[ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.124' (ECDSA) to the list of known hosts. 2021/03/01 16:30:21 fuzzer started 2021/03/01 16:30:22 dialing manager at 10.128.0.169:44365 2021/03/01 16:30:23 syscalls: 3247 2021/03/01 16:30:23 code coverage: enabled 2021/03/01 16:30:23 comparison tracing: enabled 2021/03/01 16:30:23 extra coverage: enabled 2021/03/01 16:30:23 setuid sandbox: enabled 2021/03/01 16:30:23 namespace sandbox: enabled 2021/03/01 16:30:23 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/01 16:30:23 fault injection: enabled 2021/03/01 16:30:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/01 16:30:23 net packet injection: enabled 2021/03/01 16:30:23 net device setup: enabled 2021/03/01 16:30:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/01 16:30:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/01 16:30:23 USB emulation: enabled 2021/03/01 16:30:23 hci packet injection: enabled 2021/03/01 16:30:23 wifi device emulation: enabled 2021/03/01 16:30:23 802.15.4 emulation: enabled 2021/03/01 16:30:23 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/01 16:30:23 fetching corpus: 50, signal 42205/46041 (executing program) 2021/03/01 16:30:23 fetching corpus: 100, signal 67514/73116 (executing program) 2021/03/01 16:30:23 fetching corpus: 150, signal 90052/97353 (executing program) 2021/03/01 16:30:23 fetching corpus: 200, signal 109917/118863 (executing program) 2021/03/01 16:30:24 fetching corpus: 250, signal 132338/142807 (executing program) 2021/03/01 16:30:24 fetching corpus: 300, signal 144196/156265 (executing program) 2021/03/01 16:30:24 fetching corpus: 350, signal 160651/174173 (executing program) 2021/03/01 16:30:24 fetching corpus: 400, signal 175570/190533 (executing program) 2021/03/01 16:30:24 fetching corpus: 450, signal 194530/210812 (executing program) 2021/03/01 16:30:25 fetching corpus: 500, signal 218362/235780 (executing program) 2021/03/01 16:30:25 fetching corpus: 550, signal 225770/244560 (executing program) 2021/03/01 16:30:25 fetching corpus: 600, signal 234089/254205 (executing program) 2021/03/01 16:30:25 fetching corpus: 650, signal 242551/263995 (executing program) 2021/03/01 16:30:26 fetching corpus: 700, signal 252063/274722 (executing program) 2021/03/01 16:30:26 fetching corpus: 750, signal 263763/287590 (executing program) 2021/03/01 16:30:26 fetching corpus: 800, signal 269023/294165 (executing program) 2021/03/01 16:30:26 fetching corpus: 850, signal 279923/306200 (executing program) 2021/03/01 16:30:26 fetching corpus: 900, signal 285364/312902 (executing program) 2021/03/01 16:30:27 fetching corpus: 950, signal 294245/322917 (executing program) 2021/03/01 16:30:27 fetching corpus: 1000, signal 299264/329173 (executing program) 2021/03/01 16:30:27 fetching corpus: 1050, signal 305401/336517 (executing program) 2021/03/01 16:30:27 fetching corpus: 1100, signal 312307/344537 (executing program) syzkaller login: [ 71.128860][ T3267] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.135375][ T3267] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/01 16:30:28 fetching corpus: 1150, signal 317100/350540 (executing program) 2021/03/01 16:30:28 fetching corpus: 1200, signal 320858/355507 (executing program) 2021/03/01 16:30:28 fetching corpus: 1250, signal 325445/361240 (executing program) 2021/03/01 16:30:29 fetching corpus: 1300, signal 333553/370294 (executing program) 2021/03/01 16:30:29 fetching corpus: 1350, signal 340698/378468 (executing program) 2021/03/01 16:30:29 fetching corpus: 1400, signal 344126/383026 (executing program) 2021/03/01 16:30:29 fetching corpus: 1450, signal 350263/390189 (executing program) 2021/03/01 16:30:29 fetching corpus: 1500, signal 354405/395407 (executing program) 2021/03/01 16:30:29 fetching corpus: 1550, signal 358139/400225 (executing program) 2021/03/01 16:30:30 fetching corpus: 1600, signal 362663/405717 (executing program) 2021/03/01 16:30:30 fetching corpus: 1650, signal 367828/411874 (executing program) 2021/03/01 16:30:30 fetching corpus: 1700, signal 371448/416551 (executing program) 2021/03/01 16:30:30 fetching corpus: 1750, signal 374577/420777 (executing program) 2021/03/01 16:30:31 fetching corpus: 1800, signal 378956/426147 (executing program) 2021/03/01 16:30:31 fetching corpus: 1850, signal 383761/431887 (executing program) 2021/03/01 16:30:31 fetching corpus: 1900, signal 389823/438784 (executing program) 2021/03/01 16:30:31 fetching corpus: 1950, signal 393721/443638 (executing program) 2021/03/01 16:30:32 fetching corpus: 2000, signal 397886/448768 (executing program) 2021/03/01 16:30:32 fetching corpus: 2050, signal 401669/453477 (executing program) 2021/03/01 16:30:32 fetching corpus: 2100, signal 404536/457345 (executing program) 2021/03/01 16:30:32 fetching corpus: 2150, signal 407727/461522 (executing program) 2021/03/01 16:30:32 fetching corpus: 2200, signal 413330/467825 (executing program) 2021/03/01 16:30:33 fetching corpus: 2250, signal 416496/471938 (executing program) 2021/03/01 16:30:33 fetching corpus: 2300, signal 419710/476052 (executing program) 2021/03/01 16:30:33 fetching corpus: 2350, signal 425596/482569 (executing program) 2021/03/01 16:30:33 fetching corpus: 2400, signal 428483/486354 (executing program) 2021/03/01 16:30:34 fetching corpus: 2450, signal 431766/490472 (executing program) 2021/03/01 16:30:34 fetching corpus: 2500, signal 439629/498784 (executing program) 2021/03/01 16:30:34 fetching corpus: 2550, signal 443137/503138 (executing program) 2021/03/01 16:30:34 fetching corpus: 2600, signal 446474/507277 (executing program) 2021/03/01 16:30:35 fetching corpus: 2650, signal 449613/511245 (executing program) 2021/03/01 16:30:35 fetching corpus: 2700, signal 455254/517472 (executing program) 2021/03/01 16:30:35 fetching corpus: 2750, signal 458733/521739 (executing program) 2021/03/01 16:30:36 fetching corpus: 2800, signal 462410/526095 (executing program) 2021/03/01 16:30:36 fetching corpus: 2850, signal 466073/530470 (executing program) 2021/03/01 16:30:36 fetching corpus: 2900, signal 470055/535117 (executing program) 2021/03/01 16:30:36 fetching corpus: 2950, signal 472565/538475 (executing program) 2021/03/01 16:30:36 fetching corpus: 3000, signal 476617/543139 (executing program) 2021/03/01 16:30:37 fetching corpus: 3050, signal 479289/546576 (executing program) 2021/03/01 16:30:37 fetching corpus: 3100, signal 482539/550614 (executing program) 2021/03/01 16:30:37 fetching corpus: 3150, signal 485146/553982 (executing program) 2021/03/01 16:30:38 fetching corpus: 3200, signal 488582/558077 (executing program) 2021/03/01 16:30:38 fetching corpus: 3250, signal 490501/560780 (executing program) 2021/03/01 16:30:38 fetching corpus: 3300, signal 492427/563574 (executing program) 2021/03/01 16:30:38 fetching corpus: 3350, signal 494683/566612 (executing program) 2021/03/01 16:30:38 fetching corpus: 3400, signal 496697/569436 (executing program) 2021/03/01 16:30:39 fetching corpus: 3450, signal 498366/571950 (executing program) 2021/03/01 16:30:39 fetching corpus: 3500, signal 501049/575332 (executing program) 2021/03/01 16:30:39 fetching corpus: 3550, signal 503118/578146 (executing program) 2021/03/01 16:30:39 fetching corpus: 3600, signal 505526/581208 (executing program) 2021/03/01 16:30:39 fetching corpus: 3650, signal 507408/583875 (executing program) 2021/03/01 16:30:40 fetching corpus: 3700, signal 509189/586449 (executing program) 2021/03/01 16:30:40 fetching corpus: 3750, signal 512935/590645 (executing program) 2021/03/01 16:30:40 fetching corpus: 3800, signal 514951/593394 (executing program) 2021/03/01 16:30:40 fetching corpus: 3850, signal 516967/596108 (executing program) 2021/03/01 16:30:40 fetching corpus: 3900, signal 519713/599447 (executing program) 2021/03/01 16:30:41 fetching corpus: 3950, signal 522822/603131 (executing program) 2021/03/01 16:30:41 fetching corpus: 4000, signal 524467/605566 (executing program) 2021/03/01 16:30:41 fetching corpus: 4050, signal 526861/608614 (executing program) 2021/03/01 16:30:41 fetching corpus: 4100, signal 528851/611249 (executing program) 2021/03/01 16:30:42 fetching corpus: 4150, signal 531222/614252 (executing program) 2021/03/01 16:30:42 fetching corpus: 4200, signal 533138/616854 (executing program) 2021/03/01 16:30:42 fetching corpus: 4250, signal 535753/619995 (executing program) 2021/03/01 16:30:42 fetching corpus: 4300, signal 537622/622538 (executing program) 2021/03/01 16:30:43 fetching corpus: 4350, signal 540049/625550 (executing program) 2021/03/01 16:30:43 fetching corpus: 4400, signal 541493/627701 (executing program) 2021/03/01 16:30:43 fetching corpus: 4450, signal 543013/629958 (executing program) 2021/03/01 16:30:43 fetching corpus: 4500, signal 544126/631836 (executing program) 2021/03/01 16:30:44 fetching corpus: 4550, signal 545966/634312 (executing program) 2021/03/01 16:30:44 fetching corpus: 4600, signal 548248/637142 (executing program) 2021/03/01 16:30:44 fetching corpus: 4650, signal 550481/639933 (executing program) 2021/03/01 16:30:44 fetching corpus: 4700, signal 552615/642596 (executing program) 2021/03/01 16:30:44 fetching corpus: 4750, signal 554108/644793 (executing program) 2021/03/01 16:30:45 fetching corpus: 4800, signal 555500/646897 (executing program) 2021/03/01 16:30:45 fetching corpus: 4850, signal 556965/648989 (executing program) 2021/03/01 16:30:45 fetching corpus: 4900, signal 559805/652244 (executing program) 2021/03/01 16:30:45 fetching corpus: 4950, signal 561232/654347 (executing program) 2021/03/01 16:30:46 fetching corpus: 5000, signal 562946/656641 (executing program) 2021/03/01 16:30:46 fetching corpus: 5050, signal 564532/658870 (executing program) 2021/03/01 16:30:46 fetching corpus: 5100, signal 567120/661845 (executing program) 2021/03/01 16:30:46 fetching corpus: 5150, signal 569218/664400 (executing program) 2021/03/01 16:30:46 fetching corpus: 5200, signal 571425/667073 (executing program) 2021/03/01 16:30:47 fetching corpus: 5250, signal 573230/669421 (executing program) 2021/03/01 16:30:47 fetching corpus: 5300, signal 575349/672052 (executing program) 2021/03/01 16:30:47 