmsg+0x105/0x1d0 [ 1834.309537] ? __ia32_sys_shutdown+0x80/0x80 [ 1834.313957] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1834.319506] ? fput+0x128/0x1a0 [ 1834.322804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1834.327565] ? do_fast_syscall_32+0xd1/0xc98 [ 1834.331992] ? entry_SYSENTER_compat+0x70/0x7f [ 1834.336578] ? do_fast_syscall_32+0xd1/0xc98 [ 1834.341017] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1834.345793] do_fast_syscall_32+0x281/0xc98 [ 1834.350126] entry_SYSENTER_compat+0x70/0x7f [ 1834.354540] RIP: 0023:0xf7f4e869 [ 1834.357914] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1834.376822] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1834.384551] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 08:21:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x600}, 0x0) [ 1834.391829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1834.399114] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1834.406391] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1834.413917] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1834.425417] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.430575] protocol 88fb is buggy, dev hsr_slave_1 [ 1834.435734] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.440806] protocol 88fb is buggy, dev hsr_slave_1 08:21:15 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x4) write$binfmt_elf32(r0, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x2, 0x8, 0x6, 0x5db42b03, 0x3, 0x3, 0x0, 0x2d3, 0x38, 0x39d, 0x1, 0x80000000, 0x20, 0x1, 0x0, 0x0, 0xb1}, [{0x7474e557, 0x6, 0xab, 0x4, 0x1, 0x2, 0xe239, 0x9}], "6287160109c6d5a441f0d57c7edda46c038f9970daeb7bcd633c2ca2aff671cca6cd911a6d7126428e21d46a2467f52e918947a9667eef02cde6", [[], [], [], [], []]}, 0x592) 08:21:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:15 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x404000, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000280)=""/28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x11) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000400)=0xe8) r3 = getegid() fchownat(r0, &(0x7f00000002c0)='./file0\x00', r2, r3, 0x1000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000000)={0x1f, 0x0, 'client1\x00', 0x6, "b370d8425720b977", "141e726b0119541f466b1610394c06797322ce3f1d68039ce0aa8b9b043f052b", 0xffffffff, 0x4}) 08:21:16 executing program 3 (fault-call:1 fault-nth:18): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1834.755512] FAULT_INJECTION: forcing a failure. [ 1834.755512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1834.767379] CPU: 0 PID: 22311 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1834.774238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1834.783611] Call Trace: [ 1834.786226] dump_stack+0x172/0x1f0 [ 1834.789890] should_fail.cold+0xa/0x15 [ 1834.793808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1834.798958] ? debug_smp_processor_id+0x3c/0x280 [ 1834.803742] ? perf_trace_lock+0xeb/0x510 [ 1834.807921] should_fail_alloc_page+0x50/0x60 [ 1834.812435] __alloc_pages_nodemask+0x1a1/0x710 [ 1834.817388] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1834.822422] ? find_held_lock+0x35/0x130 [ 1834.826504] ? kasan_check_write+0x14/0x20 [ 1834.830767] cache_grow_begin+0x9c/0x8c0 [ 1834.834840] ? kasan_check_read+0x11/0x20 [ 1834.839011] ? do_raw_spin_unlock+0x57/0x270 [ 1834.843438] ____cache_alloc_node+0x17c/0x1e0 [ 1834.847953] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1834.853508] kmem_cache_alloc_node_trace+0xec/0x720 [ 1834.858538] ? kasan_unpoison_shadow+0x35/0x50 [ 1834.863141] __kmalloc_node+0x3d/0x70 [ 1834.866968] kvmalloc_node+0x68/0x100 [ 1834.870784] alloc_netdev_mqs+0x821/0xd30 [ 1834.874963] rtnl_create_link+0x22d/0xac0 [ 1834.879137] __rtnl_newlink+0xf7b/0x16c0 [ 1834.883226] ? rtnl_link_unregister+0x250/0x250 [ 1834.888004] ? lock_downgrade+0x880/0x880 [ 1834.892162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.897729] ? is_bpf_text_address+0xd3/0x170 [ 1834.902240] ? kernel_text_address+0x73/0xf0 [ 1834.906660] ? __kernel_text_address+0xd/0x40 [ 1834.911173] ? unwind_get_return_address+0x61/0xa0 [ 1834.916111] ? __save_stack_trace+0x8a/0xf0 [ 1834.916144] ? save_stack+0xa9/0xd0 [ 1834.916161] ? save_stack+0x45/0xd0 [ 1834.916177] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1834.916191] ? kasan_kmalloc+0x9/0x10 [ 1834.916206] ? kmem_cache_alloc_trace+0x151/0x760 [ 1834.916222] ? rtnl_newlink+0x4b/0xa0 [ 1834.916238] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1834.916327] rtnl_newlink+0x69/0xa0 [ 1834.924200] ? __rtnl_newlink+0x16c0/0x16c0 [ 1834.957665] rtnetlink_rcv_msg+0x465/0xb00 [ 1834.961925] ? rtnetlink_put_metrics+0x560/0x560 [ 1834.966704] ? __lockdep_free_key_range+0x120/0x120 [ 1834.971737] ? netdev_pick_tx+0x300/0x300 [ 1834.975910] ? netlink_deliver_tap+0x22d/0xbf0 [ 1834.980513] ? find_held_lock+0x35/0x130 [ 1834.984602] netlink_rcv_skb+0x17a/0x460 [ 1834.988691] ? rtnetlink_put_metrics+0x560/0x560 [ 1834.993475] ? netlink_ack+0xb50/0xb50 [ 1834.997382] ? kasan_check_read+0x11/0x20 [ 1835.001555] ? netlink_deliver_tap+0x254/0xbf0 08:21:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x2000, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4000000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0xa0002) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x1) fcntl$notify(r0, 0x402, 0x3) fcntl$notify(r2, 0x402, 0x2d) [ 1835.006167] rtnetlink_rcv+0x1d/0x30 [ 1835.009897] netlink_unicast+0x536/0x720 [ 1835.013995] ? netlink_attachskb+0x770/0x770 [ 1835.018423] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1835.023451] ? __check_object_size+0x3d/0x42f [ 1835.027977] netlink_sendmsg+0x8ae/0xd70 [ 1835.032059] ? netlink_unicast+0x720/0x720 [ 1835.036315] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1835.041184] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1835.045976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.051534] ? security_socket_sendmsg+0x93/0xc0 [ 1835.051554] ? netlink_unicast+0x720/0x720 [ 1835.051581] sock_sendmsg+0xdd/0x130 [ 1835.051599] ___sys_sendmsg+0x806/0x930 [ 1835.051622] ? copy_msghdr_from_user+0x430/0x430 [ 1835.073396] ? lock_downgrade+0x880/0x880 [ 1835.077563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.083125] ? kasan_check_read+0x11/0x20 [ 1835.087289] ? __fget+0x367/0x540 [ 1835.087311] ? ksys_dup3+0x3e0/0x3e0 [ 1835.087325] ? lock_downgrade+0x880/0x880 [ 1835.087352] ? __fget_light+0x1a9/0x230 [ 1835.087368] ? __fdget+0x1b/0x20 [ 1835.087383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1835.087404] __sys_sendmsg+0x105/0x1d0 [ 1835.087420] ? __ia32_sys_shutdown+0x80/0x80 [ 1835.087436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1835.087452] ? fput+0x128/0x1a0 [ 1835.087479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1835.087493] ? do_fast_syscall_32+0xd1/0xc98 [ 1835.087508] ? entry_SYSENTER_compat+0x70/0x7f [ 1835.087526] ? do_fast_syscall_32+0xd1/0xc98 [ 1835.102792] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1835.115551] do_fast_syscall_32+0x281/0xc98 [ 1835.115576] entry_SYSENTER_compat+0x70/0x7f [ 1835.115589] RIP: 0023:0xf7f4e869 [ 1835.115605] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1835.115614] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1835.115631] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1835.115641] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1835.115649] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1835.115658] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1835.115667] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:16 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x10c, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x608}, 0x0) 08:21:16 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_DQBUF(r1, 0xc0445611, &(0x7f0000000040)={0x6, 0xf, 0x4, 0x80000, {}, {0x5, 0xf, 0x9f, 0x9, 0x6, 0x1ff, "c3c3fdc7"}, 0xe21, 0x1, @planes=&(0x7f0000000000)={0x100000001, 0x100000000, @userptr=0xfffffffffffffff9, 0x6}, 0x4}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f0000000080)={0x1, 0x101, 0xfffffffffffff801, 0x400000000, 0x6569, 0x7}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000140)) fcntl$notify(r2, 0x402, 0x10) ioctl$sock_ifreq(r1, 0x8943, &(0x7f0000000100)={'veth1_to_hsr\x00', @ifru_map={0x2, 0x100, 0xa, 0xffffffffffffb49c, 0x7a00, 0x2}}) bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x20, 0x1ff, 0x1, 0x0, 0x7, 0x37aed570}, 0xe1}, 0xa) 08:21:16 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x80) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={0x0, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0x5, 0x1, 0x200, 0x8f, 0x8, 0x100000001, 0x6b7, 0x8, r1}, 0x20) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x3, 0x6}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) fcntl$notify(r2, 0x402, 0x28) 08:21:16 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc1e4, 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x60, 0x2) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3d) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94Pf\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:16 executing program 3 (fault-call:1 fault-nth:19): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1835.620924] FAULT_INJECTION: forcing a failure. [ 1835.620924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1835.632786] CPU: 0 PID: 22340 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1835.639633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1835.648997] Call Trace: [ 1835.651606] dump_stack+0x172/0x1f0 [ 1835.655258] should_fail.cold+0xa/0x15 [ 1835.659172] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.664293] ? debug_smp_processor_id+0x3c/0x280 08:21:17 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x501800, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x400040) r3 = openat$cgroup_ro(r2, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7\x89`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, [{r1}, {r1, 0x0, 0x4}, {r3, 0x0, 0x8001}, {r0, 0x0, 0xb922}, {r1, 0x0, 0x6}, {r1, 0x0, 0xffffffffffffffff}, {r1, 0x0, 0x3}, {r1, 0x0, 0x2}]}) fcntl$notify(r3, 0x402, 0x10) [ 1835.669069] ? perf_trace_lock+0xeb/0x510 [ 1835.673231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.678791] should_fail_alloc_page+0x50/0x60 [ 1835.683307] __alloc_pages_nodemask+0x1a1/0x710 [ 1835.688009] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1835.693037] ? find_held_lock+0x35/0x130 [ 1835.697127] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.702259] cache_grow_begin+0x9c/0x8c0 [ 1835.702278] ? __kmalloc_node+0x3d/0x70 [ 1835.702297] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1835.715917] kmem_cache_alloc_node_trace+0x658/0x720 [ 1835.721040] ? kasan_unpoison_shadow+0x35/0x50 [ 1835.721069] __kmalloc_node+0x3d/0x70 [ 1835.721091] kvmalloc_node+0x68/0x100 [ 1835.721111] alloc_netdev_mqs+0x821/0xd30 [ 1835.721142] rtnl_create_link+0x22d/0xac0 [ 1835.741588] __rtnl_newlink+0xf7b/0x16c0 [ 1835.745684] ? rtnl_link_unregister+0x250/0x250 [ 1835.750372] ? lock_downgrade+0x880/0x880 [ 1835.754535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.760096] ? is_bpf_text_address+0xd3/0x170 [ 1835.764612] ? kernel_text_address+0x73/0xf0 [ 1835.769037] ? __kernel_text_address+0xd/0x40 [ 1835.773547] ? unwind_get_return_address+0x61/0xa0 [ 1835.778490] ? __save_stack_trace+0x8a/0xf0 [ 1835.782840] ? save_stack+0xa9/0xd0 [ 1835.786492] ? save_stack+0x45/0xd0 [ 1835.790126] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1835.795235] ? kasan_kmalloc+0x9/0x10 [ 1835.799044] ? kmem_cache_alloc_trace+0x151/0x760 [ 1835.803902] ? rtnl_newlink+0x4b/0xa0 [ 1835.807716] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1835.812222] rtnl_newlink+0x69/0xa0 [ 1835.815876] ? __rtnl_newlink+0x16c0/0x16c0 [ 1835.820217] rtnetlink_rcv_msg+0x465/0xb00 [ 1835.824469] ? rtnetlink_put_metrics+0x560/0x560 [ 1835.829241] ? __lockdep_free_key_range+0x120/0x120 [ 1835.834269] ? netdev_pick_tx+0x300/0x300 [ 1835.838435] ? netlink_deliver_tap+0x22d/0xbf0 [ 1835.843039] ? find_held_lock+0x35/0x130 [ 1835.847126] netlink_rcv_skb+0x17a/0x460 [ 1835.847149] ? rtnetlink_put_metrics+0x560/0x560 [ 1835.847168] ? netlink_ack+0xb50/0xb50 [ 1835.847187] ? kasan_check_read+0x11/0x20 [ 1835.847210] ? netlink_deliver_tap+0x254/0xbf0 08:21:17 executing program 1: mlock2(&(0x7f0000c83000/0x4000)=nil, 0x4000, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000100)={&(0x7f00000000c0)=[0x100000000], 0x1, 0x0, 0xad7, 0x0, 0x9, 0x2, {0xffffffffad64f90b, 0x8, 0x0, 0x8, 0xfffffffffffffffa, 0x80, 0x0, 0x0, 0x70ea, 0xfffffffffffffff7, 0x1000, 0x80, 0x3, 0x7, "7d269275511bb4af4691460a3b359ff02b76e671d9f16e636f1b590394552b7e"}}) r0 = socket(0x1e, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f00000001c0)) fremovexattr(0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x9eb2, 0x0, 0x0, 0x3f, 0xfff, 0x0, 0x9, 0x5, 0x1f, 0x4, 0x0, 0x1f, 0x5, 0x7f, 0x0, 0xc26b, 0x1000, 0x7, 0x0, 0x0, 0x7, 0x100, 0x93f3, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x401, 0x10001, 0x8, 0x9, 0x1000, 0x0, 0x8}, r1, 0xb, 0xffffffffffffffff, 0x9) readv(r2, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) connect$l2tp(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x3}}, 0x26) prlimit64(r1, 0xc, &(0x7f0000000000)={0x0, 0x91}, 0x0) fcntl$setpipe(r0, 0x407, 0x47) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x2) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000004c0), &(0x7f0000000440)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000380)={0x8001}, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0xe4, r4, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2b86}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x10}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000000000000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0xe4}, 0x1, 0x0, 0x0, 0x44804}, 0x40800) [ 1835.847234] rtnetlink_rcv+0x1d/0x30 [ 1835.847248] netlink_unicast+0x536/0x720 [ 1835.847269] ? netlink_attachskb+0x770/0x770 [ 1835.847284] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1835.847298] ? __check_object_size+0x3d/0x42f [ 1835.847320] netlink_sendmsg+0x8ae/0xd70 [ 1835.847345] ? netlink_unicast+0x720/0x720 [ 1835.847360] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1835.847377] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1835.847391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.847405] ? security_socket_sendmsg+0x93/0xc0 [ 1835.847421] ? netlink_unicast+0x720/0x720 [ 1835.847440] sock_sendmsg+0xdd/0x130 [ 1835.847469] ___sys_sendmsg+0x806/0x930 [ 1835.881079] ? copy_msghdr_from_user+0x430/0x430 [ 1835.881106] ? lock_downgrade+0x880/0x880 [ 1835.881122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.881144] ? kasan_check_read+0x11/0x20 [ 1835.881164] ? __fget+0x367/0x540 [ 1835.914074] ? ksys_dup3+0x3e0/0x3e0 [ 1835.914091] ? lock_downgrade+0x880/0x880 [ 1835.914119] ? __fget_light+0x1a9/0x230 [ 1835.914137] ? __fdget+0x1b/0x20 [ 1835.914154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1835.914176] __sys_sendmsg+0x105/0x1d0 [ 1835.914193] ? __ia32_sys_shutdown+0x80/0x80 [ 1835.914210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1835.987409] ? fput+0x128/0x1a0 [ 1835.990722] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1835.995499] ? do_fast_syscall_32+0xd1/0xc98 [ 1835.995517] ? entry_SYSENTER_compat+0x70/0x7f [ 1835.995531] ? do_fast_syscall_32+0xd1/0xc98 [ 1835.995557] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1835.995578] do_fast_syscall_32+0x281/0xc98 [ 1835.995601] entry_SYSENTER_compat+0x70/0x7f [ 1835.995615] RIP: 0023:0xf7f4e869 [ 1835.995631] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1835.995639] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1835.995655] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1835.995664] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 08:21:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) openat$cgroup_ro(r0, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) [ 1835.995672] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1835.995682] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1835.995693] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:17 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc1e4, 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x60, 0x2) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3d) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94Pf\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x689}, 0x0) 08:21:17 executing program 3 (fault-call:1 fault-nth:20): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1836.373587] FAULT_INJECTION: forcing a failure. [ 1836.373587] name failslab, interval 1, probability 0, space 0, times 0 [ 1836.405940] CPU: 1 PID: 22375 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1836.412853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1836.422533] Call Trace: [ 1836.425145] dump_stack+0x172/0x1f0 [ 1836.428800] should_fail.cold+0xa/0x15 [ 1836.432718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1836.437860] ? ___might_sleep+0x163/0x280 [ 1836.442035] __should_failslab+0x121/0x190 [ 1836.446299] should_failslab+0x9/0x14 [ 1836.450122] __kmalloc_track_caller+0x2d8/0x740 [ 1836.454816] ? pointer+0x910/0x910 [ 1836.458392] ? fs_reclaim_acquire+0x20/0x20 [ 1836.462741] ? kasprintf+0xbb/0xf0 [ 1836.466308] kvasprintf+0xc8/0x170 [ 1836.469867] ? bust_spinlocks+0xe0/0xe0 [ 1836.473852] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1836.478872] ? find_next_bit+0x107/0x130 [ 1836.482949] kasprintf+0xbb/0xf0 [ 1836.486333] ? kvasprintf_const+0x190/0x190 [ 1836.490672] ? kasan_check_read+0x11/0x20 [ 1836.494838] alloc_workqueue+0x443/0xe70 [ 1836.498914] ? bond_init+0x17a/0x800 [ 1836.502622] ? find_held_lock+0x35/0x130 [ 1836.506676] ? bond_init+0x17a/0x800 [ 1836.510387] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1836.515429] ? lock_downgrade+0x880/0x880 [ 1836.519600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.525150] bond_init+0x1b3/0x800 [ 1836.528686] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1836.533019] register_netdevice+0x300/0xff0 [ 1836.537348] ? netdev_change_features+0xb0/0xb0 [ 1836.542017] bond_newlink+0x4b/0x90 [ 1836.545669] ? bond_changelink+0x1ac0/0x1ac0 [ 1836.550084] __rtnl_newlink+0x107b/0x16c0 [ 1836.554265] ? rtnl_link_unregister+0x250/0x250 [ 1836.558949] ? lock_downgrade+0x880/0x880 [ 1836.563097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.568686] ? is_bpf_text_address+0xd3/0x170 [ 1836.573226] ? kernel_text_address+0x73/0xf0 [ 1836.577636] ? __kernel_text_address+0xd/0x40 [ 1836.582140] ? unwind_get_return_address+0x61/0xa0 [ 1836.587084] ? __save_stack_trace+0x8a/0xf0 [ 1836.591460] ? save_stack+0xa9/0xd0 [ 1836.595098] ? save_stack+0x45/0xd0 [ 1836.598737] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1836.603862] ? kasan_kmalloc+0x9/0x10 [ 1836.607682] ? kmem_cache_alloc_trace+0x151/0x760 [ 1836.612542] ? rtnl_newlink+0x4b/0xa0 [ 1836.616459] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1836.620920] rtnl_newlink+0x69/0xa0 [ 1836.624551] ? __rtnl_newlink+0x16c0/0x16c0 [ 1836.628879] rtnetlink_rcv_msg+0x465/0xb00 [ 1836.633124] ? rtnetlink_put_metrics+0x560/0x560 [ 1836.637885] ? __lockdep_free_key_range+0x120/0x120 [ 1836.642906] ? netdev_pick_tx+0x300/0x300 [ 1836.647424] ? netlink_deliver_tap+0x22d/0xbf0 [ 1836.652019] ? find_held_lock+0x35/0x130 [ 1836.656100] netlink_rcv_skb+0x17a/0x460 [ 1836.660175] ? rtnetlink_put_metrics+0x560/0x560 [ 1836.664927] ? netlink_ack+0xb50/0xb50 [ 1836.668822] ? kasan_check_read+0x11/0x20 [ 1836.673003] ? netlink_deliver_tap+0x254/0xbf0 [ 1836.677599] rtnetlink_rcv+0x1d/0x30 [ 1836.681327] netlink_unicast+0x536/0x720 [ 1836.685418] ? netlink_attachskb+0x770/0x770 [ 1836.689853] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1836.694899] ? __check_object_size+0x3d/0x42f [ 1836.699423] netlink_sendmsg+0x8ae/0xd70 [ 1836.703507] ? netlink_unicast+0x720/0x720 [ 1836.707737] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1836.712576] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1836.717336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.722884] ? security_socket_sendmsg+0x93/0xc0 [ 1836.727634] ? netlink_unicast+0x720/0x720 [ 1836.731869] sock_sendmsg+0xdd/0x130 [ 1836.735579] ___sys_sendmsg+0x806/0x930 [ 1836.739566] ? copy_msghdr_from_user+0x430/0x430 [ 1836.744347] ? lock_downgrade+0x880/0x880 [ 1836.748509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.754070] ? kasan_check_read+0x11/0x20 [ 1836.758239] ? __fget+0x367/0x540 [ 1836.761714] ? ksys_dup3+0x3e0/0x3e0 [ 1836.765440] ? lock_downgrade+0x880/0x880 [ 1836.769619] ? __fget_light+0x1a9/0x230 [ 1836.773615] ? __fdget+0x1b/0x20 [ 1836.776996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1836.782560] __sys_sendmsg+0x105/0x1d0 [ 1836.786470] ? __ia32_sys_shutdown+0x80/0x80 [ 1836.790898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1836.796458] ? fput+0x128/0x1a0 [ 1836.799768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1836.804545] ? do_fast_syscall_32+0xd1/0xc98 [ 1836.809058] ? entry_SYSENTER_compat+0x70/0x7f [ 1836.813660] ? do_fast_syscall_32+0xd1/0xc98 [ 1836.818099] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1836.822889] do_fast_syscall_32+0x281/0xc98 [ 1836.827233] entry_SYSENTER_compat+0x70/0x7f [ 1836.831655] RIP: 0023:0xf7f4e869 [ 1836.835039] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1836.853954] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1836.861681] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1836.868945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1836.876212] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1836.883488] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1836.890783] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:18 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x10d, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40a00, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000040)={@multicast1, @remote}, 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x700}, 0x0) 08:21:18 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc1e4, 0x80000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x60, 0x2) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3d) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94Pf\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:18 executing program 3 (fault-call:1 fault-nth:21): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:18 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000004840)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x9, 0xd4, 0x0, 0x0, 0x4, 0x8, 0x9075, {0x0, @in6={{0xa, 0x4e20, 0x100000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x997a, 0x2, 0x7fffffff, 0x8, 0x7}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000004880)=@assoc_id=r1, &(0x7f0000000280)=0x4) fdatasync(0xffffffffffffffff) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000040)={0x18, 0x0, {0x1, @remote, 'rose0\x00'}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000004900)={0x0, 0x2, 0x7}, &(0x7f0000004940)=0x8) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x2000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000003c0)={0x0, @bt={0xcc22, 0x0, 0x1, 0x2, 0xfec, 0x9, 0x9, 0x9a, 0x1, 0xd1b, 0x49, 0x9, 0x8, 0x0, 0x0, 0x10}}) timerfd_gettime(r2, &(0x7f0000000080)) fcntl$notify(r2, 0x402, 0x10) [ 1837.323625] FAULT_INJECTION: forcing a failure. [ 1837.323625] name failslab, interval 1, probability 0, space 0, times 0 [ 1837.387926] CPU: 1 PID: 22394 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1837.394824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1837.404201] Call Trace: [ 1837.406811] dump_stack+0x172/0x1f0 [ 1837.410485] should_fail.cold+0xa/0x15 [ 1837.414400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1837.419529] ? ___might_sleep+0x163/0x280 [ 1837.423709] __should_failslab+0x121/0x190 [ 1837.427959] should_failslab+0x9/0x14 [ 1837.431812] __kmalloc+0x2dc/0x740 [ 1837.435389] ? apply_wqattrs_prepare+0xfb/0x9f0 [ 1837.440088] apply_wqattrs_prepare+0xfb/0x9f0 [ 1837.444605] apply_workqueue_attrs_locked+0xcb/0x140 [ 1837.449719] apply_workqueue_attrs+0x31/0x50 [ 1837.454136] alloc_workqueue+0x84d/0xe70 [ 1837.458198] ? bond_init+0x17a/0x800 [ 1837.461921] ? find_held_lock+0x35/0x130 [ 1837.465999] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1837.471028] ? lock_downgrade+0x880/0x880 [ 1837.475181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.480735] bond_init+0x1b3/0x800 [ 1837.484280] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1837.488618] register_netdevice+0x300/0xff0 [ 1837.492955] ? netdev_change_features+0xb0/0xb0 [ 1837.497649] bond_newlink+0x4b/0x90 [ 1837.501282] ? bond_changelink+0x1ac0/0x1ac0 [ 1837.505719] __rtnl_newlink+0x107b/0x16c0 [ 1837.509899] ? rtnl_link_unregister+0x250/0x250 [ 1837.514573] ? lock_downgrade+0x880/0x880 [ 1837.518730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.524287] ? is_bpf_text_address+0xd3/0x170 [ 1837.528789] ? kernel_text_address+0x73/0xf0 [ 1837.533202] ? __kernel_text_address+0xd/0x40 [ 1837.537707] ? unwind_get_return_address+0x61/0xa0 [ 1837.542642] ? __save_stack_trace+0x8a/0xf0 [ 1837.547402] ? save_stack+0xa9/0xd0 [ 1837.551034] ? save_stack+0x45/0xd0 [ 1837.554682] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1837.559791] ? kasan_kmalloc+0x9/0x10 [ 1837.563600] ? kmem_cache_alloc_trace+0x151/0x760 [ 1837.568471] ? rtnl_newlink+0x4b/0xa0 [ 1837.572297] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1837.576802] rtnl_newlink+0x69/0xa0 [ 1837.580435] ? __rtnl_newlink+0x16c0/0x16c0 [ 1837.584769] rtnetlink_rcv_msg+0x465/0xb00 [ 1837.589021] ? rtnetlink_put_metrics+0x560/0x560 [ 1837.593792] ? __lockdep_free_key_range+0x120/0x120 [ 1837.598815] ? netdev_pick_tx+0x300/0x300 [ 1837.602985] ? netlink_deliver_tap+0x22d/0xbf0 [ 1837.607578] ? find_held_lock+0x35/0x130 [ 1837.611652] netlink_rcv_skb+0x17a/0x460 [ 1837.615723] ? rtnetlink_put_metrics+0x560/0x560 [ 1837.620489] ? netlink_ack+0xb50/0xb50 [ 1837.624387] ? kasan_check_read+0x11/0x20 [ 1837.628552] ? netlink_deliver_tap+0x254/0xbf0 [ 1837.633153] rtnetlink_rcv+0x1d/0x30 [ 1837.636876] netlink_unicast+0x536/0x720 [ 1837.640947] ? netlink_attachskb+0x770/0x770 [ 1837.645363] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1837.650387] ? __check_object_size+0x3d/0x42f [ 1837.654896] netlink_sendmsg+0x8ae/0xd70 [ 1837.658980] ? netlink_unicast+0x720/0x720 [ 1837.663220] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1837.668096] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1837.672873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.678422] ? security_socket_sendmsg+0x93/0xc0 [ 1837.683190] ? netlink_unicast+0x720/0x720 [ 1837.687437] sock_sendmsg+0xdd/0x130 [ 1837.691171] ___sys_sendmsg+0x806/0x930 [ 1837.695156] ? copy_msghdr_from_user+0x430/0x430 [ 1837.699933] ? lock_downgrade+0x880/0x880 [ 1837.704092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.709650] ? kasan_check_read+0x11/0x20 [ 1837.713817] ? __fget+0x367/0x540 [ 1837.717295] ? ksys_dup3+0x3e0/0x3e0 [ 1837.721018] ? lock_downgrade+0x880/0x880 [ 1837.725188] ? __fget_light+0x1a9/0x230 [ 1837.729174] ? __fdget+0x1b/0x20 [ 1837.732548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1837.738103] __sys_sendmsg+0x105/0x1d0 [ 1837.742003] ? __ia32_sys_shutdown+0x80/0x80 [ 1837.746416] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1837.751984] ? fput+0x128/0x1a0 [ 1837.755284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.760046] ? do_fast_syscall_32+0xd1/0xc98 [ 1837.764465] ? entry_SYSENTER_compat+0x70/0x7f [ 1837.769072] ? do_fast_syscall_32+0xd1/0xc98 [ 1837.773500] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1837.778272] do_fast_syscall_32+0x281/0xc98 [ 1837.782610] entry_SYSENTER_compat+0x70/0x7f [ 1837.787018] RIP: 0023:0xf7f4e869 [ 1837.790391] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1837.810430] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1837.818152] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1837.825436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1837.832721] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:21:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0xfffdffff80000001) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000000140)='./file0\x00', 0x3) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000180)=""/7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffe98) r5 = getpgid(0xffffffffffffffff) ptrace$setregs(0xf, r5, 0x44aa, &(0x7f00000005c0)="77214dbae7716765d89a779003a4bccdd86da7eabe0b18ea13ff9779fa40bc5806ad522d9e6ea6a78d450c30faa311ae5dd7b76dd7f63be45275a1594daa0eac895d93858e1f79d6ca38d2aee85875956dc957798641f4e2324f5825ce8a") rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000340)='./file0\x00', 0x0) 08:21:19 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40301101, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0x5, 0x1ff, 0x100000001, 0x0, 0xfff, 0x4, 0x9], 0x7, 0x4, 0x0, 0x0, 0x1, 0x6, {0x7, 0x1, 0x1ff, 0x0, 0x60, 0x381, 0x5, 0x7, 0x20, 0x8, 0x2, 0x4, 0x1, 0xfffffffffffffe00, "8a32786ff3f873fa814bf8435e894414dd2cf64e587669af43b0ef69fc8b2527"}}) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) [ 1837.839995] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1837.847273] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x806}, 0x0) 08:21:19 executing program 3 (fault-call:1 fault-nth:22): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:19 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x4000000090944) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000400)) perf_event_open(&(0x7f0000000600)={0xffffffffffffffff, 0x13a, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec') r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)=0x9) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) [ 1838.123875] QAT: Invalid ioctl [ 1838.152102] QAT: Invalid ioctl [ 1838.162568] FAULT_INJECTION: forcing a failure. [ 1838.162568] name failslab, interval 1, probability 0, space 0, times 0 08:21:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0xfffdffff80000001) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000000140)='./file0\x00', 0x3) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000180)=""/7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffe98) r5 = getpgid(0xffffffffffffffff) ptrace$setregs(0xf, r5, 0x44aa, &(0x7f00000005c0)="77214dbae7716765d89a779003a4bccdd86da7eabe0b18ea13ff9779fa40bc5806ad522d9e6ea6a78d450c30faa311ae5dd7b76dd7f63be45275a1594daa0eac895d93858e1f79d6ca38d2aee85875956dc957798641f4e2324f5825ce8a") rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000340)='./file0\x00', 0x0) [ 1838.225330] CPU: 1 PID: 22423 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1838.232232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1838.241601] Call Trace: [ 1838.244212] dump_stack+0x172/0x1f0 [ 1838.247866] should_fail.cold+0xa/0x15 [ 1838.251773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1838.256904] ? ___might_sleep+0x163/0x280 [ 1838.261068] __should_failslab+0x121/0x190 [ 1838.265317] should_failslab+0x9/0x14 [ 1838.269121] __kmalloc+0x2dc/0x740 [ 1838.272675] ? apply_wqattrs_prepare+0xfb/0x9f0 [ 1838.277355] apply_wqattrs_prepare+0xfb/0x9f0 [ 1838.281881] apply_workqueue_attrs_locked+0xcb/0x140 [ 1838.286996] apply_workqueue_attrs+0x31/0x50 [ 1838.291416] alloc_workqueue+0x84d/0xe70 [ 1838.295485] ? bond_init+0x17a/0x800 [ 1838.299204] ? find_held_lock+0x35/0x130 [ 1838.303273] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1838.308305] ? lock_downgrade+0x880/0x880 [ 1838.312465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.318021] bond_init+0x1b3/0x800 [ 