fetching corpus: 5350, signal 576543/673869 (executing program) 2021/03/01 16:30:47 fetching corpus: 5400, signal 578157/676078 (executing program) 2021/03/01 16:30:48 fetching corpus: 5450, signal 580038/678407 (executing program) 2021/03/01 16:30:48 fetching corpus: 5500, signal 584085/682436 (executing program) 2021/03/01 16:30:48 fetching corpus: 5550, signal 585722/684621 (executing program) 2021/03/01 16:30:48 fetching corpus: 5600, signal 587279/686711 (executing program) 2021/03/01 16:30:49 fetching corpus: 5650, signal 589203/689074 (executing program) 2021/03/01 16:30:49 fetching corpus: 5700, signal 591054/691405 (executing program) 2021/03/01 16:30:49 fetching corpus: 5750, signal 592989/693804 (executing program) 2021/03/01 16:30:49 fetching corpus: 5800, signal 594131/695552 (executing program) 2021/03/01 16:30:49 fetching corpus: 5850, signal 595747/697649 (executing program) 2021/03/01 16:30:50 fetching corpus: 5900, signal 596915/699416 (executing program) 2021/03/01 16:30:50 fetching corpus: 5950, signal 598437/701435 (executing program) 2021/03/01 16:30:50 fetching corpus: 6000, signal 600099/703604 (executing program) 2021/03/01 16:30:50 fetching corpus: 6050, signal 601485/705533 (executing program) 2021/03/01 16:30:51 fetching corpus: 6100, signal 603478/707902 (executing program) 2021/03/01 16:30:51 fetching corpus: 6150, signal 605050/709980 (executing program) 2021/03/01 16:30:51 fetching corpus: 6200, signal 606493/711906 (executing program) 2021/03/01 16:30:51 fetching corpus: 6250, signal 607348/713428 (executing program) 2021/03/01 16:30:51 fetching corpus: 6300, signal 608888/715409 (executing program) 2021/03/01 16:30:52 fetching corpus: 6350, signal 609890/717040 (executing program) 2021/03/01 16:30:52 fetching corpus: 6400, signal 611583/719161 (executing program) 2021/03/01 16:30:52 fetching corpus: 6450, signal 612855/720959 (executing program) 2021/03/01 16:30:52 fetching corpus: 6500, signal 614089/722723 (executing program) 2021/03/01 16:30:52 fetching corpus: 6550, signal 615143/724329 (executing program) 2021/03/01 16:30:53 fetching corpus: 6600, signal 617470/726884 (executing program) 2021/03/01 16:30:53 fetching corpus: 6650, signal 618844/728760 (executing program) 2021/03/01 16:30:53 fetching corpus: 6700, signal 620246/730608 (executing program) 2021/03/01 16:30:53 fetching corpus: 6750, signal 621718/732543 (executing program) 2021/03/01 16:30:54 fetching corpus: 6800, signal 623121/734465 (executing program) 2021/03/01 16:30:54 fetching corpus: 6850, signal 624383/736229 (executing program) 2021/03/01 16:30:54 fetching corpus: 6900, signal 626318/738430 (executing program) 2021/03/01 16:30:54 fetching corpus: 6950, signal 627946/740450 (executing program) 2021/03/01 16:30:55 fetching corpus: 7000, signal 629934/742594 (executing program) 2021/03/01 16:30:55 fetching corpus: 7050, signal 631471/744531 (executing program) 2021/03/01 16:30:55 fetching corpus: 7100, signal 632694/746238 (executing program) 2021/03/01 16:30:55 fetching corpus: 7150, signal 634279/748134 (executing program) 2021/03/01 16:30:56 fetching corpus: 7200, signal 635461/749811 (executing program) 2021/03/01 16:30:56 fetching corpus: 7250, signal 637031/751738 (executing program) 2021/03/01 16:30:56 fetching corpus: 7300, signal 638881/753863 (executing program) 2021/03/01 16:30:56 fetching corpus: 7350, signal 640422/755782 (executing program) 2021/03/01 16:30:57 fetching corpus: 7400, signal 641345/757202 (executing program) 2021/03/01 16:30:57 fetching corpus: 7450, signal 642219/758578 (executing program) 2021/03/01 16:30:57 fetching corpus: 7500, signal 643259/760080 (executing program) 2021/03/01 16:30:57 fetching corpus: 7550, signal 644442/761710 (executing program) 2021/03/01 16:30:57 fetching corpus: 7600, signal 646215/763730 (executing program) 2021/03/01 16:30:58 fetching corpus: 7650, signal 647348/765327 (executing program) 2021/03/01 16:30:58 fetching corpus: 7700, signal 648227/766724 (executing program) 2021/03/01 16:30:58 fetching corpus: 7750, signal 649178/768136 (executing program) 2021/03/01 16:30:59 fetching corpus: 7800, signal 650274/769664 (executing program) 2021/03/01 16:30:59 fetching corpus: 7850, signal 651374/771159 (executing program) 2021/03/01 16:30:59 fetching corpus: 7900, signal 652284/772513 (executing program) 2021/03/01 16:30:59 fetching corpus: 7950, signal 653865/774380 (executing program) 2021/03/01 16:31:00 fetching corpus: 8000, signal 655083/776007 (executing program) 2021/03/01 16:31:00 fetching corpus: 8050, signal 656329/777597 (executing program) 2021/03/01 16:31:00 fetching corpus: 8100, signal 657828/779368 (executing program) 2021/03/01 16:31:00 fetching corpus: 8150, signal 658742/780766 (executing program) 2021/03/01 16:31:01 fetching corpus: 8200, signal 659950/782303 (executing program) 2021/03/01 16:31:01 fetching corpus: 8250, signal 661089/783857 (executing program) 2021/03/01 16:31:01 fetching corpus: 8300, signal 662537/785606 (executing program) 2021/03/01 16:31:01 fetching corpus: 8350, signal 