1838.321573] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1838.325906] register_netdevice+0x300/0xff0 [ 1838.330243] ? netdev_change_features+0xb0/0xb0 [ 1838.334934] bond_newlink+0x4b/0x90 [ 1838.338571] ? bond_changelink+0x1ac0/0x1ac0 [ 1838.343007] __rtnl_newlink+0x107b/0x16c0 [ 1838.347178] ? rtnl_link_unregister+0x250/0x250 [ 1838.351864] ? lock_downgrade+0x880/0x880 [ 1838.356019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.361578] ? is_bpf_text_address+0xd3/0x170 [ 1838.366079] ? kernel_text_address+0x73/0xf0 [ 1838.370497] ? __kernel_text_address+0xd/0x40 [ 1838.375002] ? unwind_get_return_address+0x61/0xa0 [ 1838.379944] ? __save_stack_trace+0x8a/0xf0 [ 1838.384296] ? save_stack+0xa9/0xd0 [ 1838.387927] ? save_stack+0x45/0xd0 [ 1838.391559] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1838.396667] ? kasan_kmalloc+0x9/0x10 [ 1838.400478] ? kmem_cache_alloc_trace+0x151/0x760 [ 1838.405329] ? rtnl_newlink+0x4b/0xa0 [ 1838.409136] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1838.413986] rtnl_newlink+0x69/0xa0 [ 1838.417625] ? __rtnl_newlink+0x16c0/0x16c0 [ 1838.421954] rtnetlink_rcv_msg+0x465/0xb00 [ 1838.426202] ? rtnetlink_put_metrics+0x560/0x560 [ 1838.430964] ? __lockdep_free_key_range+0x120/0x120 [ 1838.435996] ? netdev_pick_tx+0x300/0x300 [ 1838.440157] ? netlink_deliver_tap+0x22d/0xbf0 [ 1838.444749] ? find_held_lock+0x35/0x130 [ 1838.448826] netlink_rcv_skb+0x17a/0x460 [ 1838.452907] ? rtnetlink_put_metrics+0x560/0x560 [ 1838.457672] ? netlink_ack+0xb50/0xb50 [ 1838.461568] ? kasan_check_read+0x11/0x20 [ 1838.465725] ? netlink_deliver_tap+0x254/0xbf0 [ 1838.470320] rtnetlink_rcv+0x1d/0x30 [ 1838.474039] netlink_unicast+0x536/0x720 [ 1838.478112] ? netlink_attachskb+0x770/0x770 [ 1838.482532] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1838.487558] ? __check_object_size+0x3d/0x42f [ 1838.492066] netlink_sendmsg+0x8ae/0xd70 [ 1838.496143] ? netlink_unicast+0x720/0x720 [ 1838.500387] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1838.505239] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1838.510008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.515552] ? security_socket_sendmsg+0x93/0xc0 [ 1838.520315] ? netlink_unicast+0x720/0x720 [ 1838.524561] sock_sendmsg+0xdd/0x130 [ 1838.528283] ___sys_sendmsg+0x806/0x930 [ 1838.532272] ? copy_msghdr_from_user+0x430/0x430 [ 1838.537042] ? lock_downgrade+0x880/0x880 [ 1838.541197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.546751] ? kasan_check_read+0x11/0x20 [ 1838.550912] ? __fget+0x367/0x540 [ 1838.554376] ? ksys_dup3+0x3e0/0x3e0 [ 1838.558093] ? lock_downgrade+0x880/0x880 [ 1838.562258] ? __fget_light+0x1a9/0x230 [ 1838.566239] ? __fdget+0x1b/0x20 [ 1838.569614] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1838.575166] __sys_sendmsg+0x105/0x1d0 [ 1838.579058] ? __ia32_sys_shutdown+0x80/0x80 [ 1838.583477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1838.589022] ? fput+0x128/0x1a0 [ 1838.592321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1838.597086] ? do_fast_syscall_32+0xd1/0xc98 [ 1838.601508] ? entry_SYSENTER_compat+0x70/0x7f [ 1838.606111] ? do_fast_syscall_32+0xd1/0xc98 [ 1838.610559] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1838.615345] do_fast_syscall_32+0x281/0xc98 [ 1838.619706] entry_SYSENTER_compat+0x70/0x7f [ 1838.624181] RIP: 0023:0xf7f4e869 [ 1838.627567] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1838.646486] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1838.654234] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1838.661516] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1838.668792] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1838.676069] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1838.683345] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1838.935333] net_ratelimit: 20 callbacks suppressed [ 1838.935342] protocol 88fb is buggy, dev hsr_slave_0 [ 1838.935358] protocol 88fb is buggy, dev hsr_slave_0 [ 1838.940406] protocol 88fb is buggy, dev hsr_slave_1 [ 1838.945464] protocol 88fb is buggy, dev hsr_slave_1 [ 1838.960605] protocol 88fb is buggy, dev hsr_slave_0 [ 1838.965717] protocol 88fb is buggy, dev hsr_slave_1 08:21:20 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x10e, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:20 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) fcntl$notify(r0, 0x402, 0x10) 08:21:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000280)) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000040)={0x2, "a3c74928e86252c35f21266cc96668ffc60aa5f8897c5dd9734035481a869405", 0x1, 0x1}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x11) 08:21:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xa00}, 0x0) 08:21:20 executing program 3 (fault-call:1 fault-nth:23): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:20 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)=0xfffdffff80000001) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000000140)='./file0\x00', 0x3) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000007c0)=ANY=[]) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x200000) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x20000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x97b, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000180)=""/7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='vmnet1security@systemem1:\x00'}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000480)=0xfffffffffffffe98) r5 = getpgid(0xffffffffffffffff) ptrace$setregs(0xf, r5, 0x44aa, &(0x7f00000005c0)="77214dbae7716765d89a779003a4bccdd86da7eabe0b18ea13ff9779fa40bc5806ad522d9e6ea6a78d450c30faa311ae5dd7b76dd7f63be45275a1594daa0eac895d93858e1f79d6ca38d2aee85875956dc957798641f4e2324f5825ce8a") rmdir(&(0x7f0000001540)='./file0/file0\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r6}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000340)='./file0\x00', 0x0) [ 1839.193618] FAULT_INJECTION: forcing a failure. [ 1839.193618] name failslab, interval 1, probability 0, space 0, times 0 08:21:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xc00}, 0x0) 08:21:20 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='\xe2\xae\xe0\xfb\xf9#\x02\xcc=\xc9\x8f \xe6wJ2\xb5\x9c\xf7\xa8\xac\xd6V\xc8\x84\x98\xe4H=F\xce\x11cd\'\f\xa8\xa3\xb1\xc2\x8cb|\x0e\xa7\"\xef\x82\x8e\xe2\xb0\x95\xf3\xd1\xf8\x97\x85\xfc3\x86d2\xa1\x91D\x94\xd93\x82{\xcc\x94$\xb1\x8bj\xf6\x10\xd2\fp\xbd\xb9\x14\xf7 \x8b\xe6x67\xbf\\\x8b*p\x82\f\xcc\\$\x80U\xdb2B\xd9\xdb\xd6\xcbO\xb0\xd9<\xca\x15\xde\r\x90\xd9\xb8\x97\xd9)&\x0f\xb3\x83G\xb3\xe1\x0en\xe3H3\x89\xfaCH2\xa8\x90n)d\xe8y\x9eN.-(>\xa3,\xffB\xbb\x9f\xbc\xfc;\xdd\xb1.\xee\x9c\x19r*&_|\xc9\xb9-$\x92\xfcJaB\x87\x81\xc7\xb1\xf9\xcc\xf4\xe0\xe4\t6\xb7\'EA\f\xe28\xd5V\xcd\xc3\xda9\x8c)m\xfa\xdfZb\xc9)f\xa6\xba\x8eE\xc8\xa9\xed\xe86\x12\x898\xc2\x9bb\xe0\xc4\xf9\xec\x9f\x85(\x99\x81\xad\xad\xec\xac\x84\f\x97\xf9#\xe9Ec\xfd\x15p:Z\xa2\x83/\x8a?', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1a380000, 0x400040) 08:21:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x400c744d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) [ 1839.320440] CPU: 0 PID: 22452 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1839.327337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1839.336708] Call Trace: [ 1839.339319] dump_stack+0x172/0x1f0 [ 1839.342977] should_fail.cold+0xa/0x15 [ 1839.346897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1839.352024] ? ___might_sleep+0x163/0x280 [ 1839.356192] __should_failslab+0x121/0x190 [ 1839.360443] should_failslab+0x9/0x14 [ 1839.364253] kmem_cache_alloc_trace+0x2d1/0x760 [ 1839.369281] ? rcu_read_lock_sched_held+0x110/0x130 [ 1839.374312] ? __kmalloc+0x5d5/0x740 [ 1839.378045] alloc_workqueue_attrs+0x82/0x120 [ 1839.382563] apply_wqattrs_prepare+0x10d/0x9f0 [ 1839.387175] apply_workqueue_attrs_locked+0xcb/0x140 [ 1839.392294] apply_workqueue_attrs+0x31/0x50 [ 1839.396717] alloc_workqueue+0x84d/0xe70 [ 1839.400786] ? bond_init+0x17a/0x800 [ 1839.404514] ? find_held_lock+0x35/0x130 [ 1839.408591] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1839.413636] ? lock_downgrade+0x880/0x880 [ 1839.417802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.423474] bond_init+0x1b3/0x800 [ 1839.427128] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1839.431510] register_netdevice+0x300/0xff0 [ 1839.435926] ? netdev_change_features+0xb0/0xb0 [ 1839.440712] bond_newlink+0x4b/0x90 [ 1839.444414] ? bond_changelink+0x1ac0/0x1ac0 [ 1839.448922] __rtnl_newlink+0x107b/0x16c0 [ 1839.453160] ? rtnl_link_unregister+0x250/0x250 [ 1839.457894] ? lock_downgrade+0x880/0x880 [ 1839.462107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.467762] ? is_bpf_text_address+0xd3/0x170 [ 1839.472322] ? kernel_text_address+0x73/0xf0 [ 1839.476892] ? __kernel_text_address+0xd/0x40 [ 1839.481458] ? unwind_get_return_address+0x61/0xa0 [ 1839.486495] ? __save_stack_trace+0x8a/0xf0 [ 1839.490959] ? save_stack+0xa9/0xd0 [ 1839.494622] ? save_stack+0x45/0xd0 [ 1839.498309] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1839.503499] ? kasan_kmalloc+0x9/0x10 [ 1839.507333] ? kmem_cache_alloc_trace+0x151/0x760 [ 1839.512342] ? rtnl_newlink+0x4b/0xa0 [ 1839.516221] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1839.520793] rtnl_newlink+0x69/0xa0 [ 1839.525225] ? __rtnl_newlink+0x16c0/0x16c0 [ 1839.529589] rtnetlink_rcv_msg+0x465/0xb00 [ 1839.533900] ? rtnetlink_put_metrics+0x560/0x560 [ 1839.538725] ? __lockdep_free_key_range+0x120/0x120 [ 1839.543808] ? netdev_pick_tx+0x300/0x300 [ 1839.549444] ? netlink_deliver_tap+0x22d/0xbf0 [ 1839.554131] ? find_held_lock+0x35/0x130 [ 1839.558273] netlink_rcv_skb+0x17a/0x460 [ 1839.562362] ? rtnetlink_put_metrics+0x560/0x560 [ 1839.567135] ? netlink_ack+0xb50/0xb50 [ 1839.571031] ? kasan_check_read+0x11/0x20 [ 1839.575191] ? netlink_deliver_tap+0x254/0xbf0 [ 1839.579788] rtnetlink_rcv+0x1d/0x30 [ 1839.583507] netlink_unicast+0x536/0x720 [ 1839.587581] ? netlink_attachskb+0x770/0x770 [ 1839.591996] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1839.597015] ? __check_object_size+0x3d/0x42f [ 1839.601523] netlink_sendmsg+0x8ae/0xd70 [ 1839.605606] ? netlink_unicast+0x720/0x720 [ 1839.609844] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1839.614708] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1839.619468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.625007] ? security_socket_sendmsg+0x93/0xc0 [ 1839.629773] ? netlink_unicast+0x720/0x720 [ 1839.634026] sock_sendmsg+0xdd/0x130 [ 1839.637751] ___sys_sendmsg+0x806/0x930 [ 1839.641739] ? copy_msghdr_from_user+0x430/0x430 [ 1839.646509] ? lock_downgrade+0x880/0x880 [ 1839.650661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.656208] ? kasan_check_read+0x11/0x20 [ 1839.660366] ? __fget+0x367/0x540 [ 1839.663830] ? ksys_dup3+0x3e0/0x3e0 [ 1839.667556] ? lock_downgrade+0x880/0x880 [ 1839.672000] ? __fget_light+0x1a9/0x230 [ 1839.675987] ? __fdget+0x1b/0x20 [ 1839.679356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1839.684906] __sys_sendmsg+0x105/0x1d0 [ 1839.688803] ? __ia32_sys_shutdown+0x80/0x80 [ 1839.693217] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1839.698760] ? fput+0x128/0x1a0 [ 1839.702058] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1839.706821] ? do_fast_syscall_32+0xd1/0xc98 [ 1839.711243] ? entry_SYSENTER_compat+0x70/0x7f [ 1839.715832] ? do_fast_syscall_32+0xd1/0xc98 [ 1839.720263] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1839.725031] do_fast_syscall_32+0x281/0xc98 [ 1839.729368] entry_SYSENTER_compat+0x70/0x7f [ 1839.733780] RIP: 0023:0xf7f4e869 [ 1839.737151] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1839.756066] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1839.763786] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1839.771063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1839.778332] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1839.785601] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1839.792882] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x2, {{0x2, 0x4e20, @local}}}, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) ioctl$VIDIOC_DQBUF(r1, 0xc0445611, &(0x7f0000000000)={0xf, 0x5, 0x4, 0x4000000, {}, {0x3, 0x9, 0x101, 0x0, 0x1f, 0x8000, "59c778d5"}, 0x1, 0x0, @userptr=0xb7c, 0x4}) fcntl$notify(r1, 0x402, 0x28) 08:21:21 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x400100) 08:21:21 executing program 3 (fault-call:1 fault-nth:24): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1840.135294] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.135317] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.140460] protocol 88fb is buggy, dev hsr_slave_1 [ 1840.145502] protocol 88fb is buggy, dev hsr_slave_1 [ 1840.257280] FAULT_INJECTION: forcing a failure. [ 1840.257280] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.276186] CPU: 0 PID: 22487 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1840.283079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1840.292452] Call Trace: [ 1840.295062] dump_stack+0x172/0x1f0 [ 1840.298715] should_fail.cold+0xa/0x15 [ 1840.302626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1840.302654] ? ___might_sleep+0x163/0x280 [ 1840.311908] __should_failslab+0x121/0x190 [ 1840.311934] should_failslab+0x9/0x14 [ 1840.319970] kmem_cache_alloc_trace+0x2d1/0x760 [ 1840.324659] ? rcu_read_lock_sched_held+0x110/0x130 [ 1840.329692] ? __kmalloc+0x5d5/0x740 [ 1840.333429] alloc_workqueue_attrs+0x82/0x120 [ 1840.337944] apply_wqattrs_prepare+0x11a/0x9f0 [ 1840.342566] apply_workqueue_attrs_locked+0xcb/0x140 [ 1840.347683] apply_workqueue_attrs+0x31/0x50 [ 1840.352098] alloc_workqueue+0x84d/0xe70 [ 1840.356158] ? bond_init+0x17a/0x800 [ 1840.359888] ? find_held_lock+0x35/0x130 [ 1840.363957] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1840.369407] ? lock_downgrade+0x880/0x880 [ 1840.373559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.379113] bond_init+0x1b3/0x800 [ 1840.382659] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1840.386996] register_netdevice+0x300/0xff0 [ 1840.391330] ? netdev_change_features+0xb0/0xb0 [ 1840.396020] bond_newlink+0x4b/0x90 [ 1840.399671] ? bond_changelink+0x1ac0/0x1ac0 [ 1840.404087] __rtnl_newlink+0x107b/0x16c0 [ 1840.408242] ? rtnl_link_unregister+0x250/0x250 [ 1840.412904] ? lock_downgrade+0x880/0x880 [ 1840.417057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.422659] ? is_bpf_text_address+0xd3/0x170 [ 1840.427166] ? kernel_text_address+0x73/0xf0 [ 1840.431588] ? __kernel_text_address+0xd/0x40 [ 1840.436103] ? unwind_get_return_address+0x61/0xa0 [ 1840.441043] ? __save_stack_trace+0x8a/0xf0 [ 1840.445391] ? save_stack+0xa9/0xd0 [ 1840.449025] ? save_stack+0x45/0xd0 [ 1840.452643] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1840.457747] ? kasan_kmalloc+0x9/0x10 [ 1840.461547] ? kmem_cache_alloc_trace+0x151/0x760 [ 1840.466391] ? rtnl_newlink+0x4b/0xa0 [ 1840.470191] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1840.474639] rtnl_newlink+0x69/0xa0 [ 1840.478269] ? __rtnl_newlink+0x16c0/0x16c0 [ 1840.482591] rtnetlink_rcv_msg+0x465/0xb00 [ 1840.486836] ? rtnetlink_put_metrics+0x560/0x560 [ 1840.491604] ? __lockdep_free_key_range+0x120/0x120 [ 1840.496628] ? netdev_pick_tx+0x300/0x300 [ 1840.500781] ? netlink_deliver_tap+0x22d/0xbf0 [ 1840.505366] ? find_held_lock+0x35/0x130 [ 1840.509441] netlink_rcv_skb+0x17a/0x460 [ 1840.513519] ? rtnetlink_put_metrics+0x560/0x560 [ 1840.518284] ? netlink_ack+0xb50/0xb50 [ 1840.522178] ? kasan_check_read+0x11/0x20 [ 1840.526338] ? netlink_deliver_tap+0x254/0xbf0 [ 1840.530979] rtnetlink_rcv+0x1d/0x30 [ 1840.534692] netlink_unicast+0x536/0x720 [ 1840.538764] ? netlink_attachskb+0x770/0x770 [ 1840.543176] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1840.548192] ? __check_object_size+0x3d/0x42f [ 1840.552698] netlink_sendmsg+0x8ae/0xd70 [ 1840.556773] ? netlink_unicast+0x720/0x720 [ 1840.561024] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1840.565883] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1840.570644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.576189] ? security_socket_sendmsg+0x93/0xc0 [ 1840.580957] ? netlink_unicast+0x720/0x720 [ 1840.585195] sock_sendmsg+0xdd/0x130 [ 1840.588918] ___sys_sendmsg+0x806/0x930 [ 1840.592896] ? copy_msghdr_from_user+0x430/0x430 [ 1840.597666] ? lock_downgrade+0x880/0x880 [ 1840.601814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.607373] ? kasan_check_read+0x11/0x20 [ 1840.611524] ? __fget+0x367/0x540 [ 1840.614975] ? ksys_dup3+0x3e0/0x3e0 [ 1840.618691] ? lock_downgrade+0x880/0x880 [ 1840.622872] ? __fget_light+0x1a9/0x230 [ 1840.626861] ? __fdget+0x1b/0x20 [ 1840.630227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1840.635773] __sys_sendmsg+0x105/0x1d0 [ 1840.639672] ? __ia32_sys_shutdown+0x80/0x80 [ 1840.644087] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1840.649616] ? fput+0x128/0x1a0 [ 1840.652894] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1840.657652] ? do_fast_syscall_32+0xd1/0xc98 [ 1840.662061] ? entry_SYSENTER_compat+0x70/0x7f [ 1840.666819] ? do_fast_syscall_32+0xd1/0xc98 [ 1840.671244] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1840.676009] do_fast_syscall_32+0x281/0xc98 [ 1840.680338] entry_SYSENTER_compat+0x70/0x7f [ 1840.684734] RIP: 0023:0xf7f4e869 [ 1840.688099] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1840.707016] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1840.714754] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1840.722039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1840.729314] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1840.736590] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1840.743876] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:22 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x10f, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000000)=0x1) fcntl$notify(r0, 0x402, 0x28) 08:21:22 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x1ff, 0x9, 0x200, 0x7375, 0x10000, 0x10001, 0x7, 0x2, r2}, 0x20) sendfile(r0, r1, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000280)={0x6, [0x6, 0x7, 0x5, 0x8, 0x3, 0x36bb]}, &(0x7f00000002c0)=0x10) fcntl$notify(r1, 0x402, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000300)="1bc0c34db2ecd97341d35881e027de2ddc7df8c8566a7352b055b40da79f6252c7e21f5a999e0da97dc16ac9522160b1d9ddd2c10969e16fe219326aff0a710b937b2a2efa4823c99a37225d07bb01bd5067d0c70bfda44d35eb8766a3534b2ef6e3a9ee5f7a3a9b1c2ce802714f408a995c15c2679216742f7f167b6de4682afc70da91098913ebb6b7eb6be6080b7d31b05094db0b76febcd2a9fb371584a524435c8994cf6e530607659ef8c397b4039012149c08bdb7ddfdf2f0f6118d21b3", 0xc1, r0}, 0x68) 08:21:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xe00}, 0x0) 08:21:22 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:22 executing program 3 (fault-call:1 fault-nth:25): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf00}, 0x0) [ 1841.033012] FAULT_INJECTION: forcing a failure. [ 1841.033012] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1841.044886] CPU: 0 PID: 22501 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1841.051747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1841.061116] Call Trace: [ 1841.063724] dump_stack+0x172/0x1f0 [ 1841.067381] should_fail.cold+0xa/0x15 [ 1841.071305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1841.076435] ? debug_smp_processor_id+0x3c/0x280 [ 1841.081207] ? perf_trace_lock+0xeb/0x510 [ 1841.081232] should_fail_alloc_page+0x50/0x60 [ 1841.081249] __alloc_pages_nodemask+0x1a1/0x710 [ 1841.081270] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1841.089919] ? find_held_lock+0x35/0x130 [ 1841.099600] ? kasan_check_write+0x14/0x20 [ 1841.099624] cache_grow_begin+0x9c/0x8c0 [ 1841.099639] ? kasan_check_read+0x11/0x20 [ 1841.099655] ? do_raw_spin_unlock+0x57/0x270 [ 1841.099675] ____cache_alloc_node+0x17c/0x1e0 [ 1841.099691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 08:21:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) sync_file_range(r0, 0x200, 0x9, 0x2) fcntl$notify(r0, 0x402, 0x28) [ 1841.099710] __kmalloc_track_caller+0x215/0x740 [ 1841.099727] ? pointer+0x910/0x910 [ 1841.099749] ? kasprintf+0xbb/0xf0 [ 1841.099770] kvasprintf+0xc8/0x170 [ 1841.099787] ? bust_spinlocks+0xe0/0xe0 [ 1841.099808] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1841.099823] ? find_next_bit+0x107/0x130 [ 1841.099857] kasprintf+0xbb/0xf0 [ 1841.130755] ? kvasprintf_const+0x190/0x190 [ 1841.130786] ? kasan_check_read+0x11/0x20 [ 1841.130812] alloc_workqueue+0x443/0xe70 [ 1841.130828] ? bond_init+0x17a/0x800 [ 1841.162479] ? find_held_lock+0x35/0x130 [ 1841.182748] ? bond_init+0x17a/0x800 [ 1841.182770] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1841.182791] ? lock_downgrade+0x880/0x880 [ 1841.195650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.201217] bond_init+0x1b3/0x800 [ 1841.201236] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1841.201258] register_netdevice+0x300/0xff0 [ 1841.201281] ? netdev_change_features+0xb0/0xb0 [ 1841.201308] bond_newlink+0x4b/0x90 [ 1841.221756] ? bond_changelink+0x1ac0/0x1ac0 [ 1841.226179] __rtnl_newlink+0x107b/0x16c0 [ 1841.226214] ? rtnl_link_unregister+0x250/0x250 [ 1841.226229] ? lock_downgrade+0x880/0x880 [ 1841.226245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.226273] ? is_bpf_text_address+0xd3/0x170 [ 1841.226288] ? kernel_text_address+0x73/0xf0 [ 1841.226303] ? __kernel_text_address+0xd/0x40 [ 1841.226320] ? unwind_get_return_address+0x61/0xa0 [ 1841.226337] ? __save_stack_trace+0x8a/0xf0 [ 1841.226370] ? save_stack+0xa9/0xd0 [ 1841.226386] ? save_stack+0x45/0xd0 [ 1841.226401] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1841.226420] ? kasan_kmalloc+0x9/0x10 [ 1841.283618] ? kmem_cache_alloc_trace+0x151/0x760 [ 1841.288475] ? rtnl_newlink+0x4b/0xa0 [ 1841.288493] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1841.288589] rtnl_newlink+0x69/0xa0 [ 1841.288606] ? __rtnl_newlink+0x16c0/0x16c0 [ 1841.288623] rtnetlink_rcv_msg+0x465/0xb00 [ 1841.288645] ? rtnetlink_put_metrics+0x560/0x560 [ 1841.288660] ? __lockdep_free_key_range+0x120/0x120 [ 1841.288676] ? netdev_pick_tx+0x300/0x300 [ 1841.288695] ? netlink_deliver_tap+0x22d/0xbf0 [ 1841.288710] ? find_held_lock+0x35/0x130 [ 1841.331600] netlink_rcv_skb+0x17a/0x460 [ 1841.335684] ? rtnetlink_put_metrics+0x560/0x560 [ 1841.340463] ? netlink_ack+0xb50/0xb50 [ 1841.344373] ? kasan_check_read+0x11/0x20 [ 1841.348541] ? netlink_deliver_tap+0x254/0xbf0 [ 1841.353151] rtnetlink_rcv+0x1d/0x30 [ 1841.356894] netlink_unicast+0x536/0x720 [ 1841.360985] ? netlink_attachskb+0x770/0x770 [ 1841.365412] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1841.370442] ? __check_object_size+0x3d/0x42f [ 1841.374964] netlink_sendmsg+0x8ae/0xd70 [ 1841.374992] ? netlink_unicast+0x720/0x720 [ 1841.375008] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1841.375029] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1841.375047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.398447] ? security_socket_sendmsg+0x93/0xc0 [ 1841.403215] ? netlink_unicast+0x720/0x720 [ 1841.407471] sock_sendmsg+0xdd/0x130 [ 1841.411212] ___sys_sendmsg+0x806/0x930 [ 1841.415220] ? copy_msghdr_from_user+0x430/0x430 [ 1841.420009] ? lock_downgrade+0x880/0x880 [ 1841.424175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.429735] ? kasan_check_read+0x11/0x20 [ 1841.433904] ? __fget+0x367/0x540 [ 1841.437380] ? ksys_dup3+0x3e0/0x3e0 [ 1841.441108] ? lock_downgrade+0x880/0x880 [ 1841.445282] ? __fget_light+0x1a9/0x230 [ 1841.449276] ? __fdget+0x1b/0x20 [ 1841.452656] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1841.458213] __sys_sendmsg+0x105/0x1d0 [ 1841.462111] ? __ia32_sys_shutdown+0x80/0x80 [ 1841.462132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1841.462149] ? fput+0x128/0x1a0 [ 1841.462176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1841.480133] ? do_fast_syscall_32+0xd1/0xc98 [ 1841.480151] ? entry_SYSENTER_compat+0x70/0x7f [ 1841.480167] ? do_fast_syscall_32+0xd1/0xc98 [ 1841.480195] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1841.480215] do_fast_syscall_32+0x281/0xc98 [ 1841.480238] entry_SYSENTER_compat+0x70/0x7f [ 1841.480252] RIP: 0023:0xf7f4e869 [ 1841.480268] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 08:21:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) fcntl$notify(r0, 0x402, 0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x2037}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={r1, 0x5, 0x6, [0x1, 0x0, 0x53, 0x7, 0x101, 0x40]}, &(0x7f0000000300)=0x14) r2 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x800) fcntl$notify(r2, 0x402, 0x28) [ 1841.480280] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1841.537833] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1841.545208] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1841.552496] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1841.559781] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1841.567070] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:22 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = getpgrp(0x0) sched_rr_get_interval(r1, &(0x7f0000000000)) fcntl$notify(r0, 0x402, 0x10) 08:21:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000000)={0x3, 0x4, 0x5, 0x0, 0x11}) fcntl$notify(r0, 0x402, 0x16) fcntl$notify(r1, 0x402, 0x28) 08:21:23 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x110, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:23 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x301000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0xb7d9231, 0x4002) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000680)='/dev/hwrng\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000006c0)='cpuset.effective_cpus\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xfffffffffffffffe}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xa0d3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4000004) 08:21:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x2628}, 0x0) 08:21:23 executing program 3 (fault-call:1 fault-nth:26): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000040)=""/74) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x0, 0x154, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}, 0x30) sched_getaffinity(r2, 0x8, &(0x7f00000000c0)) 08:21:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) [ 1842.208915] FAULT_INJECTION: forcing a failure. [ 1842.208915] name failslab, interval 1, probability 0, space 0, times 0 [ 1842.258015] CPU: 1 PID: 22553 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1842.264913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1842.274280] Call Trace: [ 1842.276901] dump_stack+0x172/0x1f0 [ 1842.280552] should_fail.cold+0xa/0x15 [ 1842.284471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1842.289599] ? ___might_sleep+0x163/0x280 [ 1842.293760] __should_failslab+0x121/0x190 [ 1842.298009] should_failslab+0x9/0x14 [ 1842.301818] kmem_cache_alloc_trace+0x2d1/0x760 [ 1842.306512] ? rcu_read_lock_sched_held+0x110/0x130 [ 1842.311542] ? __kmalloc+0x5d5/0x740 [ 1842.315257] ? perf_trace_lock+0xeb/0x510 [ 1842.315273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.315295] alloc_workqueue_attrs+0x82/0x120 [ 1842.315313] alloc_workqueue+0x167/0xe70 [ 1842.315325] ? bond_init+0x17a/0x800 [ 1842.315341] ? find_held_lock+0x35/0x130 [ 1842.325028] ? bond_init+0x17a/0x800 [ 1842.325049] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1842.325073] ? lock_downgrade+0x880/0x880 [ 1842.325089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.325113] bond_init+0x1b3/0x800 [ 1842.333658] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1842.333680] register_netdevice+0x300/0xff0 [ 1842.333704] ? netdev_change_features+0xb0/0xb0 [ 1842.333735] bond_newlink+0x4b/0x90 [ 1842.333752] ? bond_changelink+0x1ac0/0x1ac0 [ 1842.384657] __rtnl_newlink+0x107b/0x16c0 [ 1842.388805] ? rtnl_link_unregister+0x250/0x250 [ 1842.393466] ? lock_downgrade+0x880/0x880 [ 1842.397606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.403162] ? is_bpf_text_address+0xd3/0x170 [ 1842.407662] ? kernel_text_address+0x73/0xf0 [ 1842.412082] ? __kernel_text_address+0xd/0x40 [ 1842.416954] ? unwind_get_return_address+0x61/0xa0 [ 1842.421899] ? __save_stack_trace+0x8a/0xf0 [ 1842.426238] ? save_stack+0xa9/0xd0 [ 1842.429873] ? save_stack+0x45/0xd0 [ 1842.433500] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1842.438592] ? kasan_kmalloc+0x9/0x10 [ 1842.442394] ? kmem_cache_alloc_trace+0x151/0x760 [ 1842.447240] ? rtnl_newlink+0x4b/0xa0 [ 1842.447256] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1842.447346] rtnl_newlink+0x69/0xa0 [ 1842.459135] ? __rtnl_newlink+0x16c0/0x16c0 [ 1842.463488] rtnetlink_rcv_msg+0x465/0xb00 [ 1842.467743] ? rtnetlink_put_metrics+0x560/0x560 [ 1842.472513] ? __lockdep_free_key_range+0x120/0x120 [ 1842.477546] ? netdev_pick_tx+0x300/0x300 [ 1842.481712] ? netlink_deliver_tap+0x22d/0xbf0 [ 1842.486312] ? find_held_lock+0x35/0x130 [ 1842.490398] netlink_rcv_skb+0x17a/0x460 [ 1842.494499] ? rtnetlink_put_metrics+0x560/0x560 [ 1842.499279] ? netlink_ack+0xb50/0xb50 [ 1842.503187] ? kasan_check_read+0x11/0x20 [ 1842.507359] ? netlink_deliver_tap+0x254/0xbf0 [ 1842.511969] rtnetlink_rcv+0x1d/0x30 [ 1842.515701] netlink_unicast+0x536/0x720 [ 1842.519789] ? netlink_attachskb+0x770/0x770 [ 1842.524215] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1842.529249] ? __check_object_size+0x3d/0x42f [ 1842.533769] netlink_sendmsg+0x8ae/0xd70 [ 1842.537869] ? netlink_unicast+0x720/0x720 [ 1842.542121] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1842.546983] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1842.551752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.557304] ? security_socket_sendmsg+0x93/0xc0 [ 1842.562076] ? netlink_unicast+0x720/0x720 [ 1842.566329] sock_sendmsg+0xdd/0x130 [ 1842.570059] ___sys_sendmsg+0x806/0x930 [ 1842.574052] ? copy_msghdr_from_user+0x430/0x430 [ 1842.578828] ? lock_downgrade+0x880/0x880 [ 1842.583000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.588562] ? kasan_check_read+0x11/0x20 [ 1842.592715] ? __fget+0x367/0x540 [ 1842.596181] ? ksys_dup3+0x3e0/0x3e0 [ 1842.599906] ? lock_downgrade+0x880/0x880 [ 1842.604064] ? __fget_light+0x1a9/0x230 [ 1842.608034] ? __fdget+0x1b/0x20 [ 1842.611400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1842.616948] __sys_sendmsg+0x105/0x1d0 [ 1842.620834] ? __ia32_sys_shutdown+0x80/0x80 [ 1842.625254] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1842.630798] ? fput+0x128/0x1a0 [ 1842.634106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1842.638978] ? do_fast_syscall_32+0xd1/0xc98 [ 1842.643470] ? entry_SYSENTER_compat+0x70/0x7f [ 1842.648289] ? do_fast_syscall_32+0xd1/0xc98 [ 1842.652802] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1842.657697] do_fast_syscall_32+0x281/0xc98 [ 1842.662102] entry_SYSENTER_compat+0x70/0x7f [ 1842.666682] RIP: 0023:0xf7f4e869 [ 1842.670068] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1842.689022] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1842.696795] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 08:21:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000300)={0x5}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) accept4$tipc(r2, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)=0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r3, 0x5381) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x800, 0x2, 0x80000001, 0x8, 0x0, 0xb6, 0x8000, 0x8, 0xd2c0, 0x0, 0x80000001, 0x0, 0x7, 0x573b768d, 0x8, 0x5, 0x7fff, 0x0, 0x8, 0x100000001, 0x1ff, 0xd141, 0x86f, 0xffffffffffffe08b, 0x7, 0x2, 0x400, 0x6, 0x9, 0x9, 0x0, 0x9, 0x2, 0x1, 0x40000000000, 0x3, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x3}, 0x80, 0x6, 0x5, 0x4, 0x5, 0x0, 0x4}, r4, 0x4, r1, 0x8) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000003c0)) fcntl$notify(r3, 0x402, 0x28) recvfrom$unix(r0, &(0x7f0000000300), 0x0, 0x40012020, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) [ 1842.704186] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1842.711514] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1842.718830] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1842.726144] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x2826}, 0x0) 08:21:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xb0b, 0x2) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200002, 0x0) fcntl$notify(r1, 0x402, 0x10) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x64) 08:21:24 executing program 3 (fault-call:1 fault-nth:27): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) fchmod(r0, 0x165) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x3580}, 0x0) [ 1843.001939] FAULT_INJECTION: forcing a failure. [ 1843.001939] name failslab, interval 1, probability 0, space 0, times 0 [ 1843.071394] CPU: 1 PID: 22584 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1843.078307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1843.087705] Call Trace: [ 1843.090323] dump_stack+0x172/0x1f0 [ 1843.093982] should_fail.cold+0xa/0x15 [ 1843.097909] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1843.103047] ? ___might_sleep+0x163/0x280 [ 1843.107227] __should_failslab+0x121/0x190 [ 1843.111489] should_failslab+0x9/0x14 [ 1843.115312] kmem_cache_alloc_trace+0x2d1/0x760 [ 1843.120003] ? rcu_read_lock_sched_held+0x110/0x130 [ 1843.125035] ? __kmalloc+0x5d5/0x740 [ 1843.125064] alloc_workqueue_attrs+0x82/0x120 [ 1843.125083] apply_wqattrs_prepare+0x11a/0x9f0 [ 1843.137884] apply_workqueue_attrs_locked+0xcb/0x140 [ 1843.137904] apply_workqueue_attrs+0x31/0x50 [ 1843.137922] alloc_workqueue+0x84d/0xe70 [ 1843.137935] ? bond_init+0x17a/0x800 [ 1843.137952] ? find_held_lock+0x35/0x130 [ 1843.137973] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1843.164300] ? lock_downgrade+0x880/0x880 [ 1843.168476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.174046] bond_init+0x1b3/0x800 [ 1843.177605] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1843.181950] register_netdevice+0x300/0xff0 [ 1843.186298] ? netdev_change_features+0xb0/0xb0 [ 1843.190994] bond_newlink+0x4b/0x90 [ 1843.194639] ? bond_changelink+0x1ac0/0x1ac0 [ 1843.194659] __rtnl_newlink+0x107b/0x16c0 [ 1843.194690] ? rtnl_link_unregister+0x250/0x250 [ 1843.207917] ? lock_downgrade+0x880/0x880 [ 1843.207934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.207963] ? is_bpf_text_address+0xd3/0x170 [ 1843.207978] ? kernel_text_address+0x73/0xf0 [ 1843.207997] ? __kernel_text_address+0xd/0x40 [ 1843.231063] ? unwind_get_return_address+0x61/0xa0 [ 1843.236017] ? __save_stack_trace+0x8a/0xf0 [ 1843.240385] ? save_stack+0xa9/0xd0 [ 1843.244039] ? save_stack+0x45/0xd0 [ 1843.247686] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1843.252793] ? kasan_kmalloc+0x9/0x10 [ 1843.256597] ? kmem_cache_alloc_trace+0x151/0x760 [ 1843.261465] ? rtnl_newlink+0x4b/0xa0 [ 1843.265282] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1843.269792] rtnl_newlink+0x69/0xa0 [ 1843.273428] ? __rtnl_newlink+0x16c0/0x16c0 [ 1843.277760] rtnetlink_rcv_msg+0x465/0xb00 [ 1843.281987] ? rtnetlink_put_metrics+0x560/0x560 [ 1843.286733] ? __lockdep_free_key_range+0x120/0x120 [ 1843.291750] ? netdev_pick_tx+0x300/0x300 [ 1843.295903] ? netlink_deliver_tap+0x22d/0xbf0 [ 1843.300499] ? find_held_lock+0x35/0x130 [ 1843.304571] netlink_rcv_skb+0x17a/0x460 [ 1843.308637] ? rtnetlink_put_metrics+0x560/0x560 [ 1843.313414] ? netlink_ack+0xb50/0xb50 [ 1843.317305] ? kasan_check_read+0x11/0x20 [ 1843.321468] ? netlink_deliver_tap+0x254/0xbf0 [ 1843.326047] rtnetlink_rcv+0x1d/0x30 [ 1843.329763] netlink_unicast+0x536/0x720 [ 1843.333846] ? netlink_attachskb+0x770/0x770 [ 1843.338270] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1843.343285] ? __check_object_size+0x3d/0x42f [ 1843.347800] netlink_sendmsg+0x8ae/0xd70 [ 1843.351891] ? netlink_unicast+0x720/0x720 [ 1843.356130] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1843.360979] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1843.365749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.371301] ? security_socket_sendmsg+0x93/0xc0 [ 1843.376070] ? netlink_unicast+0x720/0x720 [ 1843.380310] sock_sendmsg+0xdd/0x130 [ 1843.384037] ___sys_sendmsg+0x806/0x930 [ 1843.388023] ? copy_msghdr_from_user+0x430/0x430 [ 1843.392771] ? lock_downgrade+0x880/0x880 [ 1843.396924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.402474] ? kasan_check_read+0x11/0x20 [ 1843.406619] ? __fget+0x367/0x540 [ 1843.410065] ? ksys_dup3+0x3e0/0x3e0 [ 1843.413766] ? lock_downgrade+0x880/0x880 [ 1843.417923] ? __fget_light+0x1a9/0x230 [ 1843.421891] ? __fdget+0x1b/0x20 [ 1843.425251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1843.430784] __sys_sendmsg+0x105/0x1d0 [ 1843.434670] ? __ia32_sys_shutdown+0x80/0x80 [ 1843.439071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1843.444601] ? fput+0x128/0x1a0 [ 1843.447908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1843.452681] ? do_fast_syscall_32+0xd1/0xc98 [ 1843.457095] ? entry_SYSENTER_compat+0x70/0x7f [ 1843.461681] ? do_fast_syscall_32+0xd1/0xc98 [ 1843.466106] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1843.470876] do_fast_syscall_32+0x281/0xc98 [ 1843.475211] entry_SYSENTER_compat+0x70/0x7f [ 1843.479615] RIP: 0023:0xf7f4e869 [ 1843.482969] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1843.501874] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1843.509577] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1843.516840] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1843.524111] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1843.531383] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1843.538656] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:25 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x111, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x20) fcntl$notify(r0, 0x402, 0x28) 08:21:25 executing program 3 (fault-call:1 fault-nth:28): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x3f00}, 0x0) 08:21:25 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xc0000, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/68, 0x44) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000280)={0x5, 0x5, 0x4, 0x400, 0x1, 0x8, 0x2}) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:21:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffff004, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20400, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000004000}, 0xc, &(0x7f0000000500)={&(0x7f0000000700)=ANY=[@ANYBLOB="6c0000002e00060a25bd7000fbdbdf2500000000", @ANYRES32=r4, @ANYBLOB="0000f3ff0b00fffffbff040008000b000000010008000b00fa4a000008000b0003004795f16426490bd72b13408e7f000008000b001f00000008000b180800000008000b000500000008000b000900000008000b000800000008000b0001000000"], 0x6c}}, 0x10) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000780)) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40042406, &(0x7f0000000580)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec') 08:21:25 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x4, 0x6, 0x8, 0x301}) fcntl$notify(r0, 0x402, 0x10) 08:21:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4000}, 0x0) [ 1843.982919] FAULT_INJECTION: forcing a failure. [ 1843.982919] name failslab, interval 1, probability 0, space 0, times 0 08:21:25 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) write$capi20(r0, &(0x7f0000000000)={0x10, 0x8000, 0x87, 0x80, 0x0, 0x1000}, 0x10) [ 1844.052975] CPU: 0 PID: 22613 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1844.059879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1844.069243] Call Trace: [ 1844.071859] dump_stack+0x172/0x1f0 [ 1844.075515] should_fail.cold+0xa/0x15 [ 1844.079427] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1844.084556] ? ___might_sleep+0x163/0x280 [ 1844.088729] __should_failslab+0x121/0x190 [ 1844.092988] should_failslab+0x9/0x14 [ 1844.096802] __kmalloc+0x2dc/0x740 [ 1844.100364] ? apply_wqattrs_prepare+0xfb/0x9f0 [ 1844.105050] apply_wqattrs_prepare+0xfb/0x9f0 [ 1844.105084] apply_workqueue_attrs_locked+0xcb/0x140 [ 1844.105104] apply_workqueue_attrs+0x31/0x50 [ 1844.119100] alloc_workqueue+0x84d/0xe70 [ 1844.119115] ? bond_init+0x17a/0x800 [ 1844.119134] ? find_held_lock+0x35/0x130 [ 1844.130971] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1844.136015] ? lock_downgrade+0x880/0x880 [ 1844.140174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1844.145737] bond_init+0x1b3/0x800 [ 1844.149291] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1844.153631] register_netdevice+0x300/0xff0 [ 1844.157976] ? netdev_change_features+0xb0/0xb0 [ 1844.162674] bond_newlink+0x4b/0x90 [ 1844.166314] ? bond_changelink+0x1ac0/0x1ac0 [ 1844.170737] __rtnl_newlink+0x107b/0x16c0 [ 1844.174918] ? rtnl_link_unregister+0x250/0x250 [ 1844.179604] ? lock_downgrade+0x880/0x880 [ 1844.183766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1844.189330] ? is_bpf_text_address+0xd3/0x170 [ 1844.193837] ? kernel_text_address+0x73/0xf0 [ 1844.198265] ? __kernel_text_address+0xd/0x40 [ 1844.202777] ? unwind_get_return_address+0x61/0xa0 [ 1844.207808] ? __save_stack_trace+0x8a/0xf0 [ 1844.212160] ? save_stack+0xa9/0xd0 [ 1844.215797] ? save_stack+0x45/0xd0 [ 1844.219438] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1844.224555] ? kasan_kmalloc+0x9/0x10 [ 1844.228369] ? kmem_cache_alloc_trace+0x151/0x760 [ 1844.233228] ? rtnl_newlink+0x4b/0xa0 [ 1844.237040] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1844.241548] rtnl_newlink+0x69/0xa0 [ 1844.245190] ? __rtnl_newlink+0x16c0/0x16c0 [ 1844.249526] rtnetlink_rcv_msg+0x465/0xb00 [ 1844.253777] ? rtnetlink_put_metrics+0x560/0x560 [ 1844.258546] ? __lockdep_free_key_range+0x120/0x120 [ 1844.263576] ? netdev_pick_tx+0x300/0x300 [ 1844.267738] ? netlink_deliver_tap+0x22d/0xbf0 [ 1844.272769] ? find_held_lock+0x35/0x130 [ 1844.276845] netlink_rcv_skb+0x17a/0x460 [ 1844.280933] ? rtnetlink_put_metrics+0x560/0x560 [ 1844.285708] ? netlink_ack+0xb50/0xb50 [ 1844.289609] ? kasan_check_read+0x11/0x20 [ 1844.293773] ? netlink_deliver_tap+0x254/0xbf0 [ 1844.295302] net_ratelimit: 20 callbacks suppressed 08:21:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) [ 1844.295310] protocol 88fb is buggy, dev hsr_slave_0 [ 1844.298374] rtnetlink_rcv+0x1d/0x30 [ 1844.298392] netlink_unicast+0x536/0x720 [ 1844.298413] ? netlink_attachskb+0x770/0x770 [ 1844.303407] protocol 88fb is buggy, dev hsr_slave_1 [ 1844.308352] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1844.308367] ? __check_object_size+0x3d/0x42f [ 1844.308388] netlink_sendmsg+0x8ae/0xd70 [ 1844.308410] ? netlink_unicast+0x720/0x720 [ 1844.308427] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1844.308445] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1844.352942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1844.358497] ? security_socket_sendmsg+0x93/0xc0 [ 1844.363259] ? netlink_unicast+0x720/0x720 [ 1844.363281] sock_sendmsg+0xdd/0x130 [ 1844.363303] ___sys_sendmsg+0x806/0x930 [ 1844.363326] ? copy_msghdr_from_user+0x430/0x430 [ 1844.363349] ? lock_downgrade+0x880/0x880 [ 1844.363369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1844.375288] ? kasan_check_read+0x11/0x20 [ 1844.375313] ? __fget+0x367/0x540 [ 1844.375333] ? ksys_dup3+0x3e0/0x3e0 [ 1844.375348] ? lock_downgrade+0x880/0x880 [ 1844.375374] ? __fget_light+0x1a9/0x230 [ 1844.375390] ? __fdget+0x1b/0x20 [ 1844.375406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1844.375427] __sys_sendmsg+0x105/0x1d0 [ 1844.375443] ? __ia32_sys_shutdown+0x80/0x80 [ 1844.375458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1844.375474] ? fput+0x128/0x1a0 [ 1844.375502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1844.375519] ? do_fast_syscall_32+0xd1/0xc98 [ 1844.444804] ? entry_SYSENTER_compat+0x70/0x7f [ 1844.449396] ? do_fast_syscall_32+0xd1/0xc98 [ 1844.453824] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1844.458599] do_fast_syscall_32+0x281/0xc98 [ 1844.462932] entry_SYSENTER_compat+0x70/0x7f [ 1844.467345] RIP: 0023:0xf7f4e869 [ 1844.470716] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1844.489628] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1844.497350] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1844.504647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1844.511931] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1844.519216] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1844.526494] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1844.534072] protocol 88fb is buggy, dev hsr_slave_0 [ 1844.539204] protocol 88fb is buggy, dev hsr_slave_1 [ 1844.544350] protocol 88fb is buggy, dev hsr_slave_0 [ 1844.549464] protocol 88fb is buggy, dev hsr_slave_1 08:21:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4305}, 0x0) 08:21:26 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x112, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:26 executing program 1: perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) openat$cgroup_ro(r0, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) 08:21:26 executing program 3 (fault-call:1 fault-nth:29): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:26 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x38001, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r1, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x998e}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000200)="21cfe94961b24254cee7ab46c8ed529e434d578d42d2690768b31ca421bd73fae2f12bf718acf39d9fb5043e9a66460671be236b9380e7c57b3ca9083fc0e7b33cb76e9a82b7cfb11639a0d7c8655a37a6fa7269dd4bafa3fd4538c54a37ea207de8952b4cd273615d6b91faee346ff89ecde0246e92fa87620500ae639e186c501bd7622d66472c42a0f42a392d3853d8abfe865619c41b751738ba125890474522f455247c399951c4f36db9c190e951c3013549bf88e2c0a9be57019010db396d298744548addc3868e69aa64e792836007e6c0", 0xd5, 0x20000000, &(0x7f00000000c0)=@llc={0x1a, 0x8, 0xfff, 0x8, 0x7ff, 0x9}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20300, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r3, 0x402, 0x28) 08:21:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4788}, 0x0) [ 1845.015701] FAULT_INJECTION: forcing a failure. [ 1845.015701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1845.027565] CPU: 1 PID: 22659 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1845.035395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1845.035405] Call Trace: 08:21:26 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x489fff7a, 0x9, 0xfff, 0x80, 0x5}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0xffffffffffffffde) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x446840, 0x0) fcntl$notify(r1, 0x402, 0x81000002000a) [ 1845.035437] dump_stack+0x172/0x1f0 [ 1845.035469] should_fail.cold+0xa/0x15 [ 1845.035490] ? __rtnl_newlink+0x107b/0x16c0 [ 1845.035512] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1845.035529] ? debug_smp_processor_id+0x3c/0x280 [ 1845.035550] ? perf_trace_lock+0xeb/0x510 [ 1845.035566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1845.035588] should_fail_alloc_page+0x50/0x60 [ 1845.035604] __alloc_pages_nodemask+0x1a1/0x710 [ 1845.035628] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1845.035641] ? find_held_lock+0x35/0x130 [ 1845.035669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1845.035692] cache_grow_begin+0x9c/0x8c0 [ 1845.035709] ? __kernfs_new_node+0xef/0x690 [ 1845.035725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1845.035747] kmem_cache_alloc+0x62d/0x6f0 [ 1845.035762] ? memcpy+0x46/0x50 [ 1845.035788] __kernfs_new_node+0xef/0x690 [ 1845.035810] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1845.035824] ? map_id_range_down+0x1ee/0x370 [ 1845.035843] ? __put_user_ns+0x70/0x70 [ 1845.035878] ? tick_nohz_tick_stopped+0x1a/0x90 [ 1845.035897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1845.035918] ? make_kgid+0x23/0x30 [ 1845.035940] kernfs_new_node+0x99/0x130 [ 1845.035965] kernfs_create_dir_ns+0x52/0x160 [ 1845.035988] sysfs_create_dir_ns+0x131/0x2a0 [ 1845.036007] ? sysfs_create_mount_point+0xa0/0xa0 [ 1845.036028] ? net_namespace+0xd/0x40 [ 1845.036050] ? device_namespace+0x9d/0xd0 [ 1845.036073] kobject_add_internal.cold+0xe5/0x5d4 [ 1845.036096] kobject_add+0x150/0x1c0 [ 1845.036111] ? kset_create_and_add+0x1a0/0x1a0 [ 1845.036134] ? kasan_check_read+0x11/0x20 08:21:26 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r1 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x800) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000340)=0x6c) recvfrom$packet(r0, &(0x7f0000000040)=""/150, 0x96, 0x20, &(0x7f0000000300)={0x11, 0x0, r2, 0x1, 0x2f6}, 0x14) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x80000012) [ 1845.036158] ? mutex_unlock+0xd/0x10 [ 1845.036181] device_add+0x3d5/0x1870 [ 1845.036200] ? device_initialize+0x440/0x440 [ 1845.036221] ? get_device_parent.isra.0+0x570/0x570 [ 1845.036237] ? __init_waitqueue_head+0x36/0x90 [ 1845.036255] ? pm_runtime_init+0x364/0x420 [ 1845.036282] netdev_register_kobject+0x183/0x3b0 [ 1845.036309] register_netdevice+0x878/0xff0 [ 1845.036333] ? netdev_change_features+0xb0/0xb0 [ 1845.036363] bond_newlink+0x4b/0x90 [ 1845.036382] ? bond_changelink+0x1ac0/0x1ac0 [ 1845.036399] __rtnl_newlink+0x107b/0x16c0 [ 1845.036434] ? rtnl_link_unregister+0x250/0x250 [ 1845.036448] ? lock_downgrade+0x880/0x880 [ 1845.036474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1845.036506] ? is_bpf_text_address+0xd3/0x170 [ 1845.036523] ? kernel_text_address+0x73/0xf0 [ 1845.036541] ? __kernel_text_address+0xd/0x40 [ 1845.036561] ? unwind_get_return_address+0x61/0xa0 [ 1845.036578] ? __save_stack_trace+0x8a/0xf0 [ 1845.036611] ? save_stack+0xa9/0xd0 [ 1845.036629] ? save_stack+0x45/0xd0 [ 1845.036646] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1845.036661] ? kasan_kmalloc+0x9/0x10 [ 1845.036676] ? kmem_cache_alloc_trace+0x151/0x760 [ 1845.036692] ? rtnl_newlink+0x4b/0xa0 [ 1845.036708] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1845.036808] rtnl_newlink+0x69/0xa0 [ 1845.036825] ? __rtnl_newlink+0x16c0/0x16c0 [ 1845.036844] rtnetlink_rcv_msg+0x465/0xb00 [ 1845.036880] ? rtnetlink_put_metrics+0x560/0x560 [ 1845.036897] ? __lockdep_free_key_range+0x120/0x120 [ 1845.036916] ? netdev_pick_tx+0x300/0x300 [ 1845.036937] ? netlink_deliver_tap+0x22d/0xbf0 08:21:26 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 1845.036954] ? find_held_lock+0x35/0x130 [ 1845.036979] netlink_rcv_skb+0x17a/0x460 [ 1845.037000] ? rtnetlink_put_metrics+0x560/0x560 [ 1845.037020] ? netlink_ack+0xb50/0xb50 [ 1845.037038] ? kasan_check_read+0x11/0x20 [ 1845.037061] ? netlink_deliver_tap+0x254/0xbf0 [ 1845.037091] rtnetlink_rcv+0x1d/0x30 [ 1845.037112] netlink_unicast+0x536/0x720 [ 1845.037137] ? netlink_attachskb+0x770/0x770 [ 1845.037155] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1845.037172] ? __check_object_size+0x3d/0x42f [ 1845.037196] netlink_sendmsg+0x8ae/0xd70 [ 1845.037221] ? netlink_unicast+0x720/0x720 [ 1845.037237] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1845.037258] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1845.037274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1845.037290] ? security_socket_sendmsg+0x93/0xc0 [ 1845.037306] ? netlink_unicast+0x720/0x720 [ 1845.037326] sock_sendmsg+0xdd/0x130 [ 1845.037347] ___sys_sendmsg+0x806/0x930 [ 1845.037370] ? copy_msghdr_from_user+0x430/0x430 [ 1845.037393] ? lock_downgrade+0x880/0x880 [ 1845.037408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1845.037429] ? kasan_check_read+0x11/0x20 [ 1845.037450] ? __fget+0x367/0x540 [ 1845.037485] ? ksys_dup3+0x3e0/0x3e0 [ 1845.037500] ? lock_downgrade+0x880/0x880 [ 1845.037530] ? __fget_light+0x1a9/0x230 [ 1845.037551] ? __fdget+0x1b/0x20 [ 1845.037566] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1845.037587] __sys_sendmsg+0x105/0x1d0 [ 1845.037604] ? __ia32_sys_shutdown+0x80/0x80 [ 1845.037621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1845.037637] ? fput+0x128/0x1a0 [ 1845.037666] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1845.037683] ? do_fast_syscall_32+0xd1/0xc98 [ 1845.037698] ? entry_SYSENTER_compat+0x70/0x7f [ 1845.037714] ? do_fast_syscall_32+0xd1/0xc98 [ 1845.037739] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1845.037760] do_fast_syscall_32+0x281/0xc98 [ 1845.037782] entry_SYSENTER_compat+0x70/0x7f [ 1845.037796] RIP: 0023:0xf7f4e869 [ 1845.037813] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1845.037822] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1845.037839] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1845.037860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1845.037872] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1845.037882] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1845.037893] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x30, 0x829, 0x0, 0x0, {0x2803, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x10, 0x1, @ipv6=@loopback={0xffffffff1a0d0000}}]}]}, 0x2c}}, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) [ 1845.585320] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.592053] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.599237] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.606569] protocol 88fb is buggy, dev hsr_slave_1 08:21:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4888}, 0x0) 08:21:27 executing program 3 (fault-call:1 fault-nth:30): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1845.668990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1845.708165] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1845.886016] FAULT_INJECTION: forcing a failure. [ 1845.886016] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.902576] CPU: 1 PID: 22698 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1845.909465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1845.918829] Call Trace: [ 1845.921440] dump_stack+0x172/0x1f0 [ 1845.925098] should_fail.cold+0xa/0x15 [ 1845.929014] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1845.934172] ? ___might_sleep+0x163/0x280 [ 1845.938344] __should_failslab+0x121/0x190 [ 1845.942597] should_failslab+0x9/0x14 [ 1845.946418] kmem_cache_alloc_trace+0x2d1/0x760 [ 1845.951115] ? rcu_read_lock_sched_held+0x110/0x130 [ 1845.956158] ? __kmalloc+0x5d5/0x740 [ 1845.959909] alloc_workqueue_attrs+0x82/0x120 [ 1845.964428] apply_wqattrs_prepare+0x10d/0x9f0 [ 1845.969051] apply_workqueue_attrs_locked+0xcb/0x140 [ 1845.974165] apply_workqueue_attrs+0x31/0x50 [ 1845.978581] alloc_workqueue+0x84d/0xe70 [ 1845.982640] ? bond_init+0x17a/0x800 [ 1845.986341] ? find_held_lock+0x35/0x130 [ 1845.990413] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1845.995432] ? lock_downgrade+0x880/0x880 [ 1845.999581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.005129] bond_init+0x1b3/0x800 [ 1846.008673] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1846.013002] register_netdevice+0x300/0xff0 [ 1846.017324] ? netdev_change_features+0xb0/0xb0 [ 1846.022008] bond_newlink+0x4b/0x90 [ 1846.025699] ? bond_changelink+0x1ac0/0x1ac0 [ 1846.030241] __rtnl_newlink+0x107b/0x16c0 [ 1846.034593] ? rtnl_link_unregister+0x250/0x250 [ 1846.039346] ? lock_downgrade+0x880/0x880 [ 1846.043555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.049201] ? is_bpf_text_address+0xd3/0x170 [ 1846.053815] ? kernel_text_address+0x73/0xf0 [ 1846.058349] ? __kernel_text_address+0xd/0x40 [ 1846.062918] ? unwind_get_return_address+0x61/0xa0 [ 1846.067922] ? __save_stack_trace+0x8a/0xf0 [ 1846.072315] ? save_stack+0xa9/0xd0 [ 1846.075973] ? save_stack+0x45/0xd0 [ 1846.079637] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1846.084798] ? kasan_kmalloc+0x9/0x10 [ 1846.088618] ? kmem_cache_alloc_trace+0x151/0x760 [ 1846.093465] ? rtnl_newlink+0x4b/0xa0 [ 1846.097266] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1846.101715] rtnl_newlink+0x69/0xa0 [ 1846.105339] ? __rtnl_newlink+0x16c0/0x16c0 [ 1846.109653] rtnetlink_rcv_msg+0x465/0xb00 [ 1846.113907] ? rtnetlink_put_metrics+0x560/0x560 [ 1846.118670] ? __lockdep_free_key_range+0x120/0x120 [ 1846.123687] ? netdev_pick_tx+0x300/0x300 [ 1846.127840] ? netlink_deliver_tap+0x22d/0xbf0 [ 1846.132427] ? find_held_lock+0x35/0x130 [ 1846.136491] netlink_rcv_skb+0x17a/0x460 [ 1846.140546] ? rtnetlink_put_metrics+0x560/0x560 [ 1846.145305] ? netlink_ack+0xb50/0xb50 [ 1846.149199] ? kasan_check_read+0x11/0x20 [ 1846.153354] ? netlink_deliver_tap+0x254/0xbf0 [ 1846.157936] rtnetlink_rcv+0x1d/0x30 [ 1846.161657] netlink_unicast+0x536/0x720 [ 1846.165737] ? netlink_attachskb+0x770/0x770 [ 1846.170148] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1846.175165] ? __check_object_size+0x3d/0x42f [ 1846.180112] netlink_sendmsg+0x8ae/0xd70 [ 1846.184188] ? netlink_unicast+0x720/0x720 [ 1846.188437] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1846.193304] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1846.198079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.203629] ? security_socket_sendmsg+0x93/0xc0 [ 1846.208379] ? netlink_unicast+0x720/0x720 [ 1846.212608] sock_sendmsg+0xdd/0x130 [ 1846.216325] ___sys_sendmsg+0x806/0x930 [ 1846.220312] ? copy_msghdr_from_user+0x430/0x430 [ 1846.225077] ? lock_downgrade+0x880/0x880 [ 1846.229224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.234773] ? kasan_check_read+0x11/0x20 [ 1846.238931] ? __fget+0x367/0x540 [ 1846.242399] ? ksys_dup3+0x3e0/0x3e0 [ 1846.246104] ? lock_downgrade+0x880/0x880 [ 1846.250353] ? __fget_light+0x1a9/0x230 [ 1846.254346] ? __fdget+0x1b/0x20 [ 1846.257717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1846.263259] __sys_sendmsg+0x105/0x1d0 [ 1846.267145] ? __ia32_sys_shutdown+0x80/0x80 [ 1846.271561] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1846.277089] ? fput+0x128/0x1a0 [ 1846.280375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1846.285133] ? do_fast_syscall_32+0xd1/0xc98 [ 1846.289543] ? entry_SYSENTER_compat+0x70/0x7f [ 1846.294119] ? do_fast_syscall_32+0xd1/0xc98 [ 1846.298524] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1846.303286] do_fast_syscall_32+0x281/0xc98 [ 1846.307617] entry_SYSENTER_compat+0x70/0x7f [ 1846.312011] RIP: 0023:0xf7f4e869 [ 1846.315362] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1846.334258] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1846.341979] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1846.349431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1846.356736] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1846.364011] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1846.371285] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:27 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x113, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:27 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$setsig(r0, 0xa, 0x26) 08:21:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x5865}, 0x0) 08:21:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:28 executing program 3 (fault-call:1 fault-nth:31): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'btrfs.', '^\x00'}, &(0x7f0000000200)='c\x8d\x1d\xb1\xaf)\xcd\xc5o\xe2\xc4\xd5Ad\xe1\xa4-\xe1\xc7\xf0\xd31\xd4\xde\xc7%\x9e\xbc\xeb\x93\xa9\xd3[k\x93#\'\a69\x11gaV\xd1SP\xcb\xbe\xf3/\a\xbf\xe5\x91\xa8\xbe\x13\xa7\xca!\xbb^\xa6>@lk\xf0\xa9\x15\xf6|\xe2 x8@\x03\x92\xc8b\xec:\r\xa6\x15\xa9\xc2\x00\x88z\xa0\xf9\xbf\x8b\xf6:\xdb\x8df\xf8\xe1\xe7/fx\x04\'\x10>\a\xe93\x12}\x12\x90\x81\xdf\x8d\xc8\x936\xd6w\x11\xdf\xa2\xca#Z\x89<\x90 )\xef\nED=\x95\x9e\xcb`\xd7\xed\xc1\xbf\xa8\x9b\xb0t\x8c\xbe', 0x9c, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='c\x8d\x1d\xb1\xaf)\xcd\xc5o\xe2\xc4\xd5Ad\xe1\xa4-\xe1\xc7\xf0\xd31\xd4\xde\xc7%\x9e\xbc\xeb\x93\xa9\xd3[k\x93#\'\a69\x11gaV\xd1SP\xcb\xbe\xf3/\a\xbf\xe5\x91\xa8\xbe\x13\xa7\xca!