663501/786991 (executing program) 2021/03/01 16:31:01 fetching corpus: 8400, signal 664275/788270 (executing program) 2021/03/01 16:31:02 fetching corpus: 8450, signal 665648/789932 (executing program) 2021/03/01 16:31:02 fetching corpus: 8500, signal 667004/791597 (executing program) 2021/03/01 16:31:02 fetching corpus: 8550, signal 668430/793253 (executing program) 2021/03/01 16:31:02 fetching corpus: 8600, signal 670117/795128 (executing program) 2021/03/01 16:31:03 fetching corpus: 8650, signal 671754/796949 (executing program) 2021/03/01 16:31:03 fetching corpus: 8700, signal 673061/798498 (executing program) 2021/03/01 16:31:03 fetching corpus: 8750, signal 674171/799957 (executing program) 2021/03/01 16:31:03 fetching corpus: 8800, signal 675955/801864 (executing program) 2021/03/01 16:31:03 fetching corpus: 8850, signal 677311/803474 (executing program) 2021/03/01 16:31:04 fetching corpus: 8900, signal 678459/804990 (executing program) 2021/03/01 16:31:04 fetching corpus: 8950, signal 679684/806497 (executing program) 2021/03/01 16:31:04 fetching corpus: 9000, signal 680699/807854 (executing program) 2021/03/01 16:31:04 fetching corpus: 9050, signal 682172/809543 (executing program) 2021/03/01 16:31:05 fetching corpus: 9100, signal 683552/811139 (executing program) 2021/03/01 16:31:05 fetching corpus: 9150, signal 684580/812494 (executing program) 2021/03/01 16:31:05 fetching corpus: 9200, signal 685992/814084 (executing program) 2021/03/01 16:31:06 fetching corpus: 9250, signal 686795/815342 (executing program) 2021/03/01 16:31:06 fetching corpus: 9300, signal 687829/816722 (executing program) 2021/03/01 16:31:06 fetching corpus: 9350, signal 688573/817892 (executing program) 2021/03/01 16:31:06 fetching corpus: 9400, signal 690479/819783 (executing program) 2021/03/01 16:31:06 fetching corpus: 9450, signal 691928/821444 (executing program) 2021/03/01 16:31:07 fetching corpus: 9500, signal 692950/822763 (executing program) 2021/03/01 16:31:07 fetching corpus: 9550, signal 694404/824348 (executing program) 2021/03/01 16:31:07 fetching corpus: 9600, signal 695282/825578 (executing program) 2021/03/01 16:31:07 fetching corpus: 9650, signal 695849/826621 (executing program) 2021/03/01 16:31:07 fetching corpus: 9700, signal 696325/827580 (executing program) 2021/03/01 16:31:08 fetching corpus: 9750, signal 696976/828645 (executing program) 2021/03/01 16:31:08 fetching corpus: 9800, signal 698038/830019 (executing program) 2021/03/01 16:31:08 fetching corpus: 9850, signal 698952/831279 (executing program) 2021/03/01 16:31:08 fetching corpus: 9900, signal 700366/832829 (executing program) 2021/03/01 16:31:09 fetching corpus: 9950, signal 701253/834079 (executing program) 2021/03/01 16:31:09 fetching corpus: 10000, signal 702264/835406 (executing program) 2021/03/01 16:31:09 fetching corpus: 10050, signal 703358/836773 (executing program) 2021/03/01 16:31:09 fetching corpus: 10100, signal 704202/837895 (executing program) 2021/03/01 16:31:10 fetching corpus: 10150, signal 705473/839285 (executing program) 2021/03/01 16:31:10 fetching corpus: 10200, signal 706284/840445 (executing program) 2021/03/01 16:31:10 fetching corpus: 10250, signal 707276/841742 (executing program) 2021/03/01 16:31:10 fetching corpus: 10300, signal 708479/843136 (executing program) 2021/03/01 16:31:11 fetching corpus: 10350, signal 709243/844236 (executing program) 2021/03/01 16:31:11 fetching corpus: 10400, signal 710149/845388 (executing program) 2021/03/01 16:31:11 fetching corpus: 10450, signal 711183/846643 (executing program) 2021/03/01 16:31:11 fetching corpus: 10500, signal 712223/847917 (executing program) 2021/03/01 16:31:12 fetching corpus: 10550, signal 713812/849486 (executing program) 2021/03/01 16:31:12 fetching corpus: 10600, signal 715252/851047 (executing program) 2021/03/01 16:31:12 fetching corpus: 10650, signal 716639/852534 (executing program) 2021/03/01 16:31:12 fetching corpus: 10700, signal 717530/853742 (executing program) 2021/03/01 16:31:12 fetching corpus: 10750, signal 718499/854939 (executing program) 2021/03/01 16:31:13 fetching corpus: 10800, signal 719563/856151 (executing program) 2021/03/01 16:31:13 fetching corpus: 10850, signal 720298/857232 (executing program) 2021/03/01 16:31:13 fetching corpus: 10900, signal 721413/858475 (executing program) 2021/03/01 16:31:14 fetching corpus: 10950, signal 722387/859690 (executing program) 2021/03/01 16:31:14 fetching corpus: 11000, signal 723151/860759 (executing program) 2021/03/01 16:31:14 fetching corpus: 11050, signal 724453/862139 (executing program) 2021/03/01 16:31:14 fetching corpus: 11100, signal 725496/863398 (executing program) 2021/03/01 16:31:14 fetching corpus: 11150, signal 726458/864587 (executing program) 2021/03/01 16:31:15 fetching corpus: 11200, signal 727409/865725 (executing program) 2021/03/01 16:31:15 fetching corpus: 11250, signal 728493/866960 (executing program) 2021/03/01 16:31:15 fetching corpus: 11300, signal 730008/868439 (executing program) 2021/03/01 16:31:16 fetching corpus: 11350, signal 730838/869497 (executing program) 2021/03/01 16:31:16 fetching corpus: 11400, signal 731876/870698 (executing program) 2021/03/01 16:31:16 fetching corpus: 11450, signal 732507/871641 (executing program) 2021/03/01 16:31:16 fetching corpus: 11500, signal 733554/872805 (executing program) 2021/03/01 16:31:16 fetching corpus: 11550, signal 734088/873723 (executing program) 2021/03/01 16:31:17 fetching corpus: 11600, signal 735141/874909 (executing program) 2021/03/01 16:31:17 fetching corpus: 11650, signal 736094/876004 (executing program) 2021/03/01 16:31:17 fetching corpus: 11700, signal 737076/877127 (executing program) 2021/03/01 16:31:18 fetching corpus: 11750, signal 741613/880129 (executing program) 2021/03/01 16:31:18 fetching corpus: 11800, signal 742547/881224 (executing program) 2021/03/01 16:31:18 fetching corpus: 11850, signal 743465/882269 (executing program) 2021/03/01 16:31:18 fetching corpus: 11900, signal 744560/883457 (executing program) 2021/03/01 16:31:19 fetching corpus: 11950, signal 745587/884605 (executing program) 2021/03/01 16:31:19 fetching corpus: 12000, signal 746574/885658 (executing program) 2021/03/01 16:31:19 fetching corpus: 12050, signal 747585/886783 (executing program) 2021/03/01 16:31:19 fetching corpus: 12100, signal 748575/887910 (executing program) 2021/03/01 16:31:20 fetching corpus: 12150, signal 749408/888955 (executing program) 2021/03/01 16:31:20 fetching corpus: 12200, signal 750391/890037 (executing program) 2021/03/01 16:31:20 fetching corpus: 12250, signal 751060/890965 (executing program) 2021/03/01 16:31:21 fetching corpus: 12300, signal 751876/891991 (executing program) 2021/03/01 16:31:21 fetching corpus: 12350, signal 753587/893427 (executing program) 2021/03/01 16:31:21 fetching corpus: 12400, signal 754482/894408 (executing program) 2021/03/01 16:31:21 fetching corpus: 12450, signal 755746/895622 (executing program) 2021/03/01 16:31:22 fetching corpus: 12500, signal 756614/896646 (executing program) 2021/03/01 16:31:22 fetching corpus: 12550, signal 757409/897605 (executing program) 2021/03/01 16:31:22 fetching corpus: 12600, signal 758053/898513 (executing program) 2021/03/01 16:31:23 fetching corpus: 12650, signal 759109/899609 (executing program) 2021/03/01 16:31:23 fetching corpus: 12700, signal 760005/900613 (executing program) 2021/03/01 16:31:23 fetching corpus: 12750, signal 760783/901549 (executing program) 2021/03/01 16:31:23 fetching corpus: 12800, signal 761543/902425 (executing program) 2021/03/01 16:31:23 fetching corpus: 12850, signal 762177/903312 (executing program) 2021/03/01 16:31:23 fetching corpus: 12900, signal 763067/904337 (executing program) 2021/03/01 16:31:24 fetching corpus: 12950, signal 763583/905124 (executing program) 2021/03/01 16:31:24 fetching corpus: 13000, signal 764171/905968 (executing program) 2021/03/01 16:31:24 fetching corpus: 13050, signal 764897/906834 (executing program) 2021/03/01 16:31:24 fetching corpus: 13100, signal 765560/907699 (executing program) 2021/03/01 16:31:25 fetching corpus: 13150, signal 766087/908503 (executing program) 2021/03/01 16:31:25 fetching corpus: 13200, signal 766745/909375 (executing program) 2021/03/01 16:31:25 fetching corpus: 13250, signal 767466/910285 (executing program) 2021/03/01 16:31:25 fetching corpus: 13300, signal 768487/911299 (executing program) 2021/03/01 16:31:26 fetching corpus: 13350, signal 769384/912305 (executing program) 2021/03/01 16:31:26 fetching corpus: 13400, signal 770531/913379 (executing program) 2021/03/01 16:31:26 fetching corpus: 13450, signal 771388/914321 (executing program) 2021/03/01 16:31:26 fetching corpus: 13500, signal 772095/915193 (executing program) 2021/03/01 16:31:26 fetching corpus: 13550, signal 772881/916067 (executing program) 2021/03/01 16:31:27 fetching corpus: 13600, signal 774203/917198 (executing program) 2021/03/01 16:31:27 fetching corpus: 13650, signal 775024/918079 (executing program) 2021/03/01 16:31:27 fetching corpus: 13700, signal 775825/918998 (executing program) 2021/03/01 16:31:27 fetching corpus: 13750, signal 776394/919785 (executing program) 2021/03/01 16:31:27 fetching corpus: 13800, signal 777096/920656 (executing program) 2021/03/01 16:31:28 fetching corpus: 13850, signal 777670/921487 (executing program) 2021/03/01 16:31:28 fetching corpus: 13900, signal 778389/922376 (executing program) 2021/03/01 16:31:28 fetching corpus: 13950, signal 779196/923275 (executing program) 2021/03/01 16:31:29 fetching corpus: 14000, signal 780198/924247 (executing program) 2021/03/01 16:31:29 fetching corpus: 14050, signal 780941/925120 (executing program) 2021/03/01 16:31:29 fetching corpus: 14100, signal 782152/926191 (executing program) [ 132.551445][ T3267] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.557768][ T3267] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/01 16:31:30 fetching corpus: 14150, signal 783162/927140 (executing program) 2021/03/01 16:31:30 fetching corpus: 14200, signal 783671/927871 (executing program) 2021/03/01 16:31:30 fetching corpus: 14250, signal 784497/928722 (executing