\xbb^\xa6>@lk\xf0\xa9\x15\xf6|\xe2 x8@\x03\x92\xc8b\xec:\r\xa6\x15\xa9\xc2\x00\x88z\xa0\xf9\xbf\x8b\xf6:\xdb\x8df\xf8\xe1\xe7/fx\x04\'\x10>\a\xe93\x12}\x12\x90\x81\xdf\x8d\xc8\x936\xd6w\x11\xdf\xa2\xca#Z\x89<\x90 )\xef\nED=\x95\x9e\xcb`\xd7\xed\xc1\xbf\xa8\x9b\xb0t\x8c\xbe', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r3, 0x402, 0x28) [ 1846.673520] FAULT_INJECTION: forcing a failure. [ 1846.673520] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.729646] CPU: 1 PID: 22713 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1846.736550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.745922] Call Trace: [ 1846.748537] dump_stack+0x172/0x1f0 [ 1846.752194] should_fail.cold+0xa/0x15 [ 1846.756107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1846.761242] ? ___might_sleep+0x163/0x280 [ 1846.765421] __should_failslab+0x121/0x190 [ 1846.770039] should_failslab+0x9/0x14 [ 1846.773871] kmem_cache_alloc_node+0x264/0x710 [ 1846.778493] alloc_unbound_pwq+0x4c5/0xcf0 [ 1846.782770] apply_wqattrs_prepare+0x3b0/0x9f0 [ 1846.787389] apply_workqueue_attrs_locked+0xcb/0x140 [ 1846.792519] apply_workqueue_attrs+0x31/0x50 [ 1846.796951] alloc_workqueue+0x84d/0xe70 [ 1846.801031] ? bond_init+0x17a/0x800 [ 1846.804773] ? find_held_lock+0x35/0x130 [ 1846.808872] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1846.813918] ? lock_downgrade+0x880/0x880 [ 1846.818087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.823656] bond_init+0x1b3/0x800 [ 1846.827216] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1846.831559] register_netdevice+0x300/0xff0 [ 1846.835917] ? netdev_change_features+0xb0/0xb0 [ 1846.840620] bond_newlink+0x4b/0x90 [ 1846.844274] ? bond_changelink+0x1ac0/0x1ac0 [ 1846.848705] __rtnl_newlink+0x107b/0x16c0 [ 1846.852900] ? rtnl_link_unregister+0x250/0x250 [ 1846.857588] ? lock_downgrade+0x880/0x880 [ 1846.861756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.867326] ? is_bpf_text_address+0xd3/0x170 [ 1846.871834] ? kernel_text_address+0x73/0xf0 08:21:28 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x803, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x800000000010) getsockopt(r2, 0xffffffff, 0x2, &(0x7f00000000c0)=""/156, &(0x7f0000000040)=0x9c) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000000)={0x5, 0x7, 0x3c, 0x644, 0x9, 0x800, 0x4}) 08:21:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x6000}, 0x0) [ 1846.876268] ? __kernel_text_address+0xd/0x40 [ 1846.880782] ? unwind_get_return_address+0x61/0xa0 [ 1846.885726] ? __save_stack_trace+0x8a/0xf0 [ 1846.890083] ? save_stack+0xa9/0xd0 [ 1846.893729] ? save_stack+0x45/0xd0 [ 1846.897373] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1846.902503] ? kasan_kmalloc+0x9/0x10 [ 1846.906316] ? kmem_cache_alloc_trace+0x151/0x760 [ 1846.906332] ? rtnl_newlink+0x4b/0xa0 [ 1846.906346] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1846.906442] rtnl_newlink+0x69/0xa0 [ 1846.906467] ? __rtnl_newlink+0x16c0/0x16c0 08:21:28 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x4) r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getpgid(r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000680)=""/4096) fcntl$notify(r2, 0x402, 0x10) [ 1846.906485] rtnetlink_rcv_msg+0x465/0xb00 [ 1846.906509] ? rtnetlink_put_metrics+0x560/0x560 [ 1846.906524] ? __lockdep_free_key_range+0x120/0x120 [ 1846.906540] ? netdev_pick_tx+0x300/0x300 [ 1846.906560] ? netlink_deliver_tap+0x22d/0xbf0 [ 1846.906575] ? find_held_lock+0x35/0x130 [ 1846.915230] netlink_rcv_skb+0x17a/0x460 [ 1846.915251] ? rtnetlink_put_metrics+0x560/0x560 [ 1846.915271] ? netlink_ack+0xb50/0xb50 [ 1846.915288] ? kasan_check_read+0x11/0x20 [ 1846.915309] ? netlink_deliver_tap+0x254/0xbf0 [ 1846.915333] rtnetlink_rcv+0x1d/0x30 [ 1846.915348] netlink_unicast+0x536/0x720 [ 1846.915369] ? netlink_attachskb+0x770/0x770 [ 1846.915385] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1846.915401] ? __check_object_size+0x3d/0x42f [ 1846.967183] netlink_sendmsg+0x8ae/0xd70 [ 1846.967207] ? netlink_unicast+0x720/0x720 [ 1846.967223] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1846.967243] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1846.967258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.967272] ? security_socket_sendmsg+0x93/0xc0 [ 1846.967285] ? netlink_unicast+0x720/0x720 [ 1846.967304] sock_sendmsg+0xdd/0x130 [ 1846.967325] ___sys_sendmsg+0x806/0x930 [ 1846.967345] ? copy_msghdr_from_user+0x430/0x430 [ 1846.980233] ? lock_downgrade+0x880/0x880 [ 1846.980251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.980272] ? kasan_check_read+0x11/0x20 [ 1846.980292] ? __fget+0x367/0x540 [ 1847.060269] ? ksys_dup3+0x3e0/0x3e0 [ 1847.064007] ? lock_downgrade+0x880/0x880 [ 1847.068181] ? __fget_light+0x1a9/0x230 [ 1847.072174] ? __fdget+0x1b/0x20 [ 1847.075551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 08:21:28 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) [ 1847.081112] __sys_sendmsg+0x105/0x1d0 [ 1847.085019] ? __ia32_sys_shutdown+0x80/0x80 [ 1847.089441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1847.094995] ? fput+0x128/0x1a0 [ 1847.098298] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1847.103071] ? do_fast_syscall_32+0xd1/0xc98 [ 1847.107491] ? entry_SYSENTER_compat+0x70/0x7f [ 1847.112080] ? do_fast_syscall_32+0xd1/0xc98 [ 1847.116507] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1847.121275] do_fast_syscall_32+0x281/0xc98 [ 1847.125609] entry_SYSENTER_compat+0x70/0x7f 08:21:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000000)) [ 1847.130028] RIP: 0023:0xf7f4e869 [ 1847.133405] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1847.152362] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1847.160080] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1847.160089] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1847.160098] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1847.160105] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1847.160114] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:28 executing program 3 (fault-call:1 fault-nth:32): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1847.457758] FAULT_INJECTION: forcing a failure. [ 1847.457758] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.477242] CPU: 0 PID: 22751 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1847.484118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.484127] Call Trace: [ 1847.484155] dump_stack+0x172/0x1f0 [ 1847.484181] should_fail.cold+0xa/0x15 [ 1847.496129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.496154] ? ___might_sleep+0x163/0x280 [ 1847.496176] __should_failslab+0x121/0x190 [ 1847.496194] ? cancel_delayed_work+0x2d0/0x2d0 [ 1847.521741] should_failslab+0x9/0x14 [ 1847.525563] kmem_cache_alloc_trace+0x2d1/0x760 [ 1847.530260] ? lockdep_init_map+0x1be/0x6d0 [ 1847.534614] ? cancel_delayed_work+0x2d0/0x2d0 [ 1847.539217] __kthread_create_on_node+0xf2/0x460 [ 1847.544010] ? kthread_parkme+0xb0/0xb0 [ 1847.548401] ? do_raw_spin_unlock+0x57/0x270 [ 1847.552891] ? cancel_delayed_work+0x2d0/0x2d0 [ 1847.557499] kthread_create_on_node+0xbb/0xf0 [ 1847.562016] ? __kthread_create_on_node+0x460/0x460 [ 1847.567048] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 1847.572326] ? lock_downgrade+0x880/0x880 [ 1847.576479] init_rescuer.part.0+0x7d/0x190 [ 1847.580804] alloc_workqueue+0xb73/0xe70 [ 1847.584860] ? bond_init+0x17a/0x800 [ 1847.588568] ? find_held_lock+0x35/0x130 [ 1847.592624] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1847.597636] ? lock_downgrade+0x880/0x880 [ 1847.601775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.607330] bond_init+0x1b3/0x800 [ 1847.610893] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1847.615227] register_netdevice+0x300/0xff0 [ 1847.615250] ? netdev_change_features+0xb0/0xb0 [ 1847.615278] bond_newlink+0x4b/0x90 [ 1847.615295] ? bond_changelink+0x1ac0/0x1ac0 [ 1847.632303] __rtnl_newlink+0x107b/0x16c0 [ 1847.636485] ? rtnl_link_unregister+0x250/0x250 [ 1847.641171] ? lock_downgrade+0x880/0x880 [ 1847.645331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.650905] ? is_bpf_text_address+0xd3/0x170 [ 1847.655417] ? kernel_text_address+0x73/0xf0 [ 1847.659837] ? __kernel_text_address+0xd/0x40 [ 1847.664358] ? unwind_get_return_address+0x61/0xa0 [ 1847.669292] ? __save_stack_trace+0x8a/0xf0 [ 1847.673613] ? save_stack+0xa9/0xd0 [ 1847.677229] ? save_stack+0x45/0xd0 [ 1847.680843] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1847.685943] ? kasan_kmalloc+0x9/0x10 [ 1847.689737] ? kmem_cache_alloc_trace+0x151/0x760 [ 1847.694568] ? rtnl_newlink+0x4b/0xa0 [ 1847.698356] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1847.702849] rtnl_newlink+0x69/0xa0 [ 1847.706487] ? __rtnl_newlink+0x16c0/0x16c0 [ 1847.710813] rtnetlink_rcv_msg+0x465/0xb00 [ 1847.715071] ? rtnetlink_put_metrics+0x560/0x560 [ 1847.719819] ? __lockdep_free_key_range+0x120/0x120 [ 1847.724832] ? netdev_pick_tx+0x300/0x300 [ 1847.728988] ? netlink_deliver_tap+0x22d/0xbf0 [ 1847.733588] ? find_held_lock+0x35/0x130 [ 1847.737653] netlink_rcv_skb+0x17a/0x460 [ 1847.741704] ? rtnetlink_put_metrics+0x560/0x560 [ 1847.746450] ? netlink_ack+0xb50/0xb50 [ 1847.750329] ? kasan_check_read+0x11/0x20 [ 1847.754471] ? netlink_deliver_tap+0x254/0xbf0 [ 1847.759054] rtnetlink_rcv+0x1d/0x30 [ 1847.762756] netlink_unicast+0x536/0x720 [ 1847.766807] ? netlink_attachskb+0x770/0x770 [ 1847.771213] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1847.776231] ? __check_object_size+0x3d/0x42f [ 1847.780833] netlink_sendmsg+0x8ae/0xd70 [ 1847.784906] ? netlink_unicast+0x720/0x720 [ 1847.789144] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1847.793983] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1847.798741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.804293] ? security_socket_sendmsg+0x93/0xc0 [ 1847.809058] ? netlink_unicast+0x720/0x720 [ 1847.813287] sock_sendmsg+0xdd/0x130 [ 1847.816997] ___sys_sendmsg+0x806/0x930 [ 1847.820972] ? copy_msghdr_from_user+0x430/0x430 [ 1847.825722] ? lock_downgrade+0x880/0x880 [ 1847.829866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.835399] ? kasan_check_read+0x11/0x20 [ 1847.839539] ? __fget+0x367/0x540 [ 1847.842991] ? ksys_dup3+0x3e0/0x3e0 [ 1847.846691] ? lock_downgrade+0x880/0x880 [ 1847.850837] ? __fget_light+0x1a9/0x230 [ 1847.854808] ? __fdget+0x1b/0x20 [ 1847.858162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.863706] __sys_sendmsg+0x105/0x1d0 [ 1847.867594] ? __ia32_sys_shutdown+0x80/0x80 [ 1847.871992] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1847.877517] ? fput+0x128/0x1a0 [ 1847.880809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1847.885568] ? do_fast_syscall_32+0xd1/0xc98 [ 1847.889978] ? entry_SYSENTER_compat+0x70/0x7f [ 1847.894555] ? do_fast_syscall_32+0xd1/0xc98 [ 1847.898972] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1847.903739] do_fast_syscall_32+0x281/0xc98 [ 1847.908054] entry_SYSENTER_compat+0x70/0x7f [ 1847.912458] RIP: 0023:0xf7f4e869 [ 1847.915814] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1847.934708] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1847.942421] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1847.949693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1847.956959] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1847.964222] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1847.971486] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:29 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x114, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:29 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000000)=""/196, 0xc4}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000280)=""/202, 0xca}], 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:21:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000002680)='/dev/amidi#\x00', 0x750a, 0x40) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000026c0)) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x1e, 0x4) fcntl$notify(r0, 0x402, 0xc) fcntl$notify(r2, 0x402, 0x28) 08:21:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x6488}, 0x0) 08:21:29 executing program 3 (fault-call:1 fault-nth:33): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1848.243621] FAULT_INJECTION: forcing a failure. [ 1848.243621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1848.255493] CPU: 1 PID: 22770 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1848.262350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.271722] Call Trace: [ 1848.274335] dump_stack+0x172/0x1f0 [ 1848.277982] should_fail.cold+0xa/0x15 [ 1848.281905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1848.287028] ? debug_smp_processor_id+0x3c/0x280 [ 1848.291804] ? perf_trace_lock+0xeb/0x510 [ 1848.295966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.301529] should_fail_alloc_page+0x50/0x60 [ 1848.306037] __alloc_pages_nodemask+0x1a1/0x710 [ 1848.310727] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1848.315754] ? find_held_lock+0x35/0x130 [ 1848.319838] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1848.319873] cache_grow_begin+0x9c/0x8c0 [ 1848.319895] ? alloc_unbound_pwq+0x4c5/0xcf0 [ 1848.319912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1848.319934] kmem_cache_alloc_node+0x645/0x710 [ 1848.319960] alloc_unbound_pwq+0x4c5/0xcf0 [ 1848.329127] apply_wqattrs_prepare+0x3b0/0x9f0 [ 1848.329161] apply_workqueue_attrs_locked+0xcb/0x140 [ 1848.329182] apply_workqueue_attrs+0x31/0x50 [ 1848.329201] alloc_workqueue+0x84d/0xe70 [ 1848.329214] ? bond_init+0x17a/0x800 [ 1848.329230] ? find_held_lock+0x35/0x130 [ 1848.357628] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1848.357651] ? lock_downgrade+0x880/0x880 [ 1848.357667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.357691] bond_init+0x1b3/0x800 08:21:29 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40047705, &(0x7f0000000000)={0x3, 0x8001}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) socket$nl_netfilter(0x10, 0x3, 0xc) [ 1848.357707] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1848.357728] register_netdevice+0x300/0xff0 [ 1848.357751] ? netdev_change_features+0xb0/0xb0 [ 1848.357777] bond_newlink+0x4b/0x90 [ 1848.366238] ? bond_changelink+0x1ac0/0x1ac0 [ 1848.366256] __rtnl_newlink+0x107b/0x16c0 [ 1848.366291] ? rtnl_link_unregister+0x250/0x250 [ 1848.366305] ? lock_downgrade+0x880/0x880 [ 1848.366320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.366348] ? is_bpf_text_address+0xd3/0x170 [ 1848.366364] ? kernel_text_address+0x73/0xf0 [ 1848.366379] ? __kernel_text_address+0xd/0x40 [ 1848.366397] ? unwind_get_return_address+0x61/0xa0 [ 1848.366413] ? __save_stack_trace+0x8a/0xf0 [ 1848.379192] ? save_stack+0xa9/0xd0 [ 1848.379210] ? save_stack+0x45/0xd0 [ 1848.379226] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1848.379242] ? kasan_kmalloc+0x9/0x10 [ 1848.379257] ? kmem_cache_alloc_trace+0x151/0x760 [ 1848.379274] ? rtnl_newlink+0x4b/0xa0 [ 1848.379288] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1848.379380] rtnl_newlink+0x69/0xa0 [ 1848.392521] ? __rtnl_newlink+0x16c0/0x16c0 [ 1848.401164] rtnetlink_rcv_msg+0x465/0xb00 [ 1848.401190] ? rtnetlink_put_metrics+0x560/0x560 [ 1848.401207] ? __lockdep_free_key_range+0x120/0x120 [ 1848.401224] ? netdev_pick_tx+0x300/0x300 [ 1848.401244] ? netlink_deliver_tap+0x22d/0xbf0 [ 1848.401260] ? find_held_lock+0x35/0x130 [ 1848.401281] netlink_rcv_skb+0x17a/0x460 [ 1848.484479] ? rtnetlink_put_metrics+0x560/0x560 [ 1848.484502] ? netlink_ack+0xb50/0xb50 [ 1848.484522] ? kasan_check_read+0x11/0x20 [ 1848.484545] ? netlink_deliver_tap+0x254/0xbf0 [ 1848.484572] rtnetlink_rcv+0x1d/0x30 [ 1848.484587] netlink_unicast+0x536/0x720 [ 1848.484607] ? netlink_attachskb+0x770/0x770 [ 1848.501516] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1848.501533] ? __check_object_size+0x3d/0x42f [ 1848.501559] netlink_sendmsg+0x8ae/0xd70 [ 1848.501585] ? netlink_unicast+0x720/0x720 [ 1848.501602] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1848.501622] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1848.501638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.585827] ? security_socket_sendmsg+0x93/0xc0 [ 1848.590609] ? netlink_unicast+0x720/0x720 08:21:29 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fe, 0x400800) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0xa, 0x4) r1 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) [ 1848.594867] sock_sendmsg+0xdd/0x130 [ 1848.598608] ___sys_sendmsg+0x806/0x930 [ 1848.602604] ? copy_msghdr_from_user+0x430/0x430 [ 1848.607388] ? lock_downgrade+0x880/0x880 [ 1848.611553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.617113] ? kasan_check_read+0x11/0x20 [ 1848.621412] ? __fget+0x367/0x540 [ 1848.621437] ? ksys_dup3+0x3e0/0x3e0 [ 1848.621465] ? lock_downgrade+0x880/0x880 [ 1848.621492] ? __fget_light+0x1a9/0x230 [ 1848.621507] ? __fdget+0x1b/0x20 [ 1848.621527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1848.621556] __sys_sendmsg+0x105/0x1d0 [ 1848.632992] ? __ia32_sys_shutdown+0x80/0x80 [ 1848.633016] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1848.633040] ? fput+0x128/0x1a0 [ 1848.633079] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1848.633095] ? do_fast_syscall_32+0xd1/0xc98 [ 1848.633121] ? entry_SYSENTER_compat+0x70/0x7f [ 1848.633133] ? do_fast_syscall_32+0xd1/0xc98 [ 1848.633179] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1848.686317] do_fast_syscall_32+0x281/0xc98 [ 1848.690665] entry_SYSENTER_compat+0x70/0x7f [ 1848.695085] RIP: 0023:0xf7f4e869 [ 1848.698468] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1848.717386] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1848.725111] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1848.732390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1848.739668] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1848.746950] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1848.754238] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:30 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x54600, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x100000000, 0x15c00000000, 0x2, 0x8001, 0x9}, &(0x7f00000004c0)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000500)={r1, 0x52c, 0xfffffffffffffffb}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r0, 0x28, &(0x7f0000000540)}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl(r2, 0x8, &(0x7f00000002c0)="e17206eaf9dffb61cea7c671c46bb7ddc842f87da9055777a4b62f3d0ca5367ca41385c22ca43f0699569b0f1515351bb4396393abf56494961b3651c6ba1303407505ada4c33e200efff9d16d549ba9caee9da3c9e198") getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x5, 0x20, 0x80000001, 0x3c3}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=r3, &(0x7f0000000400)=0x4) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000280)={r3, 0x3}, 0x8) fcntl$notify(r2, 0x402, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0205710, &(0x7f0000000040)={0x1, 0x721, 0x7, 0x4b}) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{}]}) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000440)={{0x3, @addr=0x200}, 0x8, 0x10000}) 08:21:30 executing program 3 (fault-call:1 fault-nth:34): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:30 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x9, &(0x7f0000000000)="b8a34681b7a2f11a03ffd3c63a4691355dff8f6dd52d150ec258fbd721d864fece24bc282052fbb18698438995f78e16505564e6aec73a63426a203e01d4f4f185ee72b8a647aa2508a2a2b5f336a534656603dcaefab9be730e5534495c286064718dbb7a0c4a420ee55eeeb7539e76f686fa2f06a94d6f37c63d6edb11033f") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:21:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x6558}, 0x0) [ 1849.060515] FAULT_INJECTION: forcing a failure. [ 1849.060515] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1849.072370] CPU: 0 PID: 22802 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1849.079222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.088585] Call Trace: [ 1849.088614] dump_stack+0x172/0x1f0 [ 1849.088641] should_fail.cold+0xa/0x15 [ 1849.088664] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.088684] ? debug_smp_processor_id+0x3c/0x280 [ 1849.088704] ? perf_trace_lock+0xeb/0x510 [ 1849.094912] should_fail_alloc_page+0x50/0x60 [ 1849.094929] __alloc_pages_nodemask+0x1a1/0x710 [ 1849.094952] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1849.103925] ? find_held_lock+0x35/0x130 [ 1849.103951] ? kasan_check_write+0x14/0x20 [ 1849.103980] cache_grow_begin+0x9c/0x8c0 [ 1849.131062] ? kasan_check_read+0x11/0x20 [ 1849.139341] ? do_raw_spin_unlock+0x57/0x270 [ 1849.139366] ____cache_alloc_node+0x17c/0x1e0 [ 1849.139382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1849.139404] kmem_cache_alloc_node_trace+0xec/0x720 [ 1849.162994] ? lock_downgrade+0x880/0x880 [ 1849.167170] alloc_worker+0x47/0x1c0 [ 1849.170904] init_rescuer.part.0+0x1f/0x190 [ 1849.175241] alloc_workqueue+0xb73/0xe70 [ 1849.179313] ? bond_init+0x17a/0x800 [ 1849.183038] ? find_held_lock+0x35/0x130 [ 1849.187121] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1849.192160] ? lock_downgrade+0x880/0x880 [ 1849.196324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.201894] bond_init+0x1b3/0x800 [ 1849.205451] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1849.209791] register_netdevice+0x300/0xff0 [ 1849.214117] ? netdev_change_features+0xb0/0xb0 [ 1849.218798] bond_newlink+0x4b/0x90 [ 1849.218818] ? bond_changelink+0x1ac0/0x1ac0 [ 1849.218836] __rtnl_newlink+0x107b/0x16c0 [ 1849.218884] ? rtnl_link_unregister+0x250/0x250 [ 1849.218901] ? lock_downgrade+0x880/0x880 [ 1849.226931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.226966] ? is_bpf_text_address+0xd3/0x170 [ 1849.226981] ? kernel_text_address+0x73/0xf0 [ 1849.226997] ? __kernel_text_address+0xd/0x40 [ 1849.227015] ? unwind_get_return_address+0x61/0xa0 [ 1849.263779] ? __save_stack_trace+0x8a/0xf0 [ 1849.268136] ? save_stack+0xa9/0xd0 [ 1849.271778] ? save_stack+0x45/0xd0 [ 1849.275416] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1849.280516] ? kasan_kmalloc+0x9/0x10 [ 1849.284319] ? kmem_cache_alloc_trace+0x151/0x760 [ 1849.289179] ? rtnl_newlink+0x4b/0xa0 [ 1849.292983] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1849.297473] rtnl_newlink+0x69/0xa0 [ 1849.301105] ? __rtnl_newlink+0x16c0/0x16c0 [ 1849.305420] rtnetlink_rcv_msg+0x465/0xb00 [ 1849.309649] ? rtnetlink_put_metrics+0x560/0x560 [ 1849.314394] ? __lockdep_free_key_range+0x120/0x120 [ 1849.319403] ? netdev_pick_tx+0x300/0x300 [ 1849.323541] ? netlink_deliver_tap+0x22d/0xbf0 [ 1849.328116] ? find_held_lock+0x35/0x130 [ 1849.332173] netlink_rcv_skb+0x17a/0x460 [ 1849.336239] ? rtnetlink_put_metrics+0x560/0x560 [ 1849.341020] ? netlink_ack+0xb50/0xb50 [ 1849.344923] ? kasan_check_read+0x11/0x20 [ 1849.349097] ? netlink_deliver_tap+0x254/0xbf0 [ 1849.353705] rtnetlink_rcv+0x1d/0x30 [ 1849.357434] netlink_unicast+0x536/0x720 [ 1849.361514] ? netlink_attachskb+0x770/0x770 [ 1849.365954] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1849.370982] ? __check_object_size+0x3d/0x42f [ 1849.375474] netlink_sendmsg+0x8ae/0xd70 [ 1849.379535] ? netlink_unicast+0x720/0x720 [ 1849.383759] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1849.388591] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1849.393337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.398874] ? security_socket_sendmsg+0x93/0xc0 [ 1849.403617] ? netlink_unicast+0x720/0x720 [ 1849.407843] sock_sendmsg+0xdd/0x130 [ 1849.411557] ___sys_sendmsg+0x806/0x930 [ 1849.415537] ? copy_msghdr_from_user+0x430/0x430 [ 1849.420301] ? lock_downgrade+0x880/0x880 [ 1849.424447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.430046] ? kasan_check_read+0x11/0x20 [ 1849.434206] ? __fget+0x367/0x540 [ 1849.437666] ? ksys_dup3+0x3e0/0x3e0 [ 1849.441380] ? lock_downgrade+0x880/0x880 [ 1849.445534] ? __fget_light+0x1a9/0x230 [ 1849.449513] ? __fdget+0x1b/0x20 [ 1849.452897] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1849.458455] __sys_sendmsg+0x105/0x1d0 [ 1849.462352] ? __ia32_sys_shutdown+0x80/0x80 [ 1849.466766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1849.472305] ? fput+0x128/0x1a0 [ 1849.475597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1849.480346] ? do_fast_syscall_32+0xd1/0xc98 [ 1849.484744] ? entry_SYSENTER_compat+0x70/0x7f [ 1849.489312] ? do_fast_syscall_32+0xd1/0xc98 [ 1849.493730] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1849.498496] do_fast_syscall_32+0x281/0xc98 [ 1849.502826] entry_SYSENTER_compat+0x70/0x7f [ 1849.507236] RIP: 0023:0xf7f4e869 [ 1849.510696] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1849.529598] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1849.537319] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1849.544579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1849.552078] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1849.559339] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1849.566596] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:31 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x115, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='e\xba1)jd\xf8\x00\xccD%j\xcc>TtI\xd0t\xb3\x15=\xfaMQ\xc1&\x9f;s\xc8B\fV\xf1;y\x98!\xc32\x97\x12\xfb\x80\x86\xff\xe0Q\xa8\x8a?\xeeN\xfaD\x1e\xf1\xaf\xfc\xbf\xd6\xe5[\xa8\x9f_v\x02[\xe89\xaf\x13\xfc\xaaE\x9f\xc9\xc6\xb9_\x9aH\xb3\xbb\x1f!\xec\xfd7?\xb7\x83\r\xba\xad\x90\xa9M\xb5\x8b\xd4z\xfeb\xa9\x9e\xf9', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:31 executing program 3 (fault-call:1 fault-nth:35): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000080), 0xf0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) fcntl$notify(r2, 0x402, 0x28) 08:21:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8035}, 0x0) [ 1849.914504] FAULT_INJECTION: forcing a failure. [ 1849.914504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1849.926362] CPU: 0 PID: 22824 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1849.926375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.926381] Call Trace: [ 1849.926409] dump_stack+0x172/0x1f0 [ 1849.926435] should_fail.cold+0xa/0x15 [ 1849.926465] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.957819] ? debug_smp_processor_id+0x3c/0x280 [ 1849.962600] ? perf_trace_lock+0xeb/0x510 [ 1849.966759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.972309] should_fail_alloc_page+0x50/0x60 [ 1849.976811] __alloc_pages_nodemask+0x1a1/0x710 [ 1849.976836] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1849.976850] ? find_held_lock+0x35/0x130 [ 1849.976886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.976910] cache_grow_begin+0x9c/0x8c0 [ 1849.976926] ? device_add+0xfb6/0x1870 [ 1849.976941] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1849.976969] kmem_cache_alloc_trace+0x67f/0x760 [ 1849.976996] device_add+0xfb6/0x1870 [ 1849.977016] ? device_initialize+0x440/0x440 [ 1849.995844] ? get_device_parent.isra.0+0x570/0x570 [ 1849.995871] ? __init_waitqueue_head+0x36/0x90 [ 1849.995890] ? pm_runtime_init+0x364/0x420 [ 1849.995915] netdev_register_kobject+0x183/0x3b0 [ 1849.995938] register_netdevice+0x878/0xff0 [ 1849.995966] ? netdev_change_features+0xb0/0xb0 [ 1850.004006] bond_newlink+0x4b/0x90 [ 1850.004026] ? bond_changelink+0x1ac0/0x1ac0 [ 1850.004044] __rtnl_newlink+0x107b/0x16c0 [ 1850.018044] ? rtnl_link_unregister+0x250/0x250 [ 1850.018060] ? lock_downgrade+0x880/0x880 [ 1850.018076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.018107] ? is_bpf_text_address+0xd3/0x170 [ 1850.018122] ? kernel_text_address+0x73/0xf0 [ 1850.018137] ? __kernel_text_address+0xd/0x40 [ 1850.018154] ? unwind_get_return_address+0x61/0xa0 [ 1850.018170] ? __save_stack_trace+0x8a/0xf0 [ 1850.018202] ? save_stack+0xa9/0xd0 [ 1850.055362] net_ratelimit: 20 callbacks suppressed [ 1850.055371] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.058114] ? save_stack+0x45/0xd0 [ 1850.062291] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.066908] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1850.066922] ? kasan_kmalloc+0x9/0x10 [ 1850.066936] ? kmem_cache_alloc_trace+0x151/0x760 [ 1850.066952] ? rtnl_newlink+0x4b/0xa0 [ 1850.066979] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1850.067076] rtnl_newlink+0x69/0xa0 [ 1850.081155] ? __rtnl_newlink+0x16c0/0x16c0 [ 1850.081176] rtnetlink_rcv_msg+0x465/0xb00 [ 1850.081199] ? rtnetlink_put_metrics+0x560/0x560 [ 1850.081215] ? __lockdep_free_key_range+0x120/0x120 [ 1850.103038] ? netdev_pick_tx+0x300/0x300 [ 1850.103060] ? netlink_deliver_tap+0x22d/0xbf0 [ 1850.103078] ? find_held_lock+0x35/0x130 [ 1850.103100] netlink_rcv_skb+0x17a/0x460 [ 1850.135363] ? rtnetlink_put_metrics+0x560/0x560 [ 1850.135386] ? netlink_ack+0xb50/0xb50 [ 1850.135405] ? kasan_check_read+0x11/0x20 [ 1850.135427] ? netlink_deliver_tap+0x254/0xbf0 [ 1850.135452] rtnetlink_rcv+0x1d/0x30 [ 1850.135467] netlink_unicast+0x536/0x720 [ 1850.135490] ? netlink_attachskb+0x770/0x770 [ 1850.135507] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1850.135523] ? __check_object_size+0x3d/0x42f [ 1850.151663] netlink_sendmsg+0x8ae/0xd70 [ 1850.221400] ? netlink_unicast+0x720/0x720 [ 1850.221418] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1850.221440] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1850.221457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.221473] ? security_socket_sendmsg+0x93/0xc0 [ 1850.221489] ? netlink_unicast+0x720/0x720 [ 1850.253880] sock_sendmsg+0xdd/0x130 [ 1850.253904] ___sys_sendmsg+0x806/0x930 [ 1850.253927] ? copy_msghdr_from_user+0x430/0x430 [ 1850.253951] ? lock_downgrade+0x880/0x880 [ 1850.253973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.276067] ? kasan_check_read+0x11/0x20 [ 1850.280235] ? __fget+0x367/0x540 [ 1850.283710] ? ksys_dup3+0x3e0/0x3e0 [ 1850.287437] ? lock_downgrade+0x880/0x880 [ 1850.291608] ? __fget_light+0x1a9/0x230 [ 1850.295601] ? __fdget+0x1b/0x20 [ 1850.298987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1850.304546] __sys_sendmsg+0x105/0x1d0 [ 1850.308444] ? __ia32_sys_shutdown+0x80/0x80 [ 1850.312873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1850.318428] ? fput+0x128/0x1a0 [ 1850.321736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1850.326505] ? do_fast_syscall_32+0xd1/0xc98 [ 1850.330924] ? entry_SYSENTER_compat+0x70/0x7f [ 1850.335526] ? do_fast_syscall_32+0xd1/0xc98 [ 1850.339971] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1850.344748] do_fast_syscall_32+0x281/0xc98 [ 1850.349089] entry_SYSENTER_compat+0x70/0x7f [ 1850.353507] RIP: 0023:0xf7f4e869 08:21:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e23, 0x100000001, @empty, 0x3}}, 0x0, 0x7fff, 0x0, "92954fcf0b891fa4573001342ac9c5b37f295c03af2761abac5372e53e72c3016e7a57b036aefbdf48646895db344dd1d8253800b1dae1a25541c4ce3afa916c44dbccb79c5eb1e1d7e90511946ba57f"}, 0xd8) fcntl$notify(r0, 0x402, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) tkill(r1, 0x1c) 08:21:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@rand_addr="a4a47c85dbc0354c075790ab644b98cc", 0x5c, r1}) fcntl$notify(r0, 0x402, 0x28) 08:21:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:21:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x20000) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xc3\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) [ 1850.356895] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1850.375810] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1850.383543] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1850.390822] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1850.398112] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1850.405387] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1850.405397] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1850.405739] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.425671] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.425773] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.435868] protocol 88fb is buggy, dev hsr_slave_1 08:21:31 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x204502, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='\x7f\xcb\xaa\"\x00\x00\x00B\xec\x9by\x87,\x01j\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v2={0x7, 0x1, 0x1, 0x3, 0xec, "066cf97b399b6318111e82a92d02a8d771ec064acd08fbf89171cb88824e694c7c35dcd187ad7b3aa75704c76f715bfb117fb8cad8dc3d6f6d044f4a0617d7c2cf93377fd188a9ad66e1a7f12ad3c363212d891faf781545e4c06102d00eee83f1334e855ee408d7ea798bba05ca11d9e54c8c3b35e988f51da19cb3bd12f926e8dd3fd36de8de5dc9e25e20ff297935d27ea2f6d683ca3034f415dfad11be71b0fe35d2e651c3e6520f1f91c541a6f70c90e470852a01ede967d117364ed41a7c40957c21f753cda01ddbf55ac7cd1e82179f2112e96104170e0e2eac00554c6560c1ed2306191ce5571dd8"}, 0x25, 0x4000000000000001) write$P9_RREADDIR(r1, &(0x7f0000000380)={0xc5, 0x29, 0x1, {0x10001, [{{0x5a8a2b1b9d8d491d, 0x3, 0x1}, 0xffffffffffff12e6, 0x401, 0x7, './file0'}, {{0xc6, 0x3, 0x3}, 0xffffffffffffff1a, 0x10001, 0x7, './file0'}, {{0x12, 0x3, 0x4}, 0x2, 0x7, 0x7, './file0'}, {{0x90, 0x2, 0x8}, 0x4, 0x2, 0x7, './file0'}, {{0x0, 0x2, 0x7}, 0x8000, 0x614, 0x7, './file0'}, {{0x10, 0x3}, 0x20, 0x6, 0x7, './file0'}]}}, 0xc5) 08:21:31 executing program 3 (fault-call:1 fault-nth:36): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1850.775362] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.775395] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.780489] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.785557] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.854590] FAULT_INJECTION: forcing a failure. [ 1850.854590] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1850.866431] CPU: 0 PID: 22867 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1850.873279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.882642] Call Trace: [ 1850.885255] dump_stack+0x172/0x1f0 [ 1850.888995] should_fail.cold+0xa/0x15 [ 1850.892900] ? __rtnl_newlink+0x107b/0x16c0 [ 1850.897239] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1850.902354] ? debug_smp_processor_id+0x3c/0x280 [ 1850.907127] ? perf_trace_lock+0xeb/0x510 [ 1850.911281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.916833] should_fail_alloc_page+0x50/0x60 [ 1850.921349] __alloc_pages_nodemask+0x1a1/0x710 [ 1850.926038] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1850.931063] ? find_held_lock+0x35/0x130 [ 1850.935146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1850.940271] cache_grow_begin+0x9c/0x8c0 [ 1850.944349] ? __kernfs_new_node+0xef/0x690 [ 1850.948680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1850.954240] kmem_cache_alloc+0x62d/0x6f0 [ 1850.958401] ? memcpy+0x46/0x50 [ 1850.961702] __kernfs_new_node+0xef/0x690 [ 1850.965873] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1850.970640] ? map_id_range_down+0x1ee/0x370 [ 1850.975053] ? __put_user_ns+0x70/0x70 [ 1850.978946] ? tick_nohz_tick_stopped+0x1a/0x90 [ 1850.983622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.989172] ? make_kgid+0x23/0x30 [ 1850.992721] kernfs_new_node+0x99/0x130 [ 1850.996700] kernfs_create_dir_ns+0x52/0x160 [ 1851.001109] sysfs_create_dir_ns+0x131/0x2a0 [ 1851.005524] ? sysfs_create_mount_point+0xa0/0xa0 [ 1851.010369] ? net_namespace+0xd/0x40 [ 1851.014161] ? device_namespace+0x9d/0xd0 [ 1851.018319] kobject_add_internal.cold+0xe5/0x5d4 [ 1851.023182] kobject_add+0x150/0x1c0 [ 1851.026912] ? kset_create_and_add+0x1a0/0x1a0 [ 1851.031505] ? kasan_check_read+0x11/0x20 [ 1851.035666] ? mutex_unlock+0xd/0x10 [ 1851.039394] device_add+0x3d5/0x1870 [ 1851.043108] ? device_initialize+0x440/0x440 [ 1851.047525] ? get_device_parent.isra.0+0x570/0x570 [ 1851.052542] ? __init_waitqueue_head+0x36/0x90 [ 1851.057127] ? pm_runtime_init+0x364/0x420 [ 1851.061364] netdev_register_kobject+0x183/0x3b0 [ 1851.066132] register_netdevice+0x878/0xff0 [ 1851.070481] ? netdev_change_features+0xb0/0xb0 [ 1851.075149] bond_newlink+0x4b/0x90 [ 1851.078776] ? bond_changelink+0x1ac0/0x1ac0 [ 1851.083186] __rtnl_newlink+0x107b/0x16c0 [ 1851.087355] ? rtnl_link_unregister+0x250/0x250 [ 1851.092022] ? lock_downgrade+0x880/0x880 [ 1851.096172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.101717] ? is_bpf_text_address+0xd3/0x170 [ 1851.106213] ? kernel_text_address+0x73/0xf0 [ 1851.110619] ? __kernel_text_address+0xd/0x40 [ 1851.115103] ? unwind_get_return_address+0x61/0xa0 [ 1851.120028] ? __save_stack_trace+0x8a/0xf0 [ 1851.124349] ? save_stack+0xa9/0xd0 [ 1851.127990] ? save_stack+0x45/0xd0 [ 1851.131614] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1851.136713] ? kasan_kmalloc+0x9/0x10 [ 1851.140511] ? kmem_cache_alloc_trace+0x151/0x760 [ 1851.145354] ? rtnl_newlink+0x4b/0xa0 [ 1851.149164] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1851.153615] rtnl_newlink+0x69/0xa0 [ 1851.157242] ? __rtnl_newlink+0x16c0/0x16c0 [ 1851.161561] rtnetlink_rcv_msg+0x465/0xb00 [ 1851.165801] ? rtnetlink_put_metrics+0x560/0x560 [ 1851.170560] ? __lockdep_free_key_range+0x120/0x120 [ 1851.175579] ? netdev_pick_tx+0x300/0x300 [ 1851.179726] ? netlink_deliver_tap+0x22d/0xbf0 [ 1851.184296] ? find_held_lock+0x35/0x130 [ 1851.188365] netlink_rcv_skb+0x17a/0x460 [ 1851.192430] ? rtnetlink_put_metrics+0x560/0x560 [ 1851.197191] ? netlink_ack+0xb50/0xb50 [ 1851.201077] ? kasan_check_read+0x11/0x20 [ 1851.205231] ? netlink_deliver_tap+0x254/0xbf0 [ 1851.209824] rtnetlink_rcv+0x1d/0x30 [ 1851.213545] netlink_unicast+0x536/0x720 [ 1851.217616] ? netlink_attachskb+0x770/0x770 [ 1851.222027] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1851.227045] ? __check_object_size+0x3d/0x42f [ 1851.231551] netlink_sendmsg+0x8ae/0xd70 [ 1851.235628] ? netlink_unicast+0x720/0x720 [ 1851.239877] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1851.244755] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1851.249507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.255049] ? security_socket_sendmsg+0x93/0xc0 [ 1851.259810] ? netlink_unicast+0x720/0x720 [ 1851.264053] sock_sendmsg+0xdd/0x130 [ 1851.267785] ___sys_sendmsg+0x806/0x930 [ 1851.271761] ? copy_msghdr_from_user+0x430/0x430 [ 1851.276522] ? lock_downgrade+0x880/0x880 [ 1851.280677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.286224] ? kasan_check_read+0x11/0x20 [ 1851.290374] ? __fget+0x367/0x540 [ 1851.293817] ? ksys_dup3+0x3e0/0x3e0 [ 1851.297531] ? lock_downgrade+0x880/0x880 [ 1851.301684] ? __fget_light+0x1a9/0x230 [ 1851.305662] ? __fdget+0x1b/0x20 [ 1851.309040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1851.314579] __sys_sendmsg+0x105/0x1d0 [ 1851.318466] ? __ia32_sys_shutdown+0x80/0x80 [ 1851.322883] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1851.328426] ? fput+0x128/0x1a0 [ 1851.331715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1851.336471] ? do_fast_syscall_32+0xd1/0xc98 [ 1851.340894] ? entry_SYSENTER_compat+0x70/0x7f [ 1851.345489] ? do_fast_syscall_32+0xd1/0xc98 [ 1851.349924] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1851.354689] do_fast_syscall_32+0x281/0xc98 [ 1851.359017] entry_SYSENTER_compat+0x70/0x7f [ 1851.363430] RIP: 0023:0xf7f4e869 [ 1851.366811] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1851.385728] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1851.393441] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1851.400707] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1851.407982] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1851.415263] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1851.422533] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:33 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x116, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x100002000000d) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) fcntl$notify(r0, 0x402, 0x28) 08:21:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8100}, 0x0) 08:21:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:33 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4200, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000040)="a64cbec9b1f136d21b979ae123bb", &(0x7f0000000080)=""/103}, 0x18) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000340)={0x1, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f00000002c0)={0x9, r1, 0x1, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40086437, &(0x7f0000000300)={r2, 0x1}) syz_open_dev$sg(&(0x7f0000000400)='/dev/sg#\x00', 0x40000000000000, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) 08:21:33 executing program 3 (fault-call:1 fault-nth:37): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:33 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x2, &(0x7f0000000380)=[0x0, 0xffffffffffffffff]) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = add_key(&(0x7f0000000140)='id_legacy\x00', 0x0, &(0x7f0000000200)="29b91733d0fdc77ddefe4923413d4604705eae952a8f7b5bca6f33d36e4c63e4bf3744f35dbc6107127c2ccbd3a4e06b614f5141e5f44bca25125031f6e8b155b00e14b6248d7e8280bc0d53e34d8f5b73df65536941f5c3e661c4f882486b11429fb23f2aa2faa5b03eb75247571b5d1ab4939b1a292d10dfa54623d6d47744770ce6f37b79daf5051694d80c99ee3d533e0818130229bef2ed13a81897e6f72a704543", 0xa4, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl(r5, 0x1000008912, &(0x7f0000000000)) ioctl$sock_ifreq(r4, 0x89f1, 0x0) getegid() syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x800000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'bcsh0\x00', @ifru_names='veth1_to_bridge\x00'}) r6 = socket$inet(0xa, 0x801, 0x84) listen(r6, 0x8) geteuid() setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x16, &(0x7f0000000680)=ANY=[@ANYRES32=r3], 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}], 0x30) fcntl$notify(r0, 0x402, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000080)=0xffffffff, 0x3) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) 08:21:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x2, 0x0, @pic={0x10000, 0x9, 0x3, 0x5, 0x4, 0xda42, 0x6, 0x1, 0xffffffff, 0x40, 0x1, 0x8, 0x2, 0x9, 0x8, 0x10000}}) [ 1851.876435] FAULT_INJECTION: forcing a failure. [ 1851.876435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1851.888298] CPU: 1 PID: 22886 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1851.895146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.904501] Call Trace: [ 1851.907101] dump_stack+0x172/0x1f0 [ 1851.907126] should_fail.cold+0xa/0x15 [ 1851.907150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.919761] ? debug_smp_processor_id+0x3c/0x280 [ 1851.924534] ? perf_trace_lock+0xeb/0x510 [ 1851.928701] should_fail_alloc_page+0x50/0x60 [ 1851.933211] __alloc_pages_nodemask+0x1a1/0x710 [ 1851.937912] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1851.942947] ? find_held_lock+0x35/0x130 [ 1851.947035] ? kasan_check_write+0x14/0x20 [ 1851.951296] cache_grow_begin+0x9c/0x8c0 [ 1851.955376] ? kasan_check_read+0x11/0x20 [ 1851.959541] ? do_raw_spin_unlock+0x57/0x270 [ 1851.963980] ____cache_alloc_node+0x17c/0x1e0 [ 1851.968500] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1851.974061] kmem_cache_alloc+0x1e8/0x6f0 [ 1851.978226] ? kasan_check_write+0x14/0x20 [ 1851.982497] __kernfs_new_node+0xef/0x690 [ 1851.986667] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1851.991439] ? mutex_unlock+0xd/0x10 [ 1851.995171] ? kernfs_activate+0x192/0x1f0 [ 1851.999427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.004988] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1852.010019] ? map_id_range_down+0x1ee/0x370 [ 1852.014445] ? __put_user_ns+0x70/0x70 [ 1852.018356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:21:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x60002) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000040)={0x1, 0x0, 0x103, 0x2, {0x8, 0x6, 0x1ff, 0x80000001}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) [ 1852.023913] kernfs_new_node+0x99/0x130 [ 1852.027919] __kernfs_create_file+0x51/0x340 [ 1852.032350] sysfs_add_file_mode_ns+0x222/0x560 [ 1852.037041] sysfs_create_file_ns+0x13d/0x1d0 [ 1852.041550] ? acpi_unbind_one+0x4a0/0x4a0 [ 1852.045804] ? sysfs_add_file_mode_ns+0x560/0x560 [ 1852.050664] ? kasan_check_write+0x14/0x20 [ 1852.054943] ? dev_fwnode+0xd/0x40 [ 1852.054968] device_create_file+0xfa/0x1e0 [ 1852.062757] device_add+0x5cd/0x1870 [ 1852.066497] ? device_initialize+0x440/0x440 [ 1852.070923] ? get_device_parent.isra.0+0x570/0x570 08:21:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8847}, 0x0) [ 1852.075972] ? __init_waitqueue_head+0x36/0x90 08:21:33 executing program 3 (fault-call:1 fault-nth:38): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1852.075993] ? pm_runtime_init+0x364/0x420 [ 1852.076021] netdev_register_kobject+0x183/0x3b0 [ 1852.076046] register_netdevice+0x878/0xff0 [ 1852.076069] ? netdev_change_features+0xb0/0xb0 [ 1852.076100] bond_newlink+0x4b/0x90 [ 1852.076120] ? bond_changelink+0x1ac0/0x1ac0 [ 1852.076137] __rtnl_newlink+0x107b/0x16c0 [ 1852.076172] ? rtnl_link_unregister+0x250/0x250 08:21:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8848}, 0x0) [ 1852.076186] ? lock_downgrade+0x880/0x880 [ 1852.076202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.076232] ? is_bpf_text_address+0xd3/0x170 [ 1852.076249] ? kernel_text_address+0x73/0xf0 [ 1852.076265] ? __kernel_text_address+0xd/0x40 [ 1852.076284] ? unwind_get_return_address+0x61/0xa0 [ 1852.076302] ? __save_stack_trace+0x8a/0xf0 [ 1852.076336] ? save_stack+0xa9/0xd0 [ 1852.076353] ? save_stack+0x45/0xd0 [ 1852.076369] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1852.076383] ? kasan_kmalloc+0x9/0x10 [ 1852.076399] ? kmem_cache_alloc_trace+0x151/0x760 [ 1852.076414] ? rtnl_newlink+0x4b/0xa0 [ 1852.076429] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1852.076537] rtnl_newlink+0x69/0xa0 [ 1852.076555] ? __rtnl_newlink+0x16c0/0x16c0 [ 1852.076574] rtnetlink_rcv_msg+0x465/0xb00 [ 1852.076598] ? rtnetlink_put_metrics+0x560/0x560 [ 1852.076613] ? __lockdep_free_key_range+0x120/0x120 [ 1852.076631] ? netdev_pick_tx+0x300/0x300 [ 1852.076650] ? netlink_deliver_tap+0x22d/0xbf0 [ 1852.076667] ? find_held_lock+0x35/0x130 [ 1852.076690] netlink_rcv_skb+0x17a/0x460 [ 1852.076709] ? rtnetlink_put_metrics+0x560/0x560 [ 1852.076728] ? netlink_ack+0xb50/0xb50 [ 1852.076746] ? kasan_check_read+0x11/0x20 [ 1852.076767] ? netlink_deliver_tap+0x254/0xbf0 [ 1852.076794] rtnetlink_rcv+0x1d/0x30 [ 1852.076810] netlink_unicast+0x536/0x720 [ 1852.076833] ? netlink_attachskb+0x770/0x770 [ 1852.076849] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1852.076875] ? __check_object_size+0x3d/0x42f [ 1852.076900] netlink_sendmsg+0x8ae/0xd70 [ 1852.076926] ? netlink_unicast+0x720/0x720 [ 1852.076942] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1852.076963] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1852.076979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.076995] ? security_socket_sendmsg+0x93/0xc0 [ 1852.077012] ? netlink_unicast+0x720/0x720 [ 1852.077032] sock_sendmsg+0xdd/0x130 [ 1852.077053] ___sys_sendmsg+0x806/0x930 [ 1852.077075] ? copy_msghdr_from_user+0x430/0x430 [ 1852.077097] ? lock_downgrade+0x880/0x880 [ 1852.077112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.077131] ? kasan_check_read+0x11/0x20 [ 1852.077153] ? __fget+0x367/0x540 [ 1852.077175] ? ksys_dup3+0x3e0/0x3e0 [ 1852.077189] ? lock_downgrade+0x880/0x880 [ 1852.077216] ? __fget_light+0x1a9/0x230 [ 1852.077234] ? __fdget+0x1b/0x20 [ 1852.077249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.077270] __sys_sendmsg+0x105/0x1d0 [ 1852.077286] ? __ia32_sys_shutdown+0x80/0x80 [ 1852.077302] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1852.077319] ? fput+0x128/0x1a0 [ 1852.077348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1852.077365] ? do_fast_syscall_32+0xd1/0xc98 [ 1852.077381] ? entry_SYSENTER_compat+0x70/0x7f [ 1852.077396] ? do_fast_syscall_32+0xd1/0xc98 [ 1852.077422] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1852.077442] do_fast_syscall_32+0x281/0xc98 [ 1852.077471] entry_SYSENTER_compat+0x70/0x7f [ 1852.077485] RIP: 0023:0xf7f4e869 [ 1852.077501] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1852.077510] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1852.077526] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1852.077536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1852.077545] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1852.077554] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1852.077564] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1852.270018] IPVS: ftp: loaded support on port[0] = 21 [ 1852.364552] FAULT_INJECTION: forcing a failure. [ 1852.364552] name failslab, interval 1, probability 0, space 0, times 0 [ 1852.364570] CPU: 1 PID: 22916 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1852.364581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.364588] Call Trace: [ 1852.364613] dump_stack+0x172/0x1f0 [ 1852.364638] should_fail.cold+0xa/0x15 [ 1852.364661] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1852.364685] ? ___might_sleep+0x163/0x280 [ 1852.364711] __should_failslab+0x121/0x190 [ 1852.364736] should_failslab+0x9/0x14 [ 1852.364756] kmem_cache_alloc+0x2b2/0x6f0 [ 1852.364784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.364811] __kernfs_new_node+0xef/0x690 [ 1852.364829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.364853] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1852.364885] ? __lockdep_free_key_range+0x120/0x120 [ 1852.364912] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1852.364932] ? find_held_lock+0x35/0x130 [ 1852.364957] ? sysfs_do_create_link_sd.isra.0+0x82/0x140 [ 1852.364982] ? kasan_check_write+0x14/0x20 [ 1852.365006] kernfs_new_node+0x99/0x130 [ 1852.365032] kernfs_create_link+0xdd/0x250 [ 1852.365059] sysfs_do_create_link_sd.isra.0+0x90/0x140 [ 1852.365082] sysfs_create_link+0x65/0xc0 [ 1852.365109] device_add+0x663/0x1870 [ 1852.365136] ? get_device_parent.isra.0+0x570/0x570 [ 1852.365153] ? __init_waitqueue_head+0x36/0x90 [ 1852.365173] ? pm_runtime_init+0x364/0x420 [ 1852.365202] netdev_register_kobject+0x183/0x3b0 [ 1852.365229] register_netdevice+0x878/0xff0 [ 1852.365256] ? netdev_change_features+0xb0/0xb0 [ 1852.365289] bond_newlink+0x4b/0x90 [ 1852.365309] ? bond_changelink+0x1ac0/0x1ac0 [ 1852.365328] __rtnl_newlink+0x107b/0x16c0 [ 1852.365363] ? rtnl_link_unregister+0x250/0x250 [ 1852.365378] ? lock_downgrade+0x880/0x880 [ 1852.365395] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.365427] ? is_bpf_text_address+0xd3/0x170 [ 1852.365444] ? kernel_text_address+0x73/0xf0 [ 1852.365470] ? __kernel_text_address+0xd/0x40 [ 1852.365491] ? unwind_get_return_address+0x61/0xa0 [ 1852.365510] ? __save_stack_trace+0x8a/0xf0 [ 1852.365547] ? save_stack+0xa9/0xd0 [ 1852.365566] ? save_stack+0x45/0xd0 [ 1852.365583] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1852.365598] ? kasan_kmalloc+0x9/0x10 [ 1852.365613] ? kmem_cache_alloc_trace+0x151/0x760 [ 1852.365629] ? rtnl_newlink+0x4b/0xa0 [ 1852.365645] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1852.365744] rtnl_newlink+0x69/0xa0 [ 1852.365766] ? __rtnl_newlink+0x16c0/0x16c0 [ 1852.365787] rtnetlink_rcv_msg+0x465/0xb00 [ 1852.365811] ? rtnetlink_put_metrics+0x560/0x560 [ 1852.365827] ? __lockdep_free_key_range+0x120/0x120 [ 1852.365843] ? netdev_pick_tx+0x300/0x300 [ 1852.365878] ? netlink_deliver_tap+0x22d/0xbf0 [ 1852.365900] ? find_held_lock+0x35/0x130 [ 1852.365927] netlink_rcv_skb+0x17a/0x460 [ 1852.365953] ? rtnetlink_put_metrics+0x560/0x560 [ 1852.365977] ? netlink_ack+0xb50/0xb50 [ 1852.365998] ? kasan_check_read+0x11/0x20 [ 1852.366023] ? netlink_deliver_tap+0x254/0xbf0 [ 1852.366052] rtnetlink_rcv+0x1d/0x30 [ 1852.366071] netlink_unicast+0x536/0x720 [ 1852.366104] ? netlink_attachskb+0x770/0x770 [ 1852.366124] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1852.366142] ? __check_object_size+0x3d/0x42f [ 1852.366169] netlink_sendmsg+0x8ae/0xd70 [ 1852.366198] ? netlink_unicast+0x720/0x720 [ 1852.366215] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1852.366238] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1852.366254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.366270] ? security_socket_sendmsg+0x93/0xc0 [ 1852.366287] ? netlink_unicast+0x720/0x720 [ 1852.366308] sock_sendmsg+0xdd/0x130 [ 1852.366329] ___sys_sendmsg+0x806/0x930 [ 1852.366352] ? copy_msghdr_from_user+0x430/0x430 [ 1852.366375] ? lock_downgrade+0x880/0x880 [ 1852.366389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.366413] ? kasan_check_read+0x11/0x20 [ 1852.366439] ? __fget+0x367/0x540 [ 1852.366473] ? ksys_dup3+0x3e0/0x3e0 [ 1852.366490] ? lock_downgrade+0x880/0x880 [ 1852.366521] ? __fget_light+0x1a9/0x230 [ 1852.366553] ? __fdget+0x1b/0x20 [ 1852.366568] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1852.366594] __sys_sendmsg+0x105/0x1d0 [ 1852.366611] ? __ia32_sys_shutdown+0x80/0x80 [ 1852.366629] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1852.366646] ? fput+0x128/0x1a0 [ 1852.366675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1852.366692] ? do_fast_syscall_32+0xd1/0xc98 [ 1852.366710] ? entry_SYSENTER_compat+0x70/0x7f [ 1852.366727] ? do_fast_syscall_32+0xd1/0xc98 [ 1852.366756] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1852.366777] do_fast_syscall_32+0x281/0xc98 [ 1852.366803] entry_SYSENTER_compat+0x70/0x7f [ 1852.366816] RIP: 0023:0xf7f4e869 [ 1852.366835] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1852.366845] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1852.366874] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1852.366885] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1852.366895] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1852.366906] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1852.366917] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1852.371050] bond31 (uninitialized): Released all slaves [ 1853.043466] IPVS: ftp: loaded support on port[0] = 21 08:21:34 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x117, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:34 executing program 3 (fault-call:1 fault-nth:39): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8864}, 0x0) 08:21:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x28) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) r4 = geteuid() fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000780)=0xe8) getgroups(0x2, &(0x7f00000007c0)=[0xee00, 0x0]) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f00000008c0)={@hyper}) sendmsg$unix(r2, &(0x7f0000000880)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000080)="1156ac58b5c49b35de423057cf09dde0de8041", 0x13}, {&(0x7f0000000280)="d8797c85cd472e1965f599f78909b34d754333cd6908387e29d76f38925d9a9f8d74cc3f59ca32307910b6a01d573d5cda5ec7a43143160217a2cac5a39c3fbd1f1e09c012804eb788fbe3a2155049914fbfdb97523afa3f7ef62b673c867c84ee", 0x61}, {&(0x7f0000000300)="e8ba59a358625938786a73f81b022891bfca2c2aa9f723295c25868e5bc63a60da36f11042d16808b4f156dfc566e185b80e1215b66b3f42bacb875b691fdc21faa3cf3e7b5ab2aa0df252ec614e4b0df637ca0bc05e4946362e329379ea2ad8ff00a5674bc943c946dc38cb44bbc37bda27f95a76e8390794eea79512669903bcf1ff1108896a258e0be47fd8e5a134bb30ef88f06f462ab6d312f3f702788f22f0a96226738711310003e617fa871c6bafcc86ea57", 0xb6}, {&(0x7f00000003c0)="6d33c102f9b0f355821571a1bca0843b7e00e57f2f3b6aa4a7926311e52a63639e8aa8eb5e24c62611ef5c42e1a9efe8dfa5f056733398b3b0230c3a0cde312a7217626777b4037776c1dbcb887baedb992e134671469923cbec76b26c389071a917dd148f1f7e54b11f86b6dc0775cb29bcb1c485e156307aa6f94e71806e1b8f905ad27f285e0158be9064bff2e02606b1af3372b05c976a75c45a5a8a9f1a629e60cf6d24aa14a72ac46cc8cd656b2294b5281b04948bf56d5005d1c3be0b3d2c226ce473ed7077c29fb97cf3cedca40de881c6fca63bf0ed366ba9596ed511f4977d156487f6fe3b09d5cd864141c449efd5abae", 0xf6}, {&(0x7f00000000c0)="5c17b66e078a9fcfb38d05ee58293b06f068b89b5a963340", 0x18}, {&(0x7f00000004c0)="8d2f9885e7c894df151c0150a1b116bbe52072fdbbae7677233cd6bb186226dec9a0541ef61bcd3d2061eb0d6e417e6ad2f901dfe2ca8802d404673bdec08da59b45", 0x42}], 0x6, &(0x7f0000000800)=[@cred={0x18, 0x1, 0x2, r3, r4, r5}, @cred={0x18, 0x1, 0x2, r6, r8, r9}, @rights={0x18, 0x1, 0x1, [r1, r1, r1]}], 0x48, 0x20008000}, 0x20000000) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000900)={r7, 0x1, 0x6, @random="2f68911e5467"}, 0x10) socket$key(0xf, 0x3, 0x2) [ 1853.655977] FAULT_INJECTION: forcing a failure. [ 1853.655977] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1853.667833] CPU: 1 PID: 22942 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1853.674697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1853.684065] Call Trace: [ 1853.686679] dump_stack+0x172/0x1f0 [ 1853.690330] should_fail.cold+0xa/0x15 [ 1853.694235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1853.699354] ? debug_smp_processor_id+0x3c/0x280 [ 1853.704131] ? perf_trace_lock+0xeb/0x510 [ 1853.708289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.713847] should_fail_alloc_page+0x50/0x60 [ 1853.718364] __alloc_pages_nodemask+0x1a1/0x710 [ 1853.723055] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1853.728086] ? find_held_lock+0x35/0x130 [ 1853.732172] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1853.737300] cache_grow_begin+0x9c/0x8c0 [ 1853.741374] ? __kernfs_new_node+0xef/0x690 [ 1853.745707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.751266] kmem_cache_alloc+0x62d/0x6f0 [ 1853.755428] ? kasan_check_write+0x14/0x20 [ 1853.759686] __kernfs_new_node+0xef/0x690 [ 1853.763849] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1853.768802] ? mutex_unlock+0xd/0x10 [ 1853.772527] ? kernfs_activate+0x192/0x1f0 [ 1853.776771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.782313] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1853.787338] ? map_id_range_down+0x1ee/0x370 [ 1853.791758] ? __put_user_ns+0x70/0x70 [ 1853.795650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.801205] kernfs_new_node+0x99/0x130 [ 1853.805198] __kernfs_create_file+0x51/0x340 [ 1853.809704] sysfs_add_file_mode_ns+0x222/0x560 [ 1853.814394] sysfs_create_file_ns+0x13d/0x1d0 [ 1853.818906] ? acpi_unbind_one+0x4a0/0x4a0 [ 1853.823153] ? sysfs_add_file_mode_ns+0x560/0x560 [ 1853.828004] ? kasan_check_write+0x14/0x20 [ 1853.832250] ? dev_fwnode+0xd/0x40 [ 1853.835813] device_create_file+0xfa/0x1e0 [ 1853.840064] device_add+0x5cd/0x1870 [ 1853.843788] ? device_initialize+0x440/0x440 [ 1853.848207] ? get_device_parent.isra.0+0x570/0x570 [ 1853.853234] ? __init_waitqueue_head+0x36/0x90 [ 1853.857828] ? pm_runtime_init+0x364/0x420 [ 1853.862094] netdev_register_kobject+0x183/0x3b0 [ 1853.866876] register_netdevice+0x878/0xff0 [ 1853.871215] ? netdev_change_features+0xb0/0xb0 [ 1853.875920] bond_newlink+0x4b/0x90 [ 1853.879560] ? bond_changelink+0x1ac0/0x1ac0 [ 1853.883981] __rtnl_newlink+0x107b/0x16c0 [ 1853.888156] ? rtnl_link_unregister+0x250/0x250 [ 1853.892832] ? lock_downgrade+0x880/0x880 [ 1853.897000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.902562] ? is_bpf_text_address+0xd3/0x170 [ 1853.907068] ? kernel_text_address+0x73/0xf0 [ 1853.911487] ? __kernel_text_address+0xd/0x40 [ 1853.915994] ? unwind_get_return_address+0x61/0xa0 [ 1853.920933] ? __save_stack_trace+0x8a/0xf0 [ 1853.925282] ? save_stack+0xa9/0xd0 [ 1853.928918] ? save_stack+0x45/0xd0 [ 1853.932556] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1853.937665] ? kasan_kmalloc+0x9/0x10 [ 1853.941480] ? kmem_cache_alloc_trace+0x151/0x760 [ 1853.946335] ? rtnl_newlink+0x4b/0xa0 [ 1853.950140] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1853.954646] rtnl_newlink+0x69/0xa0 [ 1853.958283] ? __rtnl_newlink+0x16c0/0x16c0 [ 1853.962618] rtnetlink_rcv_msg+0x465/0xb00 [ 1853.966878] ? rtnetlink_put_metrics+0x560/0x560 [ 1853.971670] ? __lockdep_free_key_range+0x120/0x120 [ 1853.976701] ? netdev_pick_tx+0x300/0x300 [ 1853.980871] ? netlink_deliver_tap+0x22d/0xbf0 [ 1853.985470] ? find_held_lock+0x35/0x130 [ 1853.989553] netlink_rcv_skb+0x17a/0x460 [ 1853.993636] ? rtnetlink_put_metrics+0x560/0x560 [ 1853.998403] ? netlink_ack+0xb50/0xb50 [ 1854.002299] ? kasan_check_read+0x11/0x20 [ 1854.006473] ? netlink_deliver_tap+0x254/0xbf0 [ 1854.011076] rtnetlink_rcv+0x1d/0x30 [ 1854.014802] netlink_unicast+0x536/0x720 [ 1854.018891] ? netlink_attachskb+0x770/0x770 [ 1854.023322] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1854.028361] ? __check_object_size+0x3d/0x42f [ 1854.032889] netlink_sendmsg+0x8ae/0xd70 [ 1854.036975] ? netlink_unicast+0x720/0x720 [ 1854.041322] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1854.046177] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1854.050946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1854.056497] ? security_socket_sendmsg+0x93/0xc0 [ 1854.061268] ? netlink_unicast+0x720/0x720 [ 1854.065517] sock_sendmsg+0xdd/0x130 [ 1854.069242] ___sys_sendmsg+0x806/0x930 [ 1854.073232] ? copy_msghdr_from_user+0x430/0x430 [ 1854.078003] ? lock_downgrade+0x880/0x880 [ 1854.082162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1854.087712] ? kasan_check_read+0x11/0x20 [ 1854.091885] ? __fget+0x367/0x540 [ 1854.095359] ? ksys_dup3+0x3e0/0x3e0 [ 1854.099082] ? lock_downgrade+0x880/0x880 [ 1854.103252] ? __fget_light+0x1a9/0x230 [ 1854.107235] ? __fdget+0x1b/0x20 [ 1854.110610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1854.116166] __sys_sendmsg+0x105/0x1d0 [ 1854.120062] ? __ia32_sys_shutdown+0x80/0x80 [ 1854.124487] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1854.130034] ? fput+0x128/0x1a0 [ 1854.133334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1854.138100] ? do_fast_syscall_32+0xd1/0xc98 [ 1854.142513] ? entry_SYSENTER_compat+0x70/0x7f [ 1854.147102] ? do_fast_syscall_32+0xd1/0xc98 [ 1854.151533] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1854.156304] do_fast_syscall_32+0x281/0xc98 [ 1854.160644] entry_SYSENTER_compat+0x70/0x7f [ 1854.165062] RIP: 0023:0xf7f4e869 [ 1854.168436] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1854.187357] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1854.195213] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1854.202498] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1854.209772] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1854.217050] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1854.224326] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r0, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) [ 1855.095348] net_ratelimit: 23 callbacks suppressed [ 1855.095357] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.105504] protocol 88fb is buggy, dev hsr_slave_1 08:21:37 executing program 1: unshare(0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:37 executing program 3 (fault-call:1 fault-nth:40): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8906}, 0x0) 08:21:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:37 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x118, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:37 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x3) [ 1856.295290] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.300447] protocol 88fb is buggy, dev hsr_slave_1 08:21:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:37 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) fcntl$notify(r0, 0x402, 0x10) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{}]}) 08:21:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/236, 0xec}], 0x1}, 0x80}, {{&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/213, 0xd5}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2}, 0x100000000000}, {{&(0x7f0000001500)=@generic, 0x80, &(0x7f0000002580)=[{&(0x7f0000001580)=""/4096, 0x1000}], 0x1, &(0x7f00000025c0)=""/246, 0xf6}, 0x2}, {{&(0x7f00000026c0)=@rc, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002740)=""/95, 0x5f}], 0x1}, 0x9}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/138, 0x8a}, {&(0x7f00000028c0)=""/61, 0x3d}, {&(0x7f0000002900)=""/102, 0x66}, {&(0x7f0000002980)=""/250, 0x2a}], 0x4, &(0x7f0000002ac0)=""/211, 0xd3}, 0x5}], 0x5, 0x40002101, &(0x7f0000002c80)={0x0, 0x1c9c380}) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000002cc0)='trusted.overlay.origin\x00', &(0x7f0000002d00)='y\x00', 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000002d40)='/dev/video35\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) setsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000002d80)="f071b1ac6b84ba12f139fcd9e6b44b1433e9b8ba7f60bfcf89c31cbd6ec9fe88cdc30b733601ea8577c435847fe0052880dede940fa3e7ba8579a5b8438a93fb07dcbbb7daa913d419e443c0809291c358bf2f82ccdc77bc657b78b810bc01cd9f9f60e510dadef5196c6dff8eb7f2bde206d6d01ddca1df0fb0484fd2629f9e5a47d11a2a6ba115215039ebf83bbc3be251b6ee148268b600abc455109c3f23179d0d367a11f66d302f88878888569935bbf0b4c0507c7f04167abe", 0xbc) [ 1856.570459] FAULT_INJECTION: forcing a failure. [ 1856.570459] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.609842] CPU: 0 PID: 22971 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 1856.616747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1856.626114] Call Trace: [ 1856.628723] dump_stack+0x172/0x1f0 [ 1856.632381] should_fail.cold+0xa/0x15 [ 1856.636299] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1856.641434] ? ___might_sleep+0x163/0x280 [ 1856.645607] __should_failslab+0x121/0x190 [ 1856.649870] should_failslab+0x9/0x14 [ 1856.653689] kmem_cache_alloc+0x2b2/0x6f0 [ 1856.657850] ? memcpy+0x46/0x50 [ 1856.661156] ? kstrdup+0x5a/0x70 [ 1856.664545] __kernfs_new_node+0xef/0x690 [ 1856.668716] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1856.673488] ? map_id_range_down+0x1ee/0x370 [ 1856.677917] ? __put_user_ns+0x70/0x70 [ 1856.681831] ? tick_nohz_tick_stopped+0x1a/0x90 [ 1856.686531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.692096] ? make_kgid+0x23/0x30 [ 1856.695673] kernfs_new_node+0x99/0x130 [ 1856.699677] kernfs_create_dir_ns+0x52/0x160 [ 1856.704109] sysfs_create_dir_ns+0x131/0x2a0 [ 1856.708538] ? sysfs_create_mount_point+0xa0/0xa0 [ 1856.713401] ? net_namespace+0xd/0x40 [ 1856.717304] ? device_namespace+0x9d/0xd0 [ 1856.721471] kobject_add_internal.cold+0xe5/0x5d4 [ 1856.726338] kobject_add+0x150/0x1c0 [ 1856.730066] ? kset_create_and_add+0x1a0/0x1a0 [ 1856.734672] ? kasan_check_read+0x11/0x20 [ 1856.738842] ? mutex_unlock+0xd/0x10 [ 1856.742582] device_add+0x3d5/0x1870 [ 1856.746308] ? device_initialize+0x440/0x440 [ 1856.750736] ? get_device_parent.isra.0+0x570/0x570 [ 1856.755766] ? __init_waitqueue_head+0x36/0x90 [ 1856.760366] ? pm_runtime_init+0x364/0x420 [ 1856.764621] netdev_register_kobject+0x183/0x3b0 [ 1856.769404] register_netdevice+0x878/0xff0 [ 1856.773752] ? netdev_change_features+0xb0/0xb0 [ 1856.778453] bond_newlink+0x4b/0x90 [ 1856.782096] ? bond_changelink+0x1ac0/0x1ac0 [ 1856.786520] __rtnl_newlink+0x107b/0x16c0 [ 1856.790700] ? rtnl_link_unregister+0x250/0x250 [ 1856.795381] ? lock_downgrade+0x880/0x880 [ 1856.799542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.805114] ? is_bpf_text_address+0xd3/0x170 [ 1856.809627] ? kernel_text_address+0x73/0xf0 [ 1856.814057] ? __kernel_text_address+0xd/0x40 [ 1856.818573] ? unwind_get_return_address+0x61/0xa0 [ 1856.823521] ? __save_stack_trace+0x8a/0xf0 [ 1856.827881] ? save_stack+0xa9/0xd0 [ 1856.831525] ? save_stack+0x45/0xd0 [ 1856.835164] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1856.840274] ? kasan_kmalloc+0x9/0x10 [ 1856.844082] ? kmem_cache_alloc_trace+0x151/0x760 [ 1856.848933] ? rtnl_newlink+0x4b/0xa0 [ 1856.848950] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1856.849053] rtnl_newlink+0x69/0xa0 [ 1856.857230] ? __rtnl_newlink+0x16c0/0x16c0 [ 1856.857249] rtnetlink_rcv_msg+0x465/0xb00 [ 1856.857273] ? rtnetlink_put_metrics+0x560/0x560 [ 1856.857290] ? __lockdep_free_key_range+0x120/0x120 [ 1856.857307] ? netdev_pick_tx+0x300/0x300 [ 1856.857325] ? netlink_deliver_tap+0x22d/0xbf0 [ 1856.857340] ? find_held_lock+0x35/0x130 [ 1856.857362] netlink_rcv_skb+0x17a/0x460 [ 1856.857380] ? rtnetlink_put_metrics+0x560/0x560 [ 1856.901006] ? netlink_ack+0xb50/0xb50 [ 1856.905001] ? kasan_check_read+0x11/0x20 [ 1856.909235] ? netlink_deliver_tap+0x254/0xbf0 [ 1856.913942] rtnetlink_rcv+0x1d/0x30 [ 1856.917735] netlink_unicast+0x536/0x720 08:21:38 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0xa, 0x5, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000400)={0x0, 0x8001}, &(0x7f0000000440)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000940)={r3, @in6={{0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}}, 0x375) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0)={0x3f}, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x80000010) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000340)=r4) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r4, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) write$P9_RSTATu(r4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7], 0x1b8) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0485510, &(0x7f0000000280)={0x3, 0x4, 0xb500, 0x8, &(0x7f0000000000)=[{}, {}, {}, {}]}) ioctl$RTC_UIE_OFF(r4, 0x7004) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x3fffff, 0x0) 08:21:38 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) fcntl$notify(r0, 0x402, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000440)={@loopback, r2}, 0x14) [ 1856.921872] ? netlink_attachskb+0x770/0x770 [ 1856.926307] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1856.931341] ? __check_object_size+0x3d/0x42f [ 1856.935877] netlink_sendmsg+0x8ae/0xd70 [ 1856.940000] ? netlink_unicast+0x720/0x720 [ 1856.944253] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1856.949105] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1856.953858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.959414] ? security_socket_sendmsg+0x93/0xc0 [ 1856.964174] ? netlink_unicast+0x720/0x720 [ 1856.968414] sock_sendmsg+0xdd/0x130 [ 1856.972141] ___sys_sendmsg+0x806/0x930 [ 1856.976124] ? copy_msghdr_from_user+0x430/0x430 [ 1856.980881] ? lock_downgrade+0x880/0x880 [ 1856.985031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.990577] ? kasan_check_read+0x11/0x20 [ 1856.994719] ? __fget+0x367/0x540 [ 1856.998184] ? ksys_dup3+0x3e0/0x3e0 [ 1857.001900] ? lock_downgrade+0x880/0x880 [ 1857.006063] ? __fget_light+0x1a9/0x230 [ 1857.010044] ? __fdget+0x1b/0x20 [ 1857.013399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1857.018948] __sys_sendmsg+0x105/0x1d0 [ 1857.022844] ? __ia32_sys_shutdown+0x80/0x80 [ 1857.027251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1857.032790] ? fput+0x128/0x1a0 [ 1857.036081] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1857.040837] ? do_fast_syscall_32+0xd1/0xc98 [ 1857.045259] ? entry_SYSENTER_compat+0x70/0x7f [ 1857.049829] ? do_fast_syscall_32+0xd1/0xc98 [ 1857.054245] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1857.058999] do_fast_syscall_32+0x281/0xc98 [ 1857.063330] entry_SYSENTER_compat+0x70/0x7f [ 1857.067727] RIP: 0023:0xf7f4e869 [ 1857.071088] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1857.089985] RSP: 002b:00000000f5d4a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1857.097691] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1857.104956] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1857.112232] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1857.119552] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1857.126820] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1857.134364] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.139516] protocol 88fb is buggy, dev hsr_slave_1 [ 1857.144690] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.149880] protocol 88fb is buggy, dev hsr_slave_1 [ 1857.155111] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.160266] protocol 88fb is buggy, dev hsr_slave_1 08:21:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1857.167161] kobject_add_internal failed for bond32 (error: -12 parent: net) [ 1857.174300] bond32 (uninitialized): Released all slaves 08:21:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf000}, 0x0) 08:21:38 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2000000003, 0x400100) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x2, @rand_addr=0x9}}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) creat(&(0x7f0000000080)='./file0\x00', 0x20) fcntl$notify(r1, 0x402, 0x28) 08:21:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x119, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x34000}, 0x0) 08:21:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x448801, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94g=\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xc2\xef\xe8w\xd3\xbd@\a\xb5_\x10q\x91\xf5\xa4\xe2Y\xbc_\x8b\xa9\x96\xdc\xf3S\x1eg\xa5\xa8\x85\x84UG\xe8\xb4]6\x8c\xde\x12\xa3\xf1Z\xe4\x93\b\xcb\xb6\xa7%\xcc\xd8\v\xe0N\x83\xcf\xdf\x198\xbbW\xb3h\xc2\xba\xa4\xd1\xe5\xda]8\x80+o\x01\x0f\xb5\x97\xe3\x8a\x84J\x87\\J\xc0\n\xe8\x95\xb6\xaa\xfc\x97\xe6$\xb2\x03j_\xcc\te\x13\xf4(p\xd3\x12\xb6n\xbf\xe2\xa1x\x9a|', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000580)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x2e4, r1, 0x102, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x52}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000000}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x0, @empty, 0x77f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd4d}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3, @mcast1, 0x8000}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}]}, 0x2e4}}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) fcntl$notify(r2, 0x402, 0x28) 08:21:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x40000}, 0x0) 08:21:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:39 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11a, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:39 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0xe201, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0245629, &(0x7f0000000340)={0x0, 0x8, 0x40, [], &(0x7f0000000300)=0xf549}) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x840) fcntl$notify(r1, 0x402, 0x10) 08:21:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x400300}, 0x0) 08:21:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) write$binfmt_aout(r0, &(0x7f0000000280)={{0x10b, 0x8, 0x8001, 0x65, 0x36e, 0xfffffffffffffffe, 0x270, 0x4cd}, "d38982b860c0432861362f6aa90f1f95b5dda7995f1036134480d0237c19ba59d5d4aefbcd7607b435d26f29539d6a2c8323e7b77c8a6a2ee2d5896f273f", [[], [], [], [], [], [], []]}, 0x75e) 08:21:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) signalfd(r0, &(0x7f0000000000), 0x8) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000280)="5f19cf55765d5a0b28f4da9e67f6fb68edfcf3dc4bb7e7974bac7161fbdfc1013fde859780e7580825a56989fa0552f88dac12648f186f21e1f2555657f2a564d11b89f23240b0eabb9971c6a62485a3d5d10ef247a728cf7f9da65faad13260c6605a6ef6ff590cd1ede51a41d35214fce891444a9a2e1d730fa6c2d534ef70d585a224f68df106304e6483f9d337d26d22d3dc44d9fccfa98e8682bd186a6f54b5a8aa3259bdcb4d184cdd7f406bf3f956a270c118b917e4b6ac064bf9c83a1017b9d9facaa1efd2e56b25ec7cea4c65942aa9974f9c8cdd316cb7d976afcc52", 0xe1) 08:21:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf0ffff}, 0x0) 08:21:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101800, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x1000000}, 0x0) 08:21:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:40 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11b, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x2000000}, 0x0) 08:21:40 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) setgid(r1) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@K\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xb4~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d{z\xb7VWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xcc \'iRtd\xf0/\xd2\xf0M3\'g\xa7Y7x\xf0\xfc\x04f\xd8\xef\xb7EO\\\xfc\xc7\xfe\x86\xe1L}\t\x97\x00\x94\x9f\f\xed\xfd&;#\xe6\x18\x96UlV\x13\x00\xf9\x98k\x97F\xc3\xa2\x88\x7ffb\xb6\xf7\xf4\x12-(dv|\x01\xbf\xd4\xdc>\xb3\xcc\xf0m\x9a\xaf\xfd\xa4\x04\x9c\xbe\xb23g\x95\x86\xda\x88k\x84A1\xf4\x96', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x10) fcntl$notify(r2, 0x402, 0x28) 08:21:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:40 executing program 2: socket$inet(0x2, 0x800, 0x1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x3000000}, 0x0) 08:21:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x701100, 0x8) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x80000005) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x991fa5c1d6ed182c, 0x0) 08:21:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:41 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000300)=0x6) r1 = gettid() perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x20) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000340)={'hwsim0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}}) 08:21:41 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11c, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:41 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x400, 0x10000) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000080)=0x9) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:41 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x4100, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000300)=0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) prctl$PR_SET_PDEATHSIG(0x1, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="c2acc45f56cd1de9398fac7a0c260ad7d4905b81d2f52c4116ddb1778c5c5211266c3504edf1cb6505143c1e4cd31a33035fc779234643e7458ceeb60c1acc0f01a320ca8cc633d5387dca6ff571781c995a3ea45bd08706c01dc8919babd47f279ac2f431743fa8585f69080b226c8735b8eec8cded0da036c9c84eb2c352948f02a36e53a168924d7c093d5e05949fadb1b56d501ca016e7fa316baff31225d46614bbaed0e300f9b8d6", @ANYRES16=r2, @ANYBLOB="000126bd7000fddbdf250f0000002800010008000800f10c0000080004004e2300001400030000000000000000000000ffffe0000001"], 0x3c}, 0x1, 0x0, 0x0, 0x840}, 0x1) 08:21:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4000000}, 0x0) 08:21:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffc60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) [ 1860.455342] net_ratelimit: 16 callbacks suppressed [ 1860.455350] protocol 88fb is buggy, dev hsr_slave_0 [ 1860.465459] protocol 88fb is buggy, dev hsr_slave_1 08:21:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x5000000}, 0x0) 08:21:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x6000000}, 0x0) 08:21:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x9, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:42 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11d, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x4001, @u64}]}, 0x20}}, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:42 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 08:21:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x7000000}, 0x0) 08:21:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1861.255337] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.260462] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.265633] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.270734] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.275938] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.281030] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.286224] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.291513] protocol 88fb is buggy, dev hsr_slave_1 08:21:42 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x0) connect$unix(r1, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000000380)={{0x3, @name="9098c2d18d6c4fd91861e305f26db476dc8c63df0825995385aa01d53beb1253"}, "618fc1eb69cdd32d321240cd9778539256ddf8b109e24b73b053a0e19c0eda85", 0x2}) fcntl$notify(r2, 0x402, 0x10) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000280)=""/230, &(0x7f00000000c0)=0xe6) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001c00)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002400)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000002500)=0xe8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000004600)=0x0) write$FUSE_STATFS(r2, &(0x7f0000004800)={0x60, 0xfffffffffffffffe, 0x4, {{0x10001, 0xb45e, 0xfffffffffffffffe, 0x101, 0x8, 0xabe, 0x7f, 0x3}}}, 0x60) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004640)={{{@in6=@ipv4={[], [], @initdev}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000004740)=0xe8) geteuid() r8 = getgid() sendmsg$netlink(r2, &(0x7f00000047c0)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfe, 0x32180082}, 0xc, &(0x7f00000045c0)=[{&(0x7f00000004c0)={0x1c, 0x34, 0x400, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x4}, @generic="9b12ffadcd"]}, 0x1c}, {&(0x7f00000006c0)={0x27c, 0x2d, 0x600, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x4, 0x4}, @nested={0x15c, 0x94, [@generic="d05fb70143d4413f996b43979357cfe1c73344c14d8e8723c357268767b468e95d9d288c53f0b77d54aa7c9b66128fd43383f0e1d00238b136", @typed={0x8, 0x60, @uid=r3}, @generic="491e5c87659f44244e9d3879944338a85027518be8aa9d94abf80cb897c3c2ef65551635b3a299b3f7cd15d2e8cc6b9d64fcd947f0213a58760c5f361b5642f1b2d367bce13afb79e3ad33661b238a038812f39378917a59737b12833f7a0251dffbb543dd019b24d72e42d1aadfe19139e14176b5b9971143406dd034d393934b28eaac4941825ab8b80760f1c0fa1c99925705728acd9bb6e811a3b808f1f59677cde8b923ca6009dbd55f5dc833e92e36ccc9d7d87e116d6e94f1e25581667403434be2069c9a587cfc5f6a24bc10fce23026728995c8ad519b2c3a2df024b2ecf13832c050726d9aa91c", @generic="c30ec8bd5b220f16e6f280948fa92e3c1f7e191a97b4e8202760cae2c0c93ba6039d9e56a56eae40"]}, @generic="60923e0257c25f775b5ae7c9caca4de6cd9d5159944f5cb52f2e9797a88c21ac44f25e4cab74c2fe4f5ef2f2f77544895f83cae8b7d1b39e3c35900f6c0eb9b044abbaae7968fb391cd5deec42cefa5417205dc55c888b6794681be43409e3ddf92503b898635e5bc78cdc7dd4229f833083fb48d5ef6eabb7138256ef2ba02d09c5e5e00ceec359f1b57b6b35cf8af3e4a3607dfa369dc088bf823ada2e161452e0087237a535327369c78fdd1a236d1b62c357d818b4757805a6a1fb6070442f14012854475cdee732be5451b50c63fd04e765fb183ed85380749126bdf42b90de02b4c72131d30bf62b", @generic="2ac6c2d3291471d4b2d6e9fc5ee82ce174ef51058320612e", @generic="40020cd6cccc"]}, 0x27c}, {&(0x7f0000000940)={0x12b8, 0x14, 0x100, 0x70bd2c, 0x25dfdbfb, "", [@generic="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", @nested={0x1bc, 0x0, [@generic="c148c103150e6a5d023d806debd67d0ea4cbff122cc2dd66add9fd63c9e1a58bc59dafabd7353021549759d8e0347c448df0cbb77550e7a51a5abcebf42b8f3f2821c95e4ec049f149e3bd37e4b497bfaf663964afd45a93ccabab3fc188f9e46ffc41d854f7807f417818cce7f2606ec07c1fdd7bd43c16f85427a6ab28cf5977e73600b705d2de8390882fc7b4608b12c063", @generic="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", @typed={0x8, 0x61, @u32=0xc5e4}, @generic="ff7cdbab9fa75389b226b8d3644a9b94296325edf652c81b3839722bdde7"]}, @generic="c7409708c8bf91f3e2d05f055f6515ef45b302aa413848ddc910146d6b22ad312780606a16af9c8041f2cf95665120b2130064fae2a6d4c53802be0a4ee3ae7d8ceeb89057806abffbadc1bdafa99d6c4357f3108cb806fd7f5c7c84f8c9944aecb72fabf176", @nested={0x74, 0x44, [@generic="b61afb1cf7cb91", @generic="d493075088a46b6c1e16f652111eaf5ae0312703b18044592a51", @generic="6de63cde2812d847e445e7522452d03c7f9227fe82d39a7d23553a9405bcf624a653d068fded90fad235693ec8cac228ea2500", @typed={0x8, 0x84, @str='\xc8\x00'}, @generic, @typed={0x14, 0x59, @ipv6=@empty}]}, @typed={0x8, 0x25, @fd=r2}, @typed={0x8, 0x6b, @fd=r1}]}, 0x12b8}, {&(0x7f0000001c40)={0x390, 0x31, 0x111, 0x70bd29, 0x25dfdbfc, "", [@nested={0x284, 0x80, [@generic="dcbd2c64c661f677629cd1be044b67333f0f77ff4d352bfe4f8a38d474c8649c3ffd8f01cdb0a8e183669ff9eddbffa3604b5cf1937c04204ae560413f382ee219eb3fcf42c74be62a2b712f83f14fc40cff39e7d94a8a4f15f463b6551fc9cd2074173658a619d26fe4c4a130b4615a45eb4c2d5361302c81a08317c6f71e35e07b559e6610d466e003bbc12d9b0946720944aacc40fbc24a91afea62e041807c0ef12d7de3bb9b62cb55961736d4819d4f08d5871dbdeec701fac46f52ec0447174f4a880c8245ef2c5a231e50a674b7", @typed={0x8, 0x4e, @ipv4=@multicast1}, @typed={0x158, 0x32, @str='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec'}, @typed={0x8, 0x53, @pid=r4}, @generic="9f022d9b4ba943ddb52a8706dc9b8588cc94465b8ee4e5372bac920b8cfff7acfa9d2f4f7849e92a2a1c6cbcb652786c7c90232e32df6060d2100ef773ac53fc971c37eb3d156c"]}, @typed={0x4, 0x49}, @typed={0x8, 0x74, @str='\x00'}, @generic="7dd3f599d1373ca6e4996dfe9380516ee5774938e06fc5f71655c370dc281b9441411960426aa9aad759f9c0cb8d3a4671e8944027d3c9c4e8f3a6d2d9aefdc8e3b6056369d5d5f69e5bd05552e1388ece4d60977361024b2c3d9ccc89ce06165c8ffed3531b3b436d5a9c16dad941a8b5393f299ae88bca1a3480c8c3c6d846738b3a7a74ca5ffb666fbc702991f8d0788646e3", @typed={0x14, 0x4a, @ipv6=@rand_addr="463c3448b1b970a3fa80e85c8b818112"}, @generic="5392026c2d4eaab9c7d0875722bd652009e182e3f1020f766e17ce2f048c525eb9e6d060d62a441aa6ce44c0642c54b35aa75cc3e8c5ab4ef89deb22ceb4a3ea82f47e2f9a1aeac6"]}, 0x390}, {&(0x7f0000002000)={0x3c8, 0x1d, 0x200, 0x70bd27, 0x25dfdbfb, "", [@generic="3767f51ad382b646c8e13d75a0f7d92a10d515f694e4a264bd34fe26aef8a3df210ccd73755302807ff6159110cf1ed1430831ef18a8c3049c50af2081ee70c4b9083758589b6ed4aea9baa865ffad80902bffbb77b6d4e920816f9d739adb3c99f1a039c6ea19ba7e394e9c9f8114848385f37450bafd44be1f96a0f628ba4d1f13f4d912f90354d428f707b1ed92d54aeaab0c6cc7da845087408e60e848ea564ff1d4ffcfa860a3dd8a79b0949ae522f3a5a8c9321df44435958246754b776c16114c0ba78316b4f2fd907f18ce85392a98ce549c88bb7f0e8e5027016bcf920732c1d1e13e352c385ce4c4a2f1a3e1fce10761dbd8ba", @nested={0x120, 0x2c, [@generic="2a008b4efafcaf8e3ea09f4bafd372abf6b0e92628421086aeee4cd663d2ad13ccd0e07a293a000ed4c51fec01af78c253d29cadb195edc0add7fb10b59cafc20e41953cd9f693b9efed03440b771dcfa1d34e4474a1d0fe286f89", @generic="40fd91161754c92c46f66d5ba6cad33811225b2a418e47fd37904553ee32814ed72b561d6719941535fcc67d0c2f58a2c227729076b5d67324444dba1ca45101089c6b9b2da08ccbaee9fcfe22c498f8a70d3ef842482ea7a5ad315c5eacfb3a193403ac92bea430fbf102e5740964e789d2518a7e91d8e850c0890c221a0fc2de0b89e53a74f0b188d0105df6511419fd211935d1389965aa8f7e6ac12a391f9f6d82e4b93c6381382eb69671ec69d4d590b9e4e75cafd126f4a8e56ee40b14"]}, @nested={0x194, 0x53, [@generic="38f9328650fd4ec55eaac455ead51a3d7727ce44f5edf07d9ba0452b3b51e7b09752739861d6145266c14ac877a2e8246b3a254a9f86e89c2f81e941c7d8527f5fbea35425a0f6d44b52f0da3e9a4c7cb39846ad6525dbaa37a3d90d07ae1796f76470667fee5bbab8c9b497236c8a361567b0fa5d95473f1f6f7fd823f2cd4b47a30d79be7155bbaf0f29", @generic="39981364d2be9126f9767c96cb4626c2b5e0e39f708bd331486ab155442723ac500587fd3dfa82d5a65ea789df9a3d535f570dc61c2fa6e50d35c2b57e117018fbb44643e819ccc979d8aec212163e2a648db4cfe2e8d18a7628efd2e6c7ad792d0388fdb5e07c13d098da5a3f513ec32e1e987cd9689d4f1ad066d33a380826a439926aba03688f327bfdba8e89f7db78fb3a592e3020cda7700dd2bf8454956f2181e090cec36162634d6271d806174133d43facd141506f0fc471916ff0b52529e331", @typed={0x8, 0x69, @ipv4=@multicast1}, @generic="7e6210080137c2895ccd9099bbdeaa274c94143375c1839793af5d6d861070cf428c847f9c31e38bb3c03f7d01937b76f707e30b0ad589a9"]}, @typed={0xc, 0x1ff, @u64=0x4}]}, 0x3c8}, {&(0x7f0000002540)={0x2068, 0x3a, 0x1, 0x70bd25, 0x25dfdbfe, "", [@nested={0x1004, 0x23, [@generic="13adc28d64680e6f3abf4d3eeaf557c40cc2075568c0479a881089efe816ec7d1c35cc20cdd8ca93ee37677086883106916171c3aa00db4be5492e5b5be4f1828a8ec0175c0a48661cf54dac67dc1d9d606a1463641e08629da2345af99bb30486e4d48e0bee3aea065c8a55b52088a749be121f896581eb86253fe83f722f92a9b5f9d4794c4497405d2215b8bbb46fbbde1ac2db3dd4ca42305f4da706f6f1b45d2aa1f9cceba38f417ac02c75098913e958dd77d4106e35db0967d7240684cd130d9c0206565413da349a5c08ab00a9d4fc75b695baf7211e9cb3f9db1af6669f2b9887d50aa211a74dd298f5893dab502ab35eaead78d8cee70d251df9b4516bcbb4f3d116b543b7a6b5878d2af0fdc2bcebccad2c48084e231ffd7c1c513b8858d29b8f83fc7b6bb0f97abc4734e8cd8a1147f1841b987635a56a095ed86438ea505de8543aa3f30f4a8a01caffb84d443f29cd23431a633936c534a596750e2d2779a3486cf052721743ca26292d75b6bb56b86868ed8f593f353134584023185270c828b00a1fa21950dcc249620f89330c8273e8d1d3c7dd18204be7eab999a94bd3194cc57c8a8e7dc7d39d62c230ea264d615ac410210a8eefd76cec614cc9b67eeb51a2091bb5391875769492859e0cf2bc7b7df60ca0517cff2b70a75b4e74669973309f81adbbfb13dc7fc26dbb3143b4b4ca5e3b61050db70dd43e008721e5bf1d471a5a6b8dc14fdd40052c0b32f465912c3abf8ac09162b39a829e130c7752974c749a9915173784d8fa02262e270933e5dd9d26955dace096e795155234923c9bf5a0f509d71caa339a53987445e0c33e4b01de032543ddad7adaa9a7373c5e0368a1232c1df8b2597c6396e7c13ed17c79415b2d2f48435efa958493214c56a055ffe0c86737c6b9b1e7c3534c140ef9387afdfe425f4dd82226e53e55e98fde1f7f2fb936beab52ff1cfec85335b6effad6832a30cb5a8137503bd8613868b74e66d62b1696202bfe80d52f37697277e1f15a2868aa1e2b8d66ffeb5189fdd8a00bc45c06ebba0a8b69368b4830dca490ed28b3b2edc83aaa6367871ce643f6441e67d70f97caf62d1c775c3154f4f95182319093461df14da22e128848786c60d51b936c910b8896f854a8c66f74b6e92794752f0e9e24039289fc38ca1adb32af361c1e9a5731c19af3c300ac6b0b8302c613038c6e15ff4e466a8afb237ae501886b2d1641a06a66a757d38044ac26889f9f486e343ab14fff256abdb93d2c72bc1775643011e90cdd75173ce4ccd5fa69ea26409cffa40244aba787b701098205ffc842179a1d624fb2619903f2185545635fcd33b9802696a111c025086111194e515af9cf38f2a7f440c926f7118e9c075f6ed7444451f19d57e874911afa4237ebb20c2db4c172815e3a5ad0a07d24e5a7eed674a335b509a595f5582e1f6af0874f508a6a948ab5e977aa54184fac57ae7b832c42f7d2f54883f6fd1406bb490509daaf77ecaf20ce03c66e78012797929702b2e3e46cba4239a0143797e390880b8d6092bfc3ccb0ec94781794b443d32b6f963148bbd8821df48565ef908762e1cd73410a813bcf1c275d396fc21acee0b0c33e7d721eaa6bcdb947c09db6d7cd472e3cd87d272f9ea396db530719c455fa17a6fe5e110854d8d96ccb044106d07436523d778a8b6ac50302e8852b43a6ef9175c60987efbf9c6c943b81625c1126b01d160d57e0e23d9e4abc3f499694b9f365bc86c840966a7cf7f156043f2528882b07a43db166e2ac0c18f88597388b2f5499ffc86aee18794fcf375aa35241d691a2fd093e5b84f02fb24a9bbce1d187dba66cebed512ef9bbee7ac3edcea782ad18260a5fbafad8ef6f2f24f42335681576d800aacbdc667a3d5d2e834da28e1c1970b5ea1edd3001604b957d504637c4f947e0b3f4e3d9977f6bc4da9e229cb2a9a5ec2d76164507977f24ce80d31a156f1c09844889873355022eacd96946bb9325388e1e21b7e0db35ccc575f14bc0c6d4b5f24a79d645117026b41b87bcb299c25ebe735f5bdc33de08ce74e6738599a80285aee5aa048b53b341844659f81c1ddd08346cc3f433dbcad1904cd7ff1d3c781599206a1107d4b4adc7a5a2ff42329d052463407661db7d44dc25cd8b70b24bc56967eb2e1118c1c7aed2a891a34c61616ee131cf94329727d60bc1fc27440ec96464e50248019bf6b5b10a7a829aadb514493f8857f6da32c513ebd39fb67ef3d34b15d232a71ad60050e92988f8373a059b7ce49f22041c5ac146c3d122154be0760c4f6c51d2e5cddab0cb4eaf30575d49fb2843d6193f5ecb6593859eed6f23742b4cc2e1842da92f4a07c490ea0d4ab701885aec95c6ae8c4c2b284e67722e33594ec36bbed852d6840a849385a287c3916afa55435223b2b8056d72447cb3f8c54a6cbb41ea9be7287d06d5781eac0c1f1ac7a52194f14885d66a3bc848d5edb48391eab39718be88b07d446c16b930fbbd1921980aa8df4ba15e543af1defed00b7ba2e24db812770b02fa3db58a6c6ad4b43c5b67b640476f9a2b3b21fdda766c50f78fa84d8729d80a7f24f10703afa24192982fafa917c7004bdb431f904031de5b36005a4e3ef277dd68e4d580582dcbb73e526130a48329506326537feb4b1cfac5575e3052e8c1db6171cfd1a5bf99080db3b755b556383a9d82865704eaa306c4e8e7e0787dba90fea76afb639a7be7d6a7621245c0e0c53ab6e9b1313fe68970e2683da9659cde3985505e34ba9959e90e1e8a9a7e5164467985605a10d5be30e274c06462aa5a9fbb93f8005cca9089c1bdb6fd98991059c0a7343f741df552fbfd380419fba3c9e66a8ccd90b95eaf2988647f4f853237b7908f760c2e40d6b4916491e563bd13ae5039da03ea847056342b9811b30580ec9b3570f628677ee0ae0f38648d7733708ec1cfaa481ac81ff4258746158395be117114b776f6405fd552a959f99e51ffa65f07a10d5ba0122528d9afa5c2a2d14cc0ae69468c7eec240ac148cf8ab2d108844e807eb3229c621f2d7a2cd0a5c5d6b5d3eec035fec365c1cf38f1e5efb1cbc5df5be07e3889fbd2b417343883d2f380ce964195bdd6f84c3bceb817ff3f516696d162eaa6caa3ae017a88b22919fb5caea10b6c3eb6e9cf56e92d82bca4c281899ee7effe8eadda54ea0097c9c32fbe44c33e4ebe33f107bdc128841da477a9bd9a61b2bc018849642d676215f719c3db91fc773702ff0d6e04e20ad5be7a22f970617192fa664a6afe58a839c6a6158447be2b6f0c3d5ca99ee62b232cf8bb4f389c4afc702933e5a29f55c0095d42446194fbb1e1de7dd6048b819a4eee0d2f2ed90f00e93f21f407ae348f2ffe776b8344efa958259d33dca9e2782c3db79463a6a2f4342c6c7a5c740bacb0ac7ef19e770d5c70248cf838fa51c2acc9865815805865ae6c7c88d084cc290e410cf6beb7177e93d73ac52bf59c1c58524bae9a4d7fe81f069ccf641f1b3d53bf3db1b2cb274104fbf597c256ea24f9eba11c48a91920f50c9f268e23ca0442fbc66b2ca4abd8e56f26580e7aff3f34bf9359c0aa14f6214537c89d86633a0755a9e9a323d194253e31af000ba0e766564e7e75ebe586568d9a8bc06929845b1fd432cf2f925407bacbac1458f863cdbfa7724fd848ed2cc23af443ae40ebcb6038306d2eee45f9a82d4de146693c2a962bd2febf44253a455ecd5b37c2382ade65195d6eafc3924ed00757c4c1e2e068d97a5507b545dd84bdafe7e129ce1462aeadbccb2482a24465d107d4a77b3a717c283ab9402d5195abd20dbb8f0fd41ddd3dcf0bc0b83a0015d5816ed5ccd06e49ae031a5729a4bcb1e96aee976d681801b5f427cb6c0d2ac8e59eefd1ed45d80dbd3066edc4a4232870c393fbb0faafbf8fdd7da8dc85b7dcd71774127bd007da224caadd35d4b8233e8c47fdd133b48e299a5567ebee6d810681b586a38c6deb7a4b8ec99c38d33fac38b235bae3c305ef89e12a9c6f25e383b84325cd46dca8721abf2d2102e10fb5adac22bc938b036ab19d967bdf347ffc1dc8cce463751ed3911feaefce430d5ab4435c6155ee71bcce75f7472447b462b0650d81b34cd7d57bcf01a929dcb8cf6000fe8889f6ed20388076c183392d5b96120556c7cfb1e64906c795acd62a07705d94b0d87cb6ddbd356b210bcf6bb05e8f55defee14c0c16de0ca9f85cf51d84b5fe04ca47d9ccf2f3c3af4e42f08d934c66c4aa1fad645b961b009979a42459aa9c819ac4caac353ec25de8311b606a1555a7798007d51035e25648013fac5be49d21bddcfe99d96329710d0e7d4f33286355237f6228761a3e87f28b3de6259cf2d962ca1f9d4573d0ce972e6a010222d62fa685df4d99a20120a80e4c72a7824767c90d47d417c697139028391e2facec567b26e5c414c593b8c116fc1d838003d3390c5fc1f663b40f2dfff20d66552bc2b7a46ce6a8b4fb4dd4bed275cbd9ea68a0887fa7050e230864f589cc285863cc4730683cf8806ea383be2e710ad6fed0b7ff001e14384cc03dd9230b4dda99bf47044fb49d015ba667699cc7e820c880bc63fbaa7ac6a19ef7c8634de24698de6da3c12ed3a738a1340bf1d76ebc1b7b2658cd6a2f8019be45fe4babf80125d6f316ec0466756b14f39403291cf92429c557bed6e0d0ee1d575ed7c11b31b06d8f068a02b3308cce2ebef8e73dcb95cc6e2435565042864bb1ba71dcd5f78a38b26f884f03333774f1bf9e2e95fed3d1de6514bccb417f86d784e664e6bafe176fa430937ff5fb6bcbb466c5652c7e1f0b09507f1a7cb18226421c7ed2092490412586aa50c0ffece36dab2bc09b100f85bd93f6c8d2506b73b8428bb8f1a7304548fa9966332f25ea74aa36784a14f6574b9a19da8ffc4dd803ba4b39d6ba6246d5d3923eff281a044a34d84fa93beeaeb8c11d2994487fed1ccc4c2df5a27bcd943977797b6fcb7baf98c34de0ce21d45ac4faaf4a69bbda626787ea7313e34bd83f1771f715c5946f06bc088db2fe53a9f3a93ad19776e35f4562b871d8220a1263d5b4ed7ae67a4c7b5b771a357bb468d37cf576e0db101e4c8b34a48f40ec1b8990ed6b431fc555dfca86727824fc7c1cbd8dc69120a60d200844eaa54c52e63a24f2ae97c8881731424883dbbcf46e3d09f7a867097a48039aeec982a19f6e32c7995804a30e6328421ac5e3865a60c2cc1d208e961b4e6fae4e97cbb694640b2c99caf2f979c02be90dff59703e8c1d125ffd46bf4e2492dae364a1901d3d0fafdf6e47bd64d5213dcc3caaf46ea597c9f5f20e551af6589a2e7b6cf3931a9f69d125e21d3ec0919826175d42034c3b3e859c84d4c0047cc01cb0ad16513d97bc7a1deeed7a09d3715ee944cae34bf7534fbdb8539fb87b5396a24df902a25d90ab9577ffe07f262d8380f2948606bcde9b568b72afdd995da10ff9a21f7597a6242e1715e702f5ba48501fb698b986b911072a881e1001d7cbac486b3be9808232f9da84b5a9363c0268146aa311bc1bf5e1cbee265fd84d73f9f06ac37e70f03a847695c7723040658396f0c6d4c5820920a3b55e7f3ffe39a5fd95f6e2b0c60055958056ba7d04ac2168a91ca921d66d1851c97d602411a30c17c8156f209c085b691273b4e9f8076184ad996dbc292c91f06eff8153f347f0cceb19f550e78af5dff2c3c62218363e8af1b02611683b229056d5804b498acd48a28bfee6a171b4c26e486a3b"]}, @nested={0x48, 0x5f, [@typed={0xc, 0x8c, @str='eth1\x00'}, @generic="5277d8bc9ed391cafdd191fbb1c3c08725f414651badcc542225fbbf29bf7d35590b21062247a1e63e7030cdfde36f46f18ee9f2774f"]}, @typed={0x1004, 0x7f, @binary="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"}, @typed={0x8, 0x8f, @uid=r5}]}, 0x2068}], 0x6, &(0x7f0000004780)=[@cred={0x18, 0x1, 0x2, r6, r7, r8}], 0x18, 0x20000000}, 0x80) 08:21:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8000000}, 0x0) 08:21:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:42 executing program 1: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xa416f50a77a7c2aa}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x200}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9358}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x40080) fcntl$notify(r0, 0x402, 0x10) 08:21:43 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11e, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:43 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x33, 0x800) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getflags(r3, 0x40b) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) fcntl$notify(r4, 0x402, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000100)=0xc) dup2(r2, r3) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000140)={@rand_addr="4c6095bf45c4f1a2a308d5b748a465a8", r5}, 0x14) fcntl$notify(r4, 0x402, 0x28) 08:21:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x8060000}, 0x0) 08:21:43 executing program 1: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x9a, 0x1, 0xfff, 0x993, 0x0, 0x80, 0x400, 0x1, 0x4, 0x6, 0x7, 0x99a, 0x4, 0x10001, 0x1, 0x8, 0x8, 0x9, 0x0, 0xa1, 0x280000000000, 0x2, 0x7, 0x2, 0xa2e, 0x1, 0x4, 0x3, 0x9, 0x5, 0x7f, 0x4, 0x89cfef1, 0x9, 0x8, 0x81, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x200, 0xffff, 0x100, 0x5, 0xd3, 0x2, 0x2a1e}, r1, 0xf, 0xffffffffffffffff, 0x9) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000340)={r3, @in={{0x2, 0x4e23, @empty}}, 0x0, 0x7fffffff, 0x3, 0x9, 0x1}, &(0x7f0000000400)=0x98) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000440)) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000080)={'NETMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x80'}, &(0x7f0000000280)=0x11) fcntl$notify(r0, 0x402, 0x1) 08:21:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xa000000}, 0x0) 08:21:43 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x70aba6a19746180f) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x107) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) eventfd(0x5) 08:21:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xcf, 0x400) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x7, 0x3, 0x0, 0x7, 0x6, 0x1, 0x1, 0x9, r2}, 0x20) 08:21:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x20000001) 08:21:44 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11f, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xc000000}, 0x0) 08:21:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800}}, [0x1000, 0x2000000, 0x40, 0x101, 0x8, 0x6, 0x10001, 0x101, 0x37a, 0x4, 0x400, 0x100, 0x360e, 0x3, 0x6]}, &(0x7f0000000080)=0x100) fcntl$notify(r0, 0x402, 0x10) eventfd(0x0) fcntl$notify(r0, 0x402, 0x28) 08:21:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x48, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:44 executing program 1: 08:21:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xe000000}, 0x0) 08:21:44 executing program 1: 08:21:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x24) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0)={r1, 0x3}, &(0x7f0000000300)=0x8) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x400) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000040)=0x50000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r3, 0x402, 0x28) 08:21:44 executing program 1: 08:21:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:45 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x120, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:45 