program) 2021/03/01 16:31:31 fetching corpus: 14300, signal 785244/929620 (executing program) 2021/03/01 16:31:31 fetching corpus: 14350, signal 786155/930513 (executing program) 2021/03/01 16:31:31 fetching corpus: 14400, signal 786640/931210 (executing program) 2021/03/01 16:31:31 fetching corpus: 14450, signal 786996/931862 (executing program) 2021/03/01 16:31:31 fetching corpus: 14500, signal 787956/932836 (executing program) 2021/03/01 16:31:32 fetching corpus: 14550, signal 788954/933745 (executing program) 2021/03/01 16:31:32 fetching corpus: 14600, signal 789993/934678 (executing program) 2021/03/01 16:31:32 fetching corpus: 14650, signal 790590/935428 (executing program) 2021/03/01 16:31:32 fetching corpus: 14700, signal 791495/936320 (executing program) 2021/03/01 16:31:32 fetching corpus: 14750, signal 792129/937076 (executing program) 2021/03/01 16:31:33 fetching corpus: 14800, signal 793060/937982 (executing program) 2021/03/01 16:31:33 fetching corpus: 14850, signal 793923/938829 (executing program) 2021/03/01 16:31:33 fetching corpus: 14900, signal 794755/939669 (executing program) 2021/03/01 16:31:33 fetching corpus: 14950, signal 795566/940490 (executing program) 2021/03/01 16:31:34 fetching corpus: 15000, signal 796600/941445 (executing program) 2021/03/01 16:31:34 fetching corpus: 15050, signal 798044/942535 (executing program) 2021/03/01 16:31:34 fetching corpus: 15100, signal 798773/943326 (executing program) 2021/03/01 16:31:34 fetching corpus: 15150, signal 799497/944070 (executing program) 2021/03/01 16:31:35 fetching corpus: 15200, signal 800510/944944 (executing program) 2021/03/01 16:31:35 fetching corpus: 15250, signal 801120/945652 (executing program) 2021/03/01 16:31:35 fetching corpus: 15300, signal 801497/946261 (executing program) 2021/03/01 16:31:35 fetching corpus: 15350, signal 802303/947074 (executing program) 2021/03/01 16:31:36 fetching corpus: 15400, signal 803006/947797 (executing program) 2021/03/01 16:31:36 fetching corpus: 15450, signal 803989/948657 (executing program) 2021/03/01 16:31:36 fetching corpus: 15500, signal 804917/949502 (executing program) 2021/03/01 16:31:36 fetching corpus: 15550, signal 805858/950333 (executing program) 2021/03/01 16:31:37 fetching corpus: 15600, signal 806455/951060 (executing program) 2021/03/01 16:31:37 fetching corpus: 15650, signal 807004/951711 (executing program) 2021/03/01 16:31:37 fetching corpus: 15700, signal 807878/952486 (executing program) 2021/03/01 16:31:37 fetching corpus: 15750, signal 808549/953163 (executing program) 2021/03/01 16:31:38 fetching corpus: 15800, signal 809314/953903 (executing program) 2021/03/01 16:31:38 fetching corpus: 15850, signal 809933/954584 (executing program) 2021/03/01 16:31:38 fetching corpus: 15900, signal 810659/955310 (executing program) 2021/03/01 16:31:38 fetching corpus: 15950, signal 811761/956217 (executing program) 2021/03/01 16:31:39 fetching corpus: 16000, signal 812196/956844 (executing program) 2021/03/01 16:31:39 fetching corpus: 16050, signal 813027/957647 (executing program) 2021/03/01 16:31:39 fetching corpus: 16100, signal 813510/958269 (executing program) 2021/03/01 16:31:39 fetching corpus: 16150, signal 813992/958903 (executing program) 2021/03/01 16:31:40 fetching corpus: 16200, signal 814744/959578 (executing program) 2021/03/01 16:31:40 fetching corpus: 16250, signal 815706/960391 (executing program) 2021/03/01 16:31:40 fetching corpus: 16300, signal 816550/961132 (executing program) 2021/03/01 16:31:40 fetching corpus: 16350, signal 818658/962357 (executing program) 2021/03/01 16:31:41 fetching corpus: 16400, signal 819288/963035 (executing program) 2021/03/01 16:31:41 fetching corpus: 16450, signal 819910/963684 (executing program) 2021/03/01 16:31:41 fetching corpus: 16500, signal 820568/964381 (executing program) 2021/03/01 16:31:41 fetching corpus: 16550, signal 821116/965012 (executing program) 2021/03/01 16:31:42 fetching corpus: 16600, signal 821885/965730 (executing program) 2021/03/01 16:31:42 fetching corpus: 16650, signal 822451/966402 (executing program) 2021/03/01 16:31:42 fetching corpus: 16700, signal 823024/967018 (executing program) 2021/03/01 16:31:42 fetching corpus: 16750, signal 823485/967631 (executing program) 2021/03/01 16:31:42 fetching corpus: 16800, signal 823725/968143 (executing program) 2021/03/01 16:31:43 fetching corpus: 16850, signal 824182/968694 (executing program) 2021/03/01 16:31:43 fetching corpus: 16900, signal 824596/969222 (executing program) 2021/03/01 16:31:43 fetching corpus: 16950, signal 825445/969909 (executing program) 2021/03/01 16:31:43 fetching corpus: 17000, signal 826147/970590 (executing program) 2021/03/01 16:31:44 fetching corpus: 17050, signal 826553/971152 (executing program) 2021/03/01 16:31:44 fetching corpus: 17100, signal 827165/971797 (executing program) 2021/03/01 16:31:44 fetching corpus: 17150, signal 827706/972415 (executing program) 2021/03/01 16:31:45 fetching corpus: 17200, signal 828457/973067 (executing program) 2021/03/01 16:31:45 fetching corpus: 17250, signal 