executing program 1: 08:21:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000040)={0x97, 0x7, 0x0, 0x102, 0x10001, 0x3, 0x8}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x40010) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) fcntl$notify(r2, 0x402, 0x28) 08:21:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf000000}, 0x0) 08:21:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:45 executing program 1: 08:21:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x68, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:45 executing program 2: r0 = getpid() r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x22001, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U-'}, 0x28, 0x2) ptrace$getregset(0x4204, r0, 0x207, &(0x7f0000000080)={&(0x7f0000000000)=""/85, 0x55}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x7, 0x219c, 0x1}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000400)={r2, 0x3f}, &(0x7f0000000440)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000300)={0x2, 0x4e20, @multicast2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x10) fcntl$notify(r3, 0x402, 0x28) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000540)) 08:21:45 executing program 1: 08:21:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, &(0x7f00000014c0)) 08:21:46 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x121, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@broadcast, @remote, @remote}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:46 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 08:21:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x10000000}, 0x0) 08:21:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x900, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x43, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c00000000000000000000000e00000093d224aa799cd97db65fb0257b16"], &(0x7f0000000040)=0x32) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000280)={0x10000, {{0xa, 0x4e21, 0xffffffffffffff14, @dev={0xfe, 0x80, [], 0x29}}}, {{0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x6}}}, 0x104) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000003ec0)={@initdev, @remote, 0x0}, &(0x7f0000003f00)=0xc) sendmmsg(r0, &(0x7f00000054c0)=[{{&(0x7f00000003c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)="a252f005e83b5f32387d045c517a7f7d0fedb8744b40c3e49c31da22e354ad75f4d4b74d930e31a64f176b54a1e76f71cb20e9258ac8886d926b9342d7f3ba", 0x3f}], 0x1}, 0x6}, {{&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @broadcast}, 0x1, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="1f1a1c9c784b7998027753bd6d1501c1ac30e5407e3bc722c524164ba045c1adf1c9e8aa213d9dafda5b96f788d459665c", 0x31}, {&(0x7f0000001580)="6bba0775c89f2bdc89363cb7fd1abfd0ed3614b7c030b4be8a4fdba8a60241d261b7733f07e26e4c625cc1aa5ae5b3c239ebc8", 0x33}, {&(0x7f00000015c0)="bd1733159de9cad08ceb7cd6861b5a22bf415ba762", 0x15}], 0x4, &(0x7f0000001640)=[{0xc4, 0x10f, 0x54, "c80e1d372b0cfabc24ca5fe8f82759be5e3b323b0ed700d0d680214b88c8d416b6df70a2ec0e023ef051a2b018e9675e0eaeb088cba36867b7ddbb067d28c97061eea49b5877b7a2b23292f3e4a593b1ce791d7b738ad25cf5a9895f127acee1dc7107890901ff8d3be7d59c125d001238088ac3fbd5f5822aab993ebeccde2200841d33f6304abaf386e7115c0ba6c33d08e02ed95b8d0c65eb85d0935fd0bb73b48f679ddac879b50b46b6cbc27998d4eaffe24f2e"}, {0xf0, 0x1, 0x2, "dfd5084362c472eab20175d5653dbac8d96bb7f4b9f1a7f8f9de121372ef05b1c8565f01c0f7e9c92e6e802c5a66f3fa262b7bc4c9f9ce97299a9b58d3c262efe77e041a5760813122748e48a9837f35426da0282397cae198eaf31fe8aa65194b1420332a2231b2f38bf180f3406b91d3a1e86fcfaa0cb663e66ac58b3959538f4c56ee51cbcccd7a566ab8e15751ca0070fc5222092b353801206ecf41c9603f53ff0763e41b9db4d936130cb6098802c9434f1a361077d5dff2d5939a28a561b713962b8ecae236a964192d9ea0bb4fdd9deb664b50c2d245e51bee4c37d44060180e"}, {0x64, 0x10e, 0x1, "5f1ac8255e085f65487af74ed7226d866ec4010b451a73020b68201eb03d41e86fa5a9f57507285e7e60ea362b9a784cb9fa27deda2c64259e312533c100d738893ba5f6890351cba8a20a06cb1d5a87f05e7bce8092d8"}, {0xac, 0x115, 0x70, "ec252335013516306f68372b4f785d420a851e16462a64692b980b29fb0257f6c7750dbe7b19dee46a9dbce0cf96b0579fa6718bb3405b95898cea02c4e74a7ab5fbf14d84c20ca3ca615e67d9b82fbc07920e8d347e2f04e75a02610866f69b88be7a863b163ae5ec7335fa829bd58b203fe239e63c28384f672681a2ed7c0187b310679b62cff6319a13646b965568101d3d823944de02f27404d8d80093"}, {0x44, 0x10c, 0x9, "a5cd7bc223f9d22efca5966592686748073235adbf7fe46fd73914d0dd6fd701ea4bca4a7cffb54dc7aa7a923a1e8fc91bddbd13abd45860"}, {0x4c, 0x10c, 0x0, "8b1f47d16a9859f619ab196aeea6711bbf1211d4264a6af750b97f74276b01c97beddcf26ce4e37ec22e6798c5a700e370dd0c918c33261b753d12cf37d2"}, {0x1c, 0x7, 0x9, "7e7302a712d81de93a368aab7eca22"}, {0x94, 0x114, 0x2, "4a396234000ca5e4433dc63ff0a6105c3865ff753237b0cb48109dd24d214ab3cb0fe69cdeaeb15d47edd87765b6eec207665fc12852099048de9c36d1eb0cdc46d090d40affb9662f9c718704cc46c3e72069811990a5436f143af39473a719c9f31e3ca2c0e0789eceec7e048ecfda025b30c5e8e67fc879de1ee6240a4059a889d08e4dab"}], 0x404}, 0x78e}, {{0x0, 0x0, &(0x7f0000001d00)=[{&(0x7f0000001a80)="a54866f8866f529b60c3d802f70c2ca01e7df560c18658fd774f069e3085607f55220a7eb3699dc0f3e27f9842eb4b763c6a2c8280908c1f7ab92ec561118dd8f3c956c6162691360f0a55594b875a05f5a2a1376e68f890240a82582526adff492026da27150caedef578702a940679fe5cfa72fdd94944f1338b3ad526365f85690141bb15b3a5fe6b3f1f6e9e42eb1d8b7862153573a8a8fb4823a1", 0x9d}, {&(0x7f0000001b40)}, {&(0x7f0000001b80)="c78f42b18a9457344d9f1aa60cd04cdb926426d16b863895d35757fccc82228fc1c60afafecfeedd857580eeb3780e4d0ed447576e3d559dda9eb551b299c3ded61b5d8a412279862aa466229a13ffce22a801c8464468c7f8bc", 0x5a}, {&(0x7f0000001c00)="e1f6e80dca636a544bf91c79cd83b08dda2781aad68961c6a0399bd895d7f4cf599b117790f92c25783a72ff705e810516bab472e6fc70cff5a0a1fe7c", 0x3d}, {&(0x7f0000001c40)="8a0c489c59817bd8e9c4362d7aafd9375285047556df416ff322b62ab2ab45c0ecb0fddfb79ba683af6bdbedf07f1cc6ab628b14819830ccc0f0c99fbb958b56337ed122ddfea2c431cd25f81eb8a4f88eed02c7e8bcf923820bfccc5295b9b728305bb03472987d53c897332baa69b15a04d9cdc9365589a87d916ad74a99712f05a088a2", 0x85}], 0x5, &(0x7f0000001d40)=[{0xfc, 0x11d, 0x1ff, "76ff3abddb7f63e5afbf1956e4e429bc5f9f50a6ae9bee9148743c1e083601a7d96749320bc5e4c266085f6a879efe173074a33f8dec0348e0b04f3d67d4f259173fdf60edec31a66accc51aeac4555b13e1b5a289f631721a7c89155ee6ab2a07094c02cb8f47eefc3a7debc41a57f400e0fba6068251d23608b5d514b91088cc3c50ceea4c7e7fb87e8ae4a87ba232cc24ad36de4b633de111bf6610991ed2b5090c7350fe71e8b5e13f7e1e5823ae3f880c8a060bc8c15f0051b2691e1d7e5f92870aac9198c1e4b418ed7af3082ed8654754ad9aaf59c967c9192c02bd88d620bd59d8a9b2d281df00e2d6e5"}, {0xac, 0x18d, 0x1ff, "62eb9cd7271f04e44254f03f9acdd0828ab8a8d0a42e966ed8ffc69def5e11d44ec98d8d25048240fa39349049eb0f047ecf93ca58dc260664d91795309df96d863cf32537ad04cbfa3b596e26d7a176593766a3e0379db5604fa06440f479a10d715901aaf9ee7f6af43b90f450f197e7a0a00824b032aeb22565a347bd1fe37fb40b5fbfbbf89d56d6436347bb43d31840690409a5460ad47f7827a601"}, {0x68, 0x1bb, 0x7ff, "a1b89236115845b57a6bf456142c9d28c73ceeee4ec3503e05bd4d8c96d409fb5ad22e4207e1b48d0d36e3e3e41dc65a0af82eeae72ae40217f3996d866057a81f65c0afb22864c4113d769f54155d96609913a2a52349c0a9"}, {0xbc, 0x11f, 0x8, "cda54c17239de74d7e2c9c95b93e83dc2bdba1fae80392b7eece4a0f4546e747e156bd38aeeb63ea8e9422b9d83ad3593c48ea47fd51fd4a469bd1269bc56c3086ee46ca215cb36b25feed4ca7792b70541ae0725a90dfb38614000dcf86f19b15604a4a942e06e2cdd8698c0fa01da148e28cfa64b978092809501d896b1db3238f345e382a42da8c44f80a813bec32c31c4885a7f8c0b11f9272c77d3fd79bca30bc8346447c5c20c07bd86f009e3d"}, {0x74, 0x0, 0x10000, "1a148c5646e24fa44ce50b409e5fccddbfd16f8b3ecad41e055bf78361639d9c503fb274d01cb34f9239f63efdab6871160e2ffede8268327037613be8880af69d147ef23651e5ac554bb05d53f55717efffbfba222e2d37d322cf2e7f0f63e0b48234328b0b04"}, {0x44, 0x0, 0x7, "14287249a4cfb8767a91869416bc1073239baf2007d85d37a746db15951870136f8886614458a5f32b0d764df205f3ce70d65f22fb"}], 0x384}, 0x401}, {{&(0x7f0000002100)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0xcb, @empty, 0x8}}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002180)="0d3ac602bda3c65e42ebd093ff587383b10063e66e64b8a19012fab9fee5f69925f1130b14d4ef99d946c41e3cee3b800c5171b113bf0fa1a762114b1144ddab9e8302304b9ac997b6059e4841a2bb4fa4e51a10b1d711d89047701b28d9db70ab076500f164852190aceb580a1864a4e4fdf9c113cfa0661036c71dacdc2cb850152532bed9026d41faa224b113983df427ff5372c22d01c204e3bb450a05b3129dd5bdebadb11e19b6f00758dce80425a268605579e822fbcd347c87b80826e92b1aa6d4bdae51c62a221ee0f9d10e0c", 0xd1}, {&(0x7f0000002280)="690c8d372ee9a5bd16c8f4c4cb1fa18888af5a3c4ed6b77d9952dd11464becf46b1b43e0f5d57d529175a8b9f12c4e71c0a8df387030e56c05e45b8818a90bec9d8210f6e531319bb55c0cdea9afedb08de88f29f6abf36c138fc4a91f3af121da9bc58aae3a900eb26af51d4de4bafdc1b3dcb0ea8aee0bb0cabce7d3a7d31fbab7b77cba4639fd806be595dbe8de2591ecc4439bac90f5c2209a8c8f3d7a2c7d313b21ecc0686e9f4e94c1c4a478d130146edec629995ad6f2d768", 0xbc}, {&(0x7f0000002340)="40474a304950909eee09bd53369cc105be24e14e6bcc9722e8173c8e6716af3925fc9d21823bcc0683404e1be6af8d137f6e8577c6a463ffa4b4e9f3f0aef322b8ba52b0e5a3abd677699156240364c2a6bc29c7b0665c2179e0e5f674d32f00560bbde1e5475217a0cb2ff11f22fe81001cde65e7b0ad4cf8e4180a", 0x7c}, {&(0x7f00000023c0)="a0", 0x1}, {&(0x7f0000002400)="c8e611ce678cb2e0faf1a189bd7b7524e3544f8b255da82ca9ffe39c7e5d87ed0b8b3e795b42b76de6424c0560c77d73af454bc81e1b5380cd8c4906cc2709a0e7c4ab0f928269ee9cca2199a991c28015fa678bd93956f3ef96953fce4c894a8e555696668fdab8b9c07ea2488f00", 0x6f}, {&(0x7f0000002480)="68b0dea55ddacfa11235558c903fb51540d775aa", 0x14}], 0x6, &(0x7f0000002500)=[{0xec, 0x11b, 0x7fff, "90c50cf81cb7d2b69536badeb33cb24bc2f2ac396f7caf2b8982beb22e2624109ba5f2ffe3a84e264e0feb87fd6c81ac81e1a14405d426e092bdc0f1df45d0878b02ce4b4c03b73569e92b8ab449176684e5980911a9edeb04bcdbfa9c3759707db43316c28a5ed779040061b5e42ad4b0ec3ef4ea90a7742fbcc18e1033ec488584ef079c57452688035b123ef4483b259df0751f8525070ce1295962f6f7f494957f2d8e38f9cce3c054a41bc91ab091fb39bfb898788dcfe8d857f4907b9867c577b4732c864713d377fb2c99268f9562d1984682ef5c351973850049037a"}, {0x100c, 0x6, 0xfffffffffffffffa, "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"}, {0xc4, 0x0, 0x8, "cadbe7f5e8482ebf92c2bc1c4ef0015863b65292a7d4f6238d643d1a732649ef05a5c56fdb6fef5a6ec9656feb2a3b594085e994d7455a99f6d957fe55465da14413f3ee640b21e4c2efaa67a6eb42ebf774f0911d99aa6725ee487a5147c6f7ba779188f0a949a7d7be36a12d243abfac03d1a73dc077306177af464d3b0882ad4afea8e86d80835cdce21f7d1b0384c3a9fc6627a73b2150447dd7896f65d78160b1df7b75294565777dca28444af2c47d7d5ce31be7"}, {0xb4, 0x116, 0x1f, "16a01c4f7120e0466ee1589db0db0bfaaaed3c8e3fb43d55b6f7729147d551c388115fdd8c5ef9fcce3ac8c97ead11656464bcd8e5ededd692335495d09107adf30b09675b3a989329965931ec43f18353cd5495b8460d2d52a497b2807ddeaae4877e429f8d4c0f30c258439e3eaffef96a4983a62f45cf9859992ab8c80bb2342fcbcc509ef98412934fa97639c00b40ab5994745a177c9dc91e7baf9fabb9c4f39c4233"}, {0x28, 0x0, 0x8000, "ff5f558f8d845b1e30ce51ac0efedafde89769d471a389eca18a"}, {0x84, 0x11d, 0xfffffffffffff590, "a7e948682754fb945e3663fcd93b41fc5ad357803d8e6d7b1638287da1d756e87dfa9174e50f8b5fc3a6b432ec8d0817a40c820350c1d3dc61323e3116e0866da841f0e78e4d1d658df30f5569ccd740b80965748d320302ded63d00818a5566ca8e47173a39a22924dff66cf7ff1353d52f57d92b"}, {0xf8, 0x29, 0x9, "e43ee5a0e0017408f213c5b84d6dcf5088321dcc3acc35b8ed181d4e429559e96320bb5966ef5ed6de6bd7358b9447e193b891759c51c24f436edd6ed4fc6a53cc1cc8a371614014a70128f48853071dd499ebb91fd31356fe4c6cc79366c19f4cc1dc6006b57a8c668adace45e9fb4ec18d1bf88d064e83c492bfddc36d687de0ebf7d1d9ae935f8fd57ce97623336766f41c932b33609c448db1f8e1ca21c783bb4ea1994f3bb51ff66bbf82d0555f0ef816a2345121e8e1329d841de494643d4f64df1504b09abf7cc5cfb3c18df2c2a6eac34475ab3849848c352e30a5ae4aaeca286e3df6ede3e27e54"}, {0xc, 0x1bf, 0x7}], 0x1420}, 0xaa}, {{&(0x7f0000003940)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000003dc0)=[{&(0x7f00000039c0)="53f701aa25077fa4ae13101df940ff78fadba18f56b89ee885d81301c33a4327af1b79811d74c70c26452e5970424e7744ca0f94fe7c6376fa90b553c4677455beaccf61346f78319e3a9db2bd3a85ca", 0x50}, {&(0x7f0000003a40)="b2d1d00f1a20fe45657885d1d45d75752fcbe71a2646b0551101b8f45e8c2d6267", 0x21}, {&(0x7f0000003a80)="3aa047126e9f9f3a2e105ed03aaf042f129742cbdf1a613729f42b1cd9c830bd78131681f056b47f4bfa4c062b7390dc4ac2b0332c1ed1799b71f5c16e8105c7cb722f61a197b39ed103402a7d19686a8f322c6cc9a7cca7bbf031086be6aba48222a9abcb6368fa1aa7d1a15bbce2851a2184", 0x73}, {&(0x7f0000003b00)="187ba5c172b4768fe7654a43974fc60fae2bba34e1b361253303068769df092ad43fd25fa961cd8266c0890923a14220fb1fd5b5fb5d2ce4bd832d2f9d134da4ed5f221e1b1278957049f7630071e1404aa278d80349fb793d610356fb04bd45d72d2ca22b7c", 0x66}, {&(0x7f0000003b80)="8d456c6a7055a0d658d30d44c00a16f18c6980105d1b43e35d065ff2bc57c383788fc39873a5546f9563328898b533095917ac02882716a0c82eb76465ed0f48f0e9326b5622dd66cdffbc5becbc268a0d1d7fc9900e57e18e4d91e44855ed00abd5d7c9ffb6", 0x66}, {&(0x7f0000003c00)="565fde5d3f4e6cfc98a520c3c0306c2f8747267491e40e84feba668c090d347e9f9cba53cfefa2f9461c72e461eb5ad4ba9c77270069b5f8274f72a5a72b99b5ffc3a60718b3de4c45604847ea858b73fb6df66fa523cb1ec64bfc141853af617401904e0f173131e8f8471a8e26037a73d439605634044d92066a78cb04a3fa9fea07a2e239d331ddf6683c43aac74052", 0x91}, {&(0x7f0000003cc0)="0f563ed4e4541308746f25288123a3d5a227690b3c597c8769969f4e53aeaed317c2b4da114193112156860b0c22d973dacb8b909fd4f1f2e3e7a3e7da2d411d9732977f53a862554c8e8af586db86c59a5d88798e23cf1d135c63317c67de0dbd8c35a42e1bc42e089328b5ecc30714133c0727f2862dda016fe50e1d84c1454acfc2a79de0b88f62606b9b40e51861249613201c418645a76a455e73cbb8941b", 0xa1}, {&(0x7f0000003d80)="0d5c9d623b156ba6cf07a3a39a9145ffbbd8829fc378a43526f584", 0x1b}], 0x8, &(0x7f0000003e00)}, 0x9}, {{&(0x7f0000003f40)=@ll={0x11, 0xd, r1, 0x1, 0x401, 0x6, @random="e37f48bc119e"}, 0x80, &(0x7f0000005440)=[{&(0x7f0000003fc0)}, {&(0x7f0000004000)="4bf1d5817534c8bac74359455c4e331d3348aff8882a85705708e7f21560fabea864b674034e0bdab8d445e20aae", 0x2e}, {&(0x7f0000004040)="0eb5a929283452094b1582f39f46d2322e8a1cc0dd773d96d4949ad64fad1f9b24bcb798b258a6af01ebcde5f89325bde9b5373ec128e824af189e243e79df71ecf12f15de805ed797b497eb8af9d32f71044941a51d76795429d954a068dfa502299a53a44b06706c86fd528797a8230d38451bceb874baa60dca9ad6ecabba1ca4b837b350f8909b3c1bd784d739907409fb940453c363f51b1450df3782194ccdaba49eb0295897938d15b780c0d3f0639a070c", 0xb5}, {&(0x7f0000004100)="d8b401d0c57605fed8cbdbba986c76fdd231e06de1bb6bdf79987f0b6319b6311116e47dbebc31b4d765d0ef6ba36ede9261209059634c70e2a924f9187894888839d0eb5c7a88e4abde2a493daf620ebc21d8e874271fe55809549330ca178cdc7df3795cdb897dfa6edd31197f8794d5a978efe958218fc14c3ddb3b87facd180c27276180fcbc5d3708e6ec943fabd88a2adfb84f9a35f8f7fd51ee525a2a6227546bdd7cddbad258df7683c3b4a810d37d82b6f5b56e30f8b075d96ae563f9e6142022a5ab05873eb4acf9dc7601f04b3be65e04f43fe3d1907c3ec7643598c32fa1055fd9a8768326", 0xeb}, {&(0x7f0000004200)="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", 0x1000}, {&(0x7f0000005200)="273c953fa1a655e170a5eceed83090d672fce859afe43963ee4043177e4920caf901b8d5b9ceb4d866ff6c5d9907508dd6a7fc9f1c0eab9190b15d55a3af5ee8bcc3db4e0e9e40b8312fddf89d5bfd47f1f81da913ea087b0079456307923a4d4af564d81c567b57f57a3b40944376852a650813265515584dcf8d0134a776c125ec6343558aba6807b60d7aaed595c82f8939e2948fe08be5e09aec7d5a64a6f2b8307b23b64583321369b2ccb740959099c4fecaee2a15a16f1104f03c75d284bb735fe46dacc6909905a13305cca78efe6ecf6e0d82636cfef5f28f0ce33f49040bba236a47088ae97b9010b5dec277375ca28dcf1afbd19aa5d99a86", 0xfe}, {&(0x7f0000005300)}, {&(0x7f0000005340)="9c0bf3ce596c93735d54e58dea7ddca8926b1468b0546d4d3508bff61abcaea6413e13c226091a720dc58700d2ac941f96292f50419ae925aa38f83fec3b4b841ee545f43311f90dcce27579fc0e504b1cf4ccfd6c802b06ec54a5c929f4e5d17c00e4c2e37e3a2e4578f21779bb6ae6f6fe920c629cba26c1dd4806", 0x7c}, {&(0x7f00000053c0)="e6eb9082b78a954dcbbb2307004765207e40c2e554456590589ed73c07228827e4cede8617535a4331a09b7834975fdcd6bca5296afebd4e239250ec514792e87165d09f6c354fa8cc21f82645fbd56febaf", 0x52}], 0x9}, 0x3ff}], 0x6, 0x0) 08:21:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x74, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x28260000}, 0x0) 08:21:46 executing program 1: unshare(0x20400) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) 08:21:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:46 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) poll(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 1865.495929] net_ratelimit: 24 callbacks suppressed [ 1865.495972] protocol 88fb is buggy, dev hsr_slave_0 [ 1865.507160] protocol 88fb is buggy, dev hsr_slave_1 08:21:46 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x122, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:46 executing program 1: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000280)="290000002000190000003fffffffda060200000000e80001060000040d000300ea1100000005000000", 0x29}], 0x1) 08:21:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x3f000000}, 0x0) 08:21:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:46 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x33, 0x800) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getflags(r3, 0x40b) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) fcntl$notify(r4, 0x402, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000100)=0xc) dup2(r2, r3) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000140)={@rand_addr="4c6095bf45c4f1a2a308d5b748a465a8", r5}, 0x14) fcntl$notify(r4, 0x402, 0x28) [ 1865.681298] IPVS: ftp: loaded support on port[0] = 21 08:21:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x40000000}, 0x0) 08:21:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:47 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x33, 0x800) r1 = accept4(r0, 0x0, &(0x7f0000000080), 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getflags(r3, 0x40b) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) fcntl$notify(r4, 0x402, 0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @multicast2}, &(0x7f0000000100)=0xc) dup2(r2, r3) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000140)={@rand_addr="4c6095bf45c4f1a2a308d5b748a465a8", r5}, 0x14) fcntl$notify(r4, 0x402, 0x28) 08:21:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x43050000}, 0x0) 08:21:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:47 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11d, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) [ 1866.579055] IPVS: ftp: loaded support on port[0] = 21 08:21:48 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x123, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) [ 1866.695363] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.700509] protocol 88fb is buggy, dev hsr_slave_1 08:21:48 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x11c, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x60000000}, 0x0) 08:21:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe31, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x4001, @u64}]}, 0x20}}, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101800, 0x0) fcntl$notify(r0, 0x402, 0x10) fcntl$notify(r0, 0x402, 0x28) 08:21:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x65580000}, 0x0) 08:21:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1867.495306] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.500418] protocol 88fb is buggy, dev hsr_slave_1 [ 1867.505592] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.510663] protocol 88fb is buggy, dev hsr_slave_1 [ 1867.515846] protocol 88fb is buggy, dev hsr_slave_0 [ 1867.520928] protocol 88fb is buggy, dev hsr_slave_1 08:21:48 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x124, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x448801, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94g=\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xc2\xef\xe8w\xd3\xbd@\a\xb5_\x10q\x91\xf5\xa4\xe2Y\xbc_\x8b\xa9\x96\xdc\xf3S\x1eg\xa5\xa8\x85\x84UG\xe8\xb4]6\x8c\xde\x12\xa3\xf1Z\xe4\x93\b\xcb\xb6\xa7%\xcc\xd8\v\xe0N\x83\xcf\xdf\x198\xbbW\xb3h\xc2\xba\xa4\xd1\xe5\xda]8\x80+o\x01\x0f\xb5\x97\xe3\x8a\x84J\x87\\J\xc0\n\xe8\x95\xb6\xaa\xfc\x97\xe6$\xb2\x03j_\xcc\te\x13\xf4(p\xd3\x12\xb6n\xbf\xe2\xa1x\x9a|', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf1d, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:49 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x112, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x80350000}, 0x0) 08:21:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:49 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x115, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1d0f, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x81000000}, 0x0) 08:21:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1f00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x86ddffff}, 0x0) 08:21:50 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x125, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x900, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x88470000}, 0x0) 08:21:50 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x115, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) fchmod(r0, 0x165) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) fcntl$notify(r1, 0x402, 0x28) 08:21:50 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x310e, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) [ 1869.547995] FAULT_INJECTION: forcing a failure. [ 1869.547995] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.595533] CPU: 1 PID: 23723 Comm: syz-executor.1 Not tainted 5.0.0+ #9 [ 1869.602436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1869.611805] Call Trace: [ 1869.614421] dump_stack+0x172/0x1f0 [ 1869.618091] should_fail.cold+0xa/0x15 [ 1869.622012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1869.627146] ? ___might_sleep+0x163/0x280 [ 1869.631313] __should_failslab+0x121/0x190 [ 1869.635565] should_failslab+0x9/0x14 [ 1869.639386] kmem_cache_alloc_node+0x264/0x710 [ 1869.644000] __alloc_skb+0xd5/0x5e0 [ 1869.647648] ? skb_trim+0x190/0x190 [ 1869.651292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.656848] ? netlink_autobind.isra.0+0x228/0x310 [ 1869.661811] netlink_sendmsg+0x97b/0xd70 [ 1869.665910] ? netlink_unicast+0x720/0x720 [ 1869.670158] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1869.675019] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1869.679795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.685345] ? security_socket_sendmsg+0x93/0xc0 [ 1869.690123] ? netlink_unicast+0x720/0x720 [ 1869.694377] sock_sendmsg+0xdd/0x130 [ 1869.698108] ___sys_sendmsg+0x806/0x930 [ 1869.702107] ? copy_msghdr_from_user+0x430/0x430 [ 1869.706896] ? lock_downgrade+0x880/0x880 [ 1869.711060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.716623] ? kasan_check_read+0x11/0x20 [ 1869.720795] ? __fget+0x367/0x540 [ 1869.724269] ? ksys_dup3+0x3e0/0x3e0 [ 1869.727991] ? lock_downgrade+0x880/0x880 [ 1869.732168] ? __fget_light+0x1a9/0x230 [ 1869.736156] ? __fdget+0x1b/0x20 [ 1869.739535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1869.745091] __sys_sendmsg+0x105/0x1d0 [ 1869.748998] ? __ia32_sys_shutdown+0x80/0x80 [ 1869.753424] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1869.758979] ? fput+0x128/0x1a0 [ 1869.762284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1869.767057] ? do_fast_syscall_32+0xd1/0xc98 [ 1869.771482] ? entry_SYSENTER_compat+0x70/0x7f [ 1869.776080] ? do_fast_syscall_32+0xd1/0xc98 [ 1869.780518] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1869.785291] do_fast_syscall_32+0x281/0xc98 [ 1869.789634] entry_SYSENTER_compat+0x70/0x7f [ 1869.794057] RIP: 0023:0xf7fd3869 [ 1869.797438] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1869.816365] RSP: 002b:00000000f5dcf0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1869.824095] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1869.831383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1869.838676] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1869.845967] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1869.853254] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x88480000}, 0x0) 08:21:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3f00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:51 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1870.399206] FAULT_INJECTION: forcing a failure. [ 1870.399206] name failslab, interval 1, probability 0, space 0, times 0 [ 1870.424415] CPU: 0 PID: 23747 Comm: syz-executor.1 Not tainted 5.0.0+ #9 [ 1870.431321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1870.440692] Call Trace: [ 1870.443307] dump_stack+0x172/0x1f0 [ 1870.446951] should_fail.cold+0xa/0x15 [ 1870.446983] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1870.455983] ? ___might_sleep+0x163/0x280 [ 1870.456005] __should_failslab+0x121/0x190 [ 1870.456024] should_failslab+0x9/0x14 [ 1870.456042] kmem_cache_alloc_node_trace+0x270/0x720 [ 1870.456070] __kmalloc_node_track_caller+0x3d/0x70 [ 1870.468221] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1870.482934] __alloc_skb+0x10b/0x5e0 [ 1870.486679] ? skb_trim+0x190/0x190 [ 1870.490320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.495891] ? netlink_autobind.isra.0+0x228/0x310 [ 1870.500845] netlink_sendmsg+0x97b/0xd70 [ 1870.500881] ? netlink_unicast+0x720/0x720 [ 1870.509182] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1870.514040] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1870.518806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.518822] ? security_socket_sendmsg+0x93/0xc0 [ 1870.518838] ? netlink_unicast+0x720/0x720 [ 1870.518857] sock_sendmsg+0xdd/0x130 [ 1870.518887] ___sys_sendmsg+0x806/0x930 [ 1870.518907] ? copy_msghdr_from_user+0x430/0x430 [ 1870.537129] ? lock_downgrade+0x880/0x880 [ 1870.537147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.537167] ? kasan_check_read+0x11/0x20 [ 1870.545904] ? __fget+0x367/0x540 [ 1870.545927] ? ksys_dup3+0x3e0/0x3e0 [ 1870.545942] ? lock_downgrade+0x880/0x880 [ 1870.545967] ? __fget_light+0x1a9/0x230 [ 1870.545991] ? __fdget+0x1b/0x20 [ 1870.555669] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1870.566959] __sys_sendmsg+0x105/0x1d0 [ 1870.566983] ? __ia32_sys_shutdown+0x80/0x80 [ 1870.567002] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1870.567019] ? fput+0x128/0x1a0 [ 1870.567046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1870.578504] ? do_fast_syscall_32+0xd1/0xc98 [ 1870.578523] ? entry_SYSENTER_compat+0x70/0x7f [ 1870.578540] ? do_fast_syscall_32+0xd1/0xc98 [ 1870.592398] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1870.592421] do_fast_syscall_32+0x281/0xc98 [ 1870.614951] entry_SYSENTER_compat+0x70/0x7f [ 1870.614966] RIP: 0023:0xf7fd3869 [ 1870.632824] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1870.632835] RSP: 002b:00000000f5dcf0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1870.632852] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 1870.655210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1870.655220] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1870.655228] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1870.655235] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1870.865320] net_ratelimit: 16 callbacks suppressed [ 1870.865328] protocol 88fb is buggy, dev hsr_slave_0 [ 1870.870410] protocol 88fb is buggy, dev hsr_slave_1 08:21:52 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x126, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:52 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x88640000}, 0x0) 08:21:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:52 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1871.237904] FAULT_INJECTION: forcing a failure. [ 1871.237904] name failslab, interval 1, probability 0, space 0, times 0 [ 1871.257832] FAULT_INJECTION: forcing a failure. [ 1871.257832] name failslab, interval 1, probability 0, space 0, times 0 [ 1871.279687] CPU: 1 PID: 23767 Comm: syz-executor.1 Not tainted 5.0.0+ #9 [ 1871.286572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1871.286580] Call Trace: [ 1871.286607] dump_stack+0x172/0x1f0 [ 1871.286634] should_fail.cold+0xa/0x15 [ 1871.286652] ? debug_smp_processor_id+0x3c/0x280 [ 1871.286674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1871.286706] __should_failslab+0x121/0x190 [ 1871.286729] should_failslab+0x9/0x14 [ 1871.286748] kmem_cache_alloc+0x47/0x6f0 [ 1871.286768] ? lock_acquire+0x16f/0x3f0 [ 1871.286789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.316244] skb_clone+0x150/0x3b0 [ 1871.316268] netlink_deliver_tap+0x952/0xbf0 [ 1871.316293] netlink_unicast+0x5a7/0x720 [ 1871.316314] ? netlink_attachskb+0x770/0x770 [ 1871.316333] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1871.316348] ? __check_object_size+0x3d/0x42f [ 1871.316369] netlink_sendmsg+0x8ae/0xd70 [ 1871.316393] ? netlink_unicast+0x720/0x720 [ 1871.316409] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1871.316429] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1871.316447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.332746] ? security_socket_sendmsg+0x93/0xc0 [ 1871.332766] ? netlink_unicast+0x720/0x720 [ 1871.332788] sock_sendmsg+0xdd/0x130 [ 1871.332809] ___sys_sendmsg+0x806/0x930 [ 1871.332831] ? copy_msghdr_from_user+0x430/0x430 [ 1871.332852] ? lock_downgrade+0x880/0x880 [ 1871.359775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.359800] ? kasan_check_read+0x11/0x20 [ 1871.359822] ? __fget+0x367/0x540 [ 1871.359843] ? ksys_dup3+0x3e0/0x3e0 [ 1871.377450] ? lock_downgrade+0x880/0x880 [ 1871.377487] ? __fget_light+0x1a9/0x230 [ 1871.377505] ? __fdget+0x1b/0x20 [ 1871.377520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1871.377542] __sys_sendmsg+0x105/0x1d0 [ 1871.377557] ? __ia32_sys_shutdown+0x80/0x80 [ 1871.377573] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1871.377588] ? fput+0x128/0x1a0 [ 1871.377614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1871.396885] ? do_fast_syscall_32+0xd1/0xc98 [ 1871.396902] ? entry_SYSENTER_compat+0x70/0x7f [ 1871.396917] ? do_fast_syscall_32+0xd1/0xc98 [ 1871.396944] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1871.396965] do_fast_syscall_32+0x281/0xc98 [ 1871.396986] entry_SYSENTER_compat+0x70/0x7f [ 1871.396998] RIP: 0023:0xf7fd3869 [ 1871.397014] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1871.397022] RSP: 002b:00000000f5dcf0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1871.397037] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 08:21:52 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) [ 1871.397046] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1871.397057] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1871.413660] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1871.413670] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1871.414569] CPU: 1 PID: 23764 Comm: syz-executor.2 Not tainted 5.0.0+ #9 [ 1871.430563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1871.438667] Call Trace: [ 1871.438692] dump_stack+0x172/0x1f0 [ 1871.438712] should_fail.cold+0xa/0x15 [ 1871.438732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1871.438755] ? ___might_sleep+0x163/0x280 [ 1871.438777] __should_failslab+0x121/0x190 [ 1871.438795] should_failslab+0x9/0x14 [ 1871.438810] kmem_cache_alloc+0x2b2/0x6f0 [ 1871.438830] ? lock_downgrade+0x880/0x880 [ 1871.438851] fcntl_dirnotify+0x11e/0xb70 [ 1871.438886] do_fcntl+0x246/0x1040 [ 1871.451640] ? f_getown+0xc0/0xc0 [ 1871.451675] ? security_file_fcntl+0x93/0xc0 [ 1871.451694] do_compat_fcntl64+0x38d/0x550 [ 1871.461629] ? do_fcntl+0x1040/0x1040 [ 1871.461649] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1871.461666] ? fput+0x128/0x1a0 [ 1871.461685] ? ksys_write+0x166/0x1f0 [ 1871.461703] ? __ia32_sys_read+0xb0/0xb0 [ 1871.474126] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1871.474144] ? do_fast_syscall_32+0xd1/0xc98 [ 1871.474160] ? entry_SYSENTER_compat+0x70/0x7f [ 