828856/973636 (executing program) 2021/03/01 16:31:45 fetching corpus: 17300, signal 829373/974222 (executing program) 2021/03/01 16:31:45 fetching corpus: 17350, signal 829818/974755 (executing program) 2021/03/01 16:31:45 fetching corpus: 17400, signal 830417/975397 (executing program) 2021/03/01 16:31:46 fetching corpus: 17450, signal 831128/976053 (executing program) 2021/03/01 16:31:46 fetching corpus: 17500, signal 832325/976854 (executing program) 2021/03/01 16:31:46 fetching corpus: 17550, signal 832991/977496 (executing program) 2021/03/01 16:31:46 fetching corpus: 17600, signal 833603/978068 (executing program) 2021/03/01 16:31:47 fetching corpus: 17650, signal 833978/978609 (executing program) 2021/03/01 16:31:47 fetching corpus: 17700, signal 834753/979306 (executing program) 2021/03/01 16:31:47 fetching corpus: 17750, signal 835650/980055 (executing program) 2021/03/01 16:31:48 fetching corpus: 17800, signal 836174/980650 (executing program) 2021/03/01 16:31:48 fetching corpus: 17850, signal 836658/981185 (executing program) 2021/03/01 16:31:48 fetching corpus: 17900, signal 837647/981889 (executing program) 2021/03/01 16:31:48 fetching corpus: 17950, signal 838358/982474 (executing program) 2021/03/01 16:31:49 fetching corpus: 18000, signal 839235/983168 (executing program) 2021/03/01 16:31:49 fetching corpus: 18050, signal 840147/983844 (executing program) 2021/03/01 16:31:49 fetching corpus: 18100, signal 840592/984340 (executing program) 2021/03/01 16:31:50 fetching corpus: 18150, signal 841074/984899 (executing program) 2021/03/01 16:31:50 fetching corpus: 18200, signal 841694/985450 (executing program) 2021/03/01 16:31:50 fetching corpus: 18250, signal 842093/985973 (executing program) 2021/03/01 16:31:50 fetching corpus: 18300, signal 842608/986544 (executing program) 2021/03/01 16:31:51 fetching corpus: 18350, signal 843448/987199 (executing program) 2021/03/01 16:31:51 fetching corpus: 18399, signal 843979/987718 (executing program) 2021/03/01 16:31:51 fetching corpus: 18449, signal 844453/988207 (executing program) 2021/03/01 16:31:51 fetching corpus: 18499, signal 845035/988793 (executing program) 2021/03/01 16:31:52 fetching corpus: 18549, signal 846065/989474 (executing program) 2021/03/01 16:31:52 fetching corpus: 18599, signal 846909/990091 (executing program) 2021/03/01 16:31:52 fetching corpus: 18649, signal 847653/990713 (executing program) 2021/03/01 16:31:52 fetching corpus: 18699, signal 848131/991204 (executing program) 2021/03/01 16:31:52 fetching corpus: 18749, signal 848592/991720 (executing program) 2021/03/01 16:31:53 fetching corpus: 18799, signal 849399/992348 (executing program) 2021/03/01 16:31:53 fetching corpus: 18849, signal 850121/992934 (executing program) 2021/03/01 16:31:53 fetching corpus: 18899, signal 851251/993653 (executing program) 2021/03/01 16:31:53 fetching corpus: 18949, signal 851664/994124 (executing program) 2021/03/01 16:31:54 fetching corpus: 18999, signal 852080/994636 (executing program) 2021/03/01 16:31:54 fetching corpus: 19049, signal 852615/995178 (executing program) 2021/03/01 16:31:54 fetching corpus: 19099, signal 853357/995747 (executing program) 2021/03/01 16:31:55 fetching corpus: 19149, signal 853835/996225 (executing program) 2021/03/01 16:31:55 fetching corpus: 19199, signal 854419/996788 (executing program) 2021/03/01 16:31:55 fetching corpus: 19249, signal 855077/997386 (executing program) 2021/03/01 16:31:55 fetching corpus: 19299, signal 855552/997855 (executing program) 2021/03/01 16:31:56 fetching corpus: 19349, signal 856075/998328 (executing program) 2021/03/01 16:31:56 fetching corpus: 19399, signal 856875/998887 (executing program) 2021/03/01 16:31:56 fetching corpus: 19449, signal 858345/999675 (executing program) 2021/03/01 16:31:56 fetching corpus: 19499, signal 858818/1000151 (executing program) 2021/03/01 16:31:56 fetching corpus: 19549, signal 859376/1000653 (executing program) 2021/03/01 16:31:57 fetching corpus: 19599, signal 859716/1001120 (executing program) 2021/03/01 16:31:57 fetching corpus: 19649, signal 860442/1001647 (executing program) 2021/03/01 16:31:57 fetching corpus: 19699, signal 861442/1002243 (executing program) 2021/03/01 16:31:58 fetching corpus: 19749, signal 861981/1002772 (executing program) 2021/03/01 16:31:58 fetching corpus: 19799, signal 863760/1003562 (executing program) 2021/03/01 16:31:58 fetching corpus: 19849, signal 864453/1004106 (executing program) 2021/03/01 16:31:58 fetching corpus: 19899, signal 864972/1004560 (executing program) 2021/03/01 16:31:59 fetching corpus: 19949, signal 865580/1005059 (executing program) 2021/03/01 16:31:59 fetching corpus: 19999, signal 866624/1005662 (executing program) 2021/03/01 16:31:59 fetching corpus: 20049, signal 867303/1006166 (executing program) 2021/03/01 16:32:00 fetching corpus: 20099, signal 868038/1006692 (executing program) 2021/03/01 16:32:00 fetching corpus: 20149, signal 868978/1007258 (executing program) 2021/03/01 16:32:00 fetching corpus: 20199, signal 869510/1007715 (executing program) 2021/03/01 16:32:00 