1871.474176] ? do_fast_syscall_32+0xd1/0xc98 [ 1871.474206] __ia32_compat_sys_fcntl64+0x73/0xb0 [ 1871.474225] do_fast_syscall_32+0x281/0xc98 [ 1871.492449] entry_SYSENTER_compat+0x70/0x7f [ 1871.492470] RIP: 0023:0xf7fa5869 [ 1871.492500] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1871.519335] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000037 [ 1871.519351] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000402 [ 1871.519359] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1871.519367] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1871.519375] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1871.519384] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1871.628225] FAULT_INJECTION: forcing a failure. [ 1871.628225] name failslab, interval 1, probability 0, space 0, times 0 [ 1871.655335] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.666776] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.666881] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.675949] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.676065] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.685164] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.685310] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.693055] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.713857] CPU: 1 PID: 23771 Comm: syz-executor.2 Not tainted 5.0.0+ #9 [ 1871.734356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1871.734363] Call Trace: [ 1871.734387] dump_stack+0x172/0x1f0 [ 1871.734410] should_fail.cold+0xa/0x15 [ 1871.734431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1871.734453] ? ___might_sleep+0x163/0x280 [ 1871.734478] __should_failslab+0x121/0x190 [ 1871.756337] should_failslab+0x9/0x14 [ 1871.756385] kmem_cache_alloc+0x2b2/0x6f0 [ 1871.756462] fcntl_dirnotify+0x140/0xb70 [ 1871.756524] do_fcntl+0x246/0x1040 [ 1871.756567] ? f_getown+0xc0/0xc0 [ 1871.756637] ? security_file_fcntl+0x93/0xc0 [ 1871.756686] do_compat_fcntl64+0x38d/0x550 [ 1871.756737] ? do_fcntl+0x1040/0x1040 [ 1871.756773] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1871.782998] ? fput+0x128/0x1a0 [ 1871.783020] ? ksys_write+0x166/0x1f0 [ 1871.783040] ? __ia32_sys_read+0xb0/0xb0 [ 1871.783059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1871.783075] ? do_fast_syscall_32+0xd1/0xc98 [ 1871.783093] ? entry_SYSENTER_compat+0x70/0x7f [ 1871.798125] ? do_fast_syscall_32+0xd1/0xc98 [ 1871.798151] __ia32_compat_sys_fcntl64+0x73/0xb0 [ 1871.798169] do_fast_syscall_32+0x281/0xc98 [ 1871.798193] entry_SYSENTER_compat+0x70/0x7f [ 1871.798207] RIP: 0023:0xf7fa5869 [ 1871.798223] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1871.798232] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000037 [ 1871.798246] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000402 [ 1871.798255] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1871.798264] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1871.798273] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1871.798284] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:21:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x88a8ffff}, 0x0) [ 1872.054638] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4800, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:53 executing program 2 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) [ 1872.333258] FAULT_INJECTION: forcing a failure. [ 1872.333258] name failslab, interval 1, probability 0, space 0, times 0 [ 1872.365314] CPU: 1 PID: 23794 Comm: syz-executor.2 Not tainted 5.0.0+ #9 [ 1872.372208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.381582] Call Trace: [ 1872.384190] dump_stack+0x172/0x1f0 [ 1872.387847] should_fail.cold+0xa/0x15 [ 1872.391773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1872.396913] ? ___might_sleep+0x163/0x280 [ 1872.401085] __should_failslab+0x121/0x190 [ 1872.405335] should_failslab+0x9/0x14 [ 1872.409145] kmem_cache_alloc+0x2b2/0x6f0 [ 1872.413307] ? kasan_check_read+0x11/0x20 [ 1872.417747] ? do_raw_spin_unlock+0x57/0x270 [ 1872.422177] fsnotify_add_mark_locked+0x278/0xc90 [ 1872.427034] ? fsnotify_grab_connector+0x14d/0x250 [ 1872.427063] fcntl_dirnotify+0x693/0xb70 [ 1872.427091] do_fcntl+0x246/0x1040 [ 1872.427109] ? f_getown+0xc0/0xc0 [ 1872.427138] ? security_file_fcntl+0x93/0xc0 [ 1872.436110] do_compat_fcntl64+0x38d/0x550 [ 1872.436130] ? do_fcntl+0x1040/0x1040 [ 1872.436149] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1872.436166] ? fput+0x128/0x1a0 [ 1872.436184] ? ksys_write+0x166/0x1f0 [ 1872.436202] ? __ia32_sys_read+0xb0/0xb0 [ 1872.436220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1872.436235] ? do_fast_syscall_32+0xd1/0xc98 [ 1872.436249] ? entry_SYSENTER_compat+0x70/0x7f [ 1872.436264] ? do_fast_syscall_32+0xd1/0xc98 [ 1872.436285] __ia32_compat_sys_fcntl64+0x73/0xb0 [ 1872.461206] do_fast_syscall_32+0x281/0xc98 [ 1872.461233] entry_SYSENTER_compat+0x70/0x7f [ 1872.461246] RIP: 0023:0xf7fa5869 [ 1872.461263] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1872.461273] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000037 [ 1872.461289] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000000402 [ 1872.461300] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000000 [ 1872.472417] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1872.472427] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1872.472437] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1872.720069] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:54 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x127, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x88caffff}, 0x0) 08:21:54 executing program 2 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf1d, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:54 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) 08:21:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x89060000}, 0x0) [ 1873.042679] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:54 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x2, 0x10) 08:21:54 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x3, 0x10) [ 1873.333513] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1873.572135] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:55 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x4, 0x10) 08:21:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1d0f, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x9effffff}, 0x0) 08:21:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:55 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x128, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:55 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x5, 0x10) 08:21:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6087, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) [ 1873.996295] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf0ffffff}, 0x0) 08:21:55 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x6, 0x10) 08:21:55 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x7, 0x10) 08:21:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1f00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1874.205726] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:55 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x8, 0x10) 08:21:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xffffa888}, 0x0) 08:21:55 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x9, 0x10) [ 1874.713688] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) [ 1874.746935] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:56 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x129, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6558, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:56 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0xa, 0x10) 08:21:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xffffca88}, 0x0) 08:21:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1874.892693] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xffffdd86}, 0x0) 08:21:56 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0xb, 0x10) 08:21:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6800, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:56 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0xc, 0x10) 08:21:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x35eb, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1875.449536] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) [ 1875.645475] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:57 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x12a, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:57 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0xd, 0x10) 08:21:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xfffff000}, 0x0) 08:21:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3f00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1876.055335] net_ratelimit: 24 callbacks suppressed [ 1876.055343] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.065509] protocol 88fb is buggy, dev hsr_slave_1 08:21:57 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0xe, 0x10) [ 1876.205105] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xa, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:57 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0xf, 0x10) 08:21:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:57 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x10, 0x10) 08:21:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xffffff7f}, 0x0) [ 1876.566953] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:58 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x12b, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7400, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:58 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x11, 0x10) 08:21:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4800, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xffffff9e}, 0x0) [ 1877.095327] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.100493] protocol 88fb is buggy, dev hsr_slave_1 [ 1877.153703] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xfffffff0}, 0x0) 08:21:58 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x24, 0x10) 08:21:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xe, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4c00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:58 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x25, 0x10) 08:21:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x7a00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) [ 1877.701137] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) [ 1877.856910] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) [ 1877.895545] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.900993] protocol 88fb is buggy, dev hsr_slave_1 [ 1877.906371] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.911551] protocol 88fb is buggy, dev hsr_slave_1 [ 1877.916935] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.922109] protocol 88fb is buggy, dev hsr_slave_1 08:21:59 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x12c, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:21:59 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x26, 0x10) 08:21:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x5865, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x4000000000000}, 0x0) 08:21:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x8100, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:21:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x40030000000000}, 0x0) 08:21:59 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x406, 0x10) [ 1878.439355] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:21:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:21:59 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x407, 0x10) 08:21:59 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x408, 0x10) [ 1878.651346] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:22:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0xf0ffffffffffff}, 0x0) 08:22:00 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x12d, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:22:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf000, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:22:00 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x409, 0x10) 08:22:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x100000000000000}, 0x0) [ 1879.189659] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:22:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x200000000000000}, 0x0) 08:22:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xf0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:00 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x40a, 0x10) 08:22:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6087, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:00 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x40b, 0x10) 08:22:00 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x40e, 0x10) [ 1879.638652] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:22:01 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x12e, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:22:01 executing program 2: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000000)=0x1000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x7, 0x0, 0x8, 0x0, 0x1f, 0x400, 0xa, 0x9, 0x33, 0x10000, 0x6, 0x7, 0x800, 0x380068d2, 0x7fffffff, 0xfffffffffffff000, 0x6, 0x18ff, 0x6, 0x4, 0x40, 0x100, 0x4, 0xfc, 0x40, 0x9, 0xbe2, 0x2, 0x80000001, 0x3, 0x7, 0xa2, 0x1, 0x0, 0x10000, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040)}, 0x2020, 0x9, 0x7991, 0x8, 0x800, 0x8001, 0x1}, r2, 0xf, r0, 0x9) fcntl$notify(r1, 0x402, 0x10) 08:22:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x300, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xff7f, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:22:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x300000000000000}, 0x0) 08:22:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6558, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1880.123280] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:22:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x400000000000000}, 0x0) 08:22:01 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000a80)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m\x13%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9em\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r\xa3~\xfff\x15\x98\xacQ\'M\xe5\xfb\x18\x93#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB@\x92\xef\x1f`\xd7\xd0>\xf7\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xfd\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\x8b\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xd8\xeb\xf9\x13\x89\xb0@\x95\xff\x87\xf0E\"\xd8\x19\xa0\x14Y\xcf\xecL\x90\v\x948\'\x7f\x8fqh\xe3\x7f=\xaf\xa7\x90\x8b+\xa2\xbd\xd5\x81+<{%\xde\xaeL\xecYE\xf0\xc6\'\x95lj\x92\xce\xd7\xdbB\x80\xcb\x1a\x00\x00\x00\x00\x00\x00\'RW[\xf8TrU9\x8cT$a\xf4\xb7\xd3\xf0\x94\b\xd27n\xcf#\xe8~\xe8\x96\xaf*J\x82YdH!\xe5\x11\xaf<\xb3\x98>\x05\xcb\xc7\x03\xc3\xb6\xf2b~\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:22:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x500, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:01 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) 08:22:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4ae31, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:22:01 executing program 2: r0 = perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000380)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000340)="81077e8a3ed09f5f4377b2049608d9e851cc817b73940ef9ce", 0x19, r0}, 0x68) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') fcntl$notify(r1, 0x402, 0x2) [ 1880.532709] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:22:02 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x12f, &(0x7f0000000440)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xf}]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000600)={0x0, 0x2, 0x7, &(0x7f00000005c0)=0x1}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) setpriority(0x0, r4, 0x92c) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x100, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000380)='/dev/md0\x00', 0x402401, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x2, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040}, 0x14) io_setup(0x5b1, &(0x7f0000000040)=0x0) dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x1220a0) close(r6) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) io_submit(r5, 0x17, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x0, r0, 0x0, 0x4000}]) 08:22:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x500000000000000}, 0x0) 08:22:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x600, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6800, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:02 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x10080, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x8180, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='pids.events\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) r2 = getuid() fstat(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x4, {0x62f3b0210fca036b, 0x4, 0x7}, 0x20, r2, r3, 0x0, 0x7, 0x8001, 0x1, 0x8001, 0x99, 0x80000000, 0xfffffffffffffff9, 0x0, 0x1000, 0x7, 0x7, 0x3, 0x1f, 0x1f}}, 0xa0) 08:22:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4ae32, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) 08:22:02 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x315a42, 0x0) write$UHID_INPUT(r0, &(0x7f0000000680)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x10) 08:22:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6c00, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x9, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) [ 1881.132196] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:22:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000004}]}}}]}, 0x3c}, 0x1, 0x600000000000000}, 0x0) 08:22:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x4ae33, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8, 0xf0ffff00000005}]}}}]}, 0x3c}}, 0x0) [ 1881.255299] net_ratelimit: 16 callbacks suppressed [ 1881.255310] protocol 88fb is buggy, dev hsr_slave_0 [ 1881.265471] protocol 88fb is buggy, dev hsr_slave_1 08:22:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x700, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:22:02 executing program 2: perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x800, 0x20) fcntl$notify(r0, 0x402, 0x10) [ 1881.471543] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) [ 1881.703757] ================================================================== [ 1881.711181] BUG: KASAN: use-after-free in lockdep_register_key+0x3b9/0x490 [ 1881.718201] Read of size 8 at addr ffff888098ad1418 by task syz-executor.0/24274 [ 1881.725724] [ 1881.727354] CPU: 0 PID: 24274 Comm: syz-executor.0 Not tainted 5.0.0+ #9 [ 1881.734190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1881.743540] Call Trace: [ 1881.743564] dump_stack+0x172/0x1f0 [ 1881.749764] ? lockdep_register_key+0x3b9/0x490 [ 1881.754436] print_address_description.cold+0x7c/0x20d [ 1881.754452] ? lockdep_register_key+0x3b9/0x490 [ 1881.764382] ? lockdep_register_key+0x3b9/0x490 [ 1881.769060] kasan_report.cold+0x1b/0x40 [ 1881.773128] ? lockdep_register_key+0x3b9/0x490 [ 1881.777805] __asan_report_load8_noabort+0x14/0x20 [ 1881.782738] lockdep_register_key+0x3b9/0x490 [ 1881.787242] alloc_workqueue+0x428/0xe70 [ 1881.791309] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1881.796335] ? wiphy_unregister+0x10b0/0x10b0 [ 1881.800836] ? rcu_read_lock_sched_held+0x110/0x130 [ 1881.805859] ? __kmalloc+0x5d5/0x740 [ 1881.809577] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1881.814664] ? __debug_object_init+0x190/0xc30 [ 1881.819240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.824783] ieee80211_register_hw+0x175f/0x3e90 [ 1881.829526] ? ieee80211_ifa_changed+0xc70/0xc70 [ 1881.834266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.839788] ? __hrtimer_init+0xe1/0x250 [ 1881.843832] ? hrtimer_init+0x8b/0x300 [ 1881.847718] ? mac80211_hwsim_set_tsf+0x220/0x220 [ 1881.852555] mac80211_hwsim_new_radio+0x1f16/0x3de0 [ 1881.857563] ? find_held_lock+0x35/0x130 [ 1881.861623] ? hwsim_tx_info_frame_received_nl+0x15b0/0x15b0 [ 1881.867417] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1881.872605] hwsim_new_radio_nl+0x9e3/0x1070 [ 1881.877020] ? mac80211_hwsim_new_radio+0x3de0/0x3de0 [ 1881.882222] genl_family_rcv_msg+0x6e1/0xd90 [ 1881.886639] ? genl_unregister_family+0x790/0x790 [ 1881.891475] ? __local_bh_enable_ip+0x15a/0x270 [ 1881.896144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.901692] ? debug_smp_processor_id+0x3c/0x280 [ 1881.906451] genl_rcv_msg+0xca/0x16c [ 1881.910158] netlink_rcv_skb+0x17a/0x460 [ 1881.914201] ? genl_family_rcv_msg+0xd90/0xd90 [ 1881.918776] ? netlink_ack+0xb50/0xb50 [ 1881.922658] genl_rcv+0x29/0x40 [ 1881.925929] netlink_unicast+0x536/0x720 [ 1881.929988] ? netlink_attachskb+0x770/0x770 [ 1881.934380] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1881.939392] ? __check_object_size+0x3d/0x42f [ 1881.943892] netlink_sendmsg+0x8ae/0xd70 [ 1881.947952] ? netlink_unicast+0x720/0x720 [ 1881.952184] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1881.957023] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1881.961770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.967298] ? security_socket_sendmsg+0x93/0xc0 [ 1881.972063] ? netlink_unicast+0x720/0x720 [ 1881.976293] sock_sendmsg+0xdd/0x130 [ 1881.980006] ___sys_sendmsg+0x806/0x930 [ 1881.983979] ? copy_msghdr_from_user+0x430/0x430 [ 1881.988740] ? lock_downgrade+0x880/0x880 [ 1881.992877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.998428] ? kasan_check_read+0x11/0x20 [ 1882.002570] ? __fget+0x367/0x540 [ 1882.006022] ? ksys_dup3+0x3e0/0x3e0 [ 1882.009735] ? lock_downgrade+0x880/0x880 [ 1882.013865] ? __fget_light+0x1a9/0x230 [ 1882.017842] ? __fdget+0x1b/0x20 [ 1882.021200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1882.026730] __sys_sendmsg+0x105/0x1d0 [ 1882.030611] ? __ia32_sys_shutdown+0x80/0x80 [ 1882.035013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1882.039753] ? do_fast_syscall_32+0xd1/0xc98 [ 1882.044147] ? entry_SYSENTER_compat+0x70/0x7f [ 1882.048723] ? do_fast_syscall_32+0xd1/0xc98 [ 1882.053145] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1882.057909] do_fast_syscall_32+0x281/0xc98 [ 1882.062234] entry_SYSENTER_compat+0x70/0x7f [ 1882.066635] RIP: 0023:0xf7f8d869 [ 1882.070000] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1882.088908] RSP: 002b:00000000f5d680cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1882.096623] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000080 [ 1882.103906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1882.111178] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1882.118439] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1882.125707] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1882.132968] [ 1882.134585] Allocated by task 24264: [ 1882.138294] save_stack+0x45/0xd0 [ 1882.141742] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1882.146665] kasan_kmalloc+0x9/0x10 [ 1882.150290] __kmalloc_node_track_caller+0x4e/0x70 [ 1882.155224] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1882.159893] __alloc_skb+0x10b/0x5e0 [ 1882.163591] alloc_uevent_skb+0x83/0x1e2 [ 1882.167640] kobject_uevent_env+0xb96/0x1030 [ 1882.172038] kobject_uevent+0x20/0x26 [ 1882.175833] net_rx_queue_update_kobjects+0x37f/0x4a0 [ 1882.181014] netdev_register_kobject+0x27c/0x3b0 [ 1882.185765] register_netdevice+0x878/0xff0 [ 1882.190078] bond_newlink+0x4b/0x90 [ 1882.193688] __rtnl_newlink+0x107b/0x16c0 [ 1882.197828] rtnl_newlink+0x69/0xa0 [ 1882.201448] rtnetlink_rcv_msg+0x465/0xb00 [ 1882.205676] netlink_rcv_skb+0x17a/0x460 [ 1882.209732] rtnetlink_rcv+0x1d/0x30 [ 1882.213430] netlink_unicast+0x536/0x720 [ 1882.217483] netlink_sendmsg+0x8ae/0xd70 [ 1882.221540] sock_sendmsg+0xdd/0x130 [ 1882.225243] ___sys_sendmsg+0x806/0x930 [ 1882.229215] __sys_sendmsg+0x105/0x1d0 [ 1882.233089] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1882.237837] do_fast_syscall_32+0x281/0xc98 [ 1882.242154] entry_SYSENTER_compat+0x70/0x7f [ 1882.246541] [ 1882.248165] Freed by task 24264: [ 1882.251526] save_stack+0x45/0xd0 [ 1882.254965] __kasan_slab_free+0x102/0x150 [ 1882.259199] kasan_slab_free+0xe/0x10 [ 1882.262995] kfree+0xcf/0x230 [ 1882.266097] skb_free_head+0x93/0xb0 [ 1882.269820] skb_release_data+0x576/0x7a0 [ 1882.273950] skb_release_all+0x4d/0x60 [ 1882.277850] consume_skb+0xe2/0x380 [ 1882.281481] netlink_broadcast_filtered+0x316/0xb20 [ 1882.286494] netlink_broadcast+0x3a/0x50 [ 1882.290546] kobject_uevent_env+0xc7d/0x1030 [ 1882.294938] kobject_uevent+0x20/0x26 [ 1882.295300] protocol 88fb is buggy, dev hsr_slave_0 [ 1882.298731] net_rx_queue_update_kobjects+0x37f/0x4a0 [ 1882.298745] netdev_register_kobject+0x27c/0x3b0 [ 1882.298758] register_netdevice+0x878/0xff0 [ 1882.298775] bond_newlink+0x4b/0x90 [ 1882.303863] protocol 88fb is buggy, dev hsr_slave_1 [ 1882.308973] __rtnl_newlink+0x107b/0x16c0 [ 1882.308991] rtnl_newlink+0x69/0xa0 [ 1882.309002] rtnetlink_rcv_msg+0x465/0xb00 [ 1882.309014] netlink_rcv_skb+0x17a/0x460 [ 1882.309024] rtnetlink_rcv+0x1d/0x30 [ 1882.309035] netlink_unicast+0x536/0x720 [ 1882.309049] netlink_sendmsg+0x8ae/0xd70 [ 1882.354437] sock_sendmsg+0xdd/0x130 [ 1882.358141] ___sys_sendmsg+0x806/0x930 [ 1882.362105] __sys_sendmsg+0x105/0x1d0 [ 1882.365991] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1882.370740] do_fast_syscall_32+0x281/0xc98 [ 1882.375046] entry_SYSENTER_compat+0x70/0x7f [ 1882.379432] [ 1882.381056] The buggy address belongs to the object at ffff888098ad1300 [ 1882.381056] which belongs to the cache kmalloc-512 of size 512 [ 1882.393725] The buggy address is located 280 bytes inside of [ 1882.393725] 512-byte region [ffff888098ad1300, ffff888098ad1500) [ 1882.405586] The buggy address belongs to the page: [ 1882.410521] page:ffffea000262b440 count:1 mapcount:0 mapping:ffff88812c3f0940 index:0x0 [ 1882.418657] flags: 0x1fffc0000000200(slab) [ 1882.422901] raw: 01fffc0000000200 ffffea00023ceb48 ffffea00024f4b08 ffff88812c3f0940 [ 1882.430781] raw: 0000000000000000 ffff888098ad1080 0000000100000006 0000000000000000 [ 1882.438646] page dumped because: kasan: bad access detected [ 1882.444752] [ 1882.446365] Memory state around the buggy address: [ 1882.451291] ffff888098ad1300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1882.458652] ffff888098ad1380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1882.466014] >ffff888098ad1400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1882.473361] ^ [ 1882.477504] ffff888098ad1480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1882.484855] ffff888098ad1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1882.492200] ================================================================== [ 1882.499540] Disabling lock debugging due to kernel taint [ 1882.504986] Kernel panic - not syncing: panic_on_warn set ... [ 1882.510856] CPU: 0 PID: 24274 Comm: syz-executor.0 Tainted: G B 5.0.0+ #9 [ 1882.519072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1882.528412] Call Trace: [ 1882.530994] dump_stack+0x172/0x1f0 [ 1882.534610] panic+0x2cb/0x65c [ 1882.537795] ? __warn_printk+0xf3/0xf3 [ 1882.541685] ? lock_downgrade+0x880/0x880 [ 1882.545835] ? lockdep_register_key+0x3b9/0x490 [ 1882.550499] ? trace_hardirqs_off+0x62/0x220 [ 1882.554898] ? trace_hardirqs_off+0x59/0x220 [ 1882.559292] ? lockdep_register_key+0x3b9/0x490 [ 1882.563949] end_report+0x47/0x4f [ 1882.567386] ? lockdep_register_key+0x3b9/0x490 [ 1882.572039] kasan_report.cold+0xe/0x40 [ 1882.576010] ? lockdep_register_key+0x3b9/0x490 [ 1882.580672] __asan_report_load8_noabort+0x14/0x20 [ 1882.585591] lockdep_register_key+0x3b9/0x490 [ 1882.590101] alloc_workqueue+0x428/0xe70 [ 1882.594148] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1882.599171] ? wiphy_unregister+0x10b0/0x10b0 [ 1882.603654] ? rcu_read_lock_sched_held+0x110/0x130 [ 1882.608656] ? __kmalloc+0x5d5/0x740 [ 1882.612351] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1882.617443] ? __debug_object_init+0x190/0xc30 [ 1882.622018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.627542] ieee80211_register_hw+0x175f/0x3e90 [ 1882.632282] ? ieee80211_ifa_changed+0xc70/0xc70 [ 1882.637038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.642567] ? __hrtimer_init+0xe1/0x250 [ 1882.646614] ? hrtimer_init+0x8b/0x300 [ 1882.650487] ? mac80211_hwsim_set_tsf+0x220/0x220 [ 1882.655325] mac80211_hwsim_new_radio+0x1f16/0x3de0 [ 1882.660336] ? find_held_lock+0x35/0x130 [ 1882.664386] ? hwsim_tx_info_frame_received_nl+0x15b0/0x15b0 [ 1882.670170] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1882.675357] hwsim_new_radio_nl+0x9e3/0x1070 [ 1882.679765] ? mac80211_hwsim_new_radio+0x3de0/0x3de0 [ 1882.684952] genl_family_rcv_msg+0x6e1/0xd90 [ 1882.689345] ? genl_unregister_family+0x790/0x790 [ 1882.694175] ? __local_bh_enable_ip+0x15a/0x270 [ 1882.698838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.704369] ? debug_smp_processor_id+0x3c/0x280 [ 1882.709114] genl_rcv_msg+0xca/0x16c [ 1882.712811] netlink_rcv_skb+0x17a/0x460 [ 1882.716869] ? genl_family_rcv_msg+0xd90/0xd90 [ 1882.721450] ? netlink_ack+0xb50/0xb50 [ 1882.725336] genl_rcv+0x29/0x40 [ 1882.728614] netlink_unicast+0x536/0x720 [ 1882.732661] ? netlink_attachskb+0x770/0x770 [ 1882.737061] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1882.742076] ? __check_object_size+0x3d/0x42f [ 1882.746563] netlink_sendmsg+0x8ae/0xd70 [ 1882.750609] ? netlink_unicast+0x720/0x720 [ 1882.754833] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1882.759659] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1882.764403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.769931] ? security_socket_sendmsg+0x93/0xc0 [ 1882.774673] ? netlink_unicast+0x720/0x720 [ 1882.778914] sock_sendmsg+0xdd/0x130 [ 1882.782801] ___sys_sendmsg+0x806/0x930 [ 1882.786765] ? copy_msghdr_from_user+0x430/0x430 [ 1882.791507] ? lock_downgrade+0x880/0x880 [ 1882.795651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.801184] ? kasan_check_read+0x11/0x20 [ 1882.805328] ? __fget+0x367/0x540 [ 1882.808777] ? ksys_dup3+0x3e0/0x3e0 [ 1882.812494] ? lock_downgrade+0x880/0x880 [ 1882.816642] ? __fget_light+0x1a9/0x230 [ 1882.820623] ? __fdget+0x1b/0x20 [ 1882.823975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1882.829503] __sys_sendmsg+0x105/0x1d0 [ 1882.833376] ? __ia32_sys_shutdown+0x80/0x80 [ 1882.837790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1882.842538] ? do_fast_syscall_32+0xd1/0xc98 [ 1882.846929] ? entry_SYSENTER_compat+0x70/0x7f [ 1882.851495] ? do_fast_syscall_32+0xd1/0xc98 [ 1882.855911] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 1882.860665] do_fast_syscall_32+0x281/0xc98 [ 1882.864976] entry_SYSENTER_compat+0x70/0x7f [ 1882.869370] RIP: 0023:0xf7f8d869 [ 1882.872716] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1882.891622] RSP: 002b:00000000f5d680cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 1882.899334] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000080 [ 1882.906590] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1882.913845] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1882.921103] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1882.928359] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1882.936404] Kernel Offset: disabled [ 1882.940025] Rebooting in 86400 seconds..