fetching corpus: 20249, signal 870094/1008200 (executing program) 2021/03/01 16:32:00 fetching corpus: 20299, signal 870575/1008664 (executing program) 2021/03/01 16:32:01 fetching corpus: 20349, signal 871107/1009110 (executing program) 2021/03/01 16:32:01 fetching corpus: 20399, signal 872186/1009677 (executing program) 2021/03/01 16:32:01 fetching corpus: 20449, signal 872823/1010162 (executing program) 2021/03/01 16:32:01 fetching corpus: 20499, signal 873548/1010665 (executing program) 2021/03/01 16:32:01 fetching corpus: 20549, signal 874323/1011166 (executing program) 2021/03/01 16:32:02 fetching corpus: 20599, signal 875386/1011732 (executing program) 2021/03/01 16:32:02 fetching corpus: 20649, signal 875711/1012118 (executing program) 2021/03/01 16:32:02 fetching corpus: 20699, signal 876339/1012599 (executing program) 2021/03/01 16:32:02 fetching corpus: 20749, signal 876857/1013015 (executing program) 2021/03/01 16:32:03 fetching corpus: 20799, signal 877335/1013433 (executing program) 2021/03/01 16:32:03 fetching corpus: 20849, signal 878294/1013929 (executing program) 2021/03/01 16:32:03 fetching corpus: 20899, signal 878700/1014321 (executing program) 2021/03/01 16:32:03 fetching corpus: 20949, signal 879256/1014758 (executing program) 2021/03/01 16:32:04 fetching corpus: 20999, signal 879733/1015186 (executing program) 2021/03/01 16:32:04 fetching corpus: 21049, signal 880744/1015675 (executing program) 2021/03/01 16:32:04 fetching corpus: 21099, signal 881615/1016139 (executing program) 2021/03/01 16:32:05 fetching corpus: 21149, signal 882460/1016625 (executing program) 2021/03/01 16:32:05 fetching corpus: 21199, signal 882928/1017014 (executing program) 2021/03/01 16:32:05 fetching corpus: 21249, signal 883428/1017414 (executing program) 2021/03/01 16:32:05 fetching corpus: 21299, signal 883861/1017813 (executing program) 2021/03/01 16:32:06 fetching corpus: 21349, signal 884298/1018226 (executing program) 2021/03/01 16:32:06 fetching corpus: 21399, signal 884774/1018634 (executing program) 2021/03/01 16:32:06 fetching corpus: 21449, signal 885119/1019010 (executing program) 2021/03/01 16:32:06 fetching corpus: 21499, signal 885796/1019453 (executing program) 2021/03/01 16:32:07 fetching corpus: 21549, signal 886245/1019848 (executing program) 2021/03/01 16:32:07 fetching corpus: 21599, signal 886610/1020206 (executing program) 2021/03/01 16:32:07 fetching corpus: 21649, signal 887422/1020678 (executing program) 2021/03/01 16:32:07 fetching corpus: 21699, signal 887753/1021028 (executing program) 2021/03/01 16:32:08 fetching corpus: 21749, signal 892773/1022205 (executing program) 2021/03/01 16:32:08 fetching corpus: 21799, signal 893266/1022571 (executing program) 2021/03/01 16:32:08 fetching corpus: 21849, signal 893919/1022994 (executing program) 2021/03/01 16:32:09 fetching corpus: 21899, signal 894307/1023366 (executing program) 2021/03/01 16:32:09 fetching corpus: 21949, signal 894943/1023763 (executing program) 2021/03/01 16:32:09 fetching corpus: 21999, signal 895538/1024130 (executing program) 2021/03/01 16:32:09 fetching corpus: 22049, signal 895962/1024505 (executing program) 2021/03/01 16:32:09 fetching corpus: 22099, signal 896674/1024905 (executing program) 2021/03/01 16:32:10 fetching corpus: 22149, signal 897352/1025297 (executing program) 2021/03/01 16:32:10 fetching corpus: 22199, signal 897804/1025620 (executing program) 2021/03/01 16:32:10 fetching corpus: 22249, signal 898232/1025983 (executing program) 2021/03/01 16:32:10 fetching corpus: 22299, signal 898678/1026309 (executing program) 2021/03/01 16:32:11 fetching corpus: 22349, signal 899226/1026655 (executing program) 2021/03/01 16:32:11 fetching corpus: 22399, signal 899650/1027008 (executing program) 2021/03/01 16:32:11 fetching corpus: 22449, signal 900603/1027428 (executing program) 2021/03/01 16:32:11 fetching corpus: 22499, signal 901362/1027795 (executing program) 2021/03/01 16:32:12 fetching corpus: 22549, signal 901736/1028143 (executing program) 2021/03/01 16:32:12 fetching corpus: 22599, signal 902081/1028470 (executing program) 2021/03/01 16:32:12 fetching corpus: 22649, signal 902668/1028834 (executing program) 2021/03/01 16:32:12 fetching corpus: 22699, signal 903083/1029162 (executing program) 2021/03/01 16:32:13 fetching corpus: 22749, signal 903563/1029529 (executing program) 2021/03/01 16:32:13 fetching corpus: 22799, signal 904072/1029854 (executing program) 2021/03/01 16:32:13 fetching corpus: 22849, signal 904582/1030160 (executing program) 2021/03/01 16:32:13 fetching corpus: 22899, signal 904948/1030500 (executing program) 2021/03/01 16:32:13 fetching corpus: 22949, signal 905365/1030829 (executing program) 2021/03/01 16:32:14 fetching corpus: 22999, signal 905788/1031138 (executing program) 2021/03/01 16:32:14 fetching corpus: 23049, signal 906100/1031411 (executing program) 2021/03/01 16:32:14 fetching corpus: 23099, signal 906628/1031694 (executing program) 2021/03/01 16:32:14 fetching corpus: 23149, signal 907277/1032049 (executing program) 2021/03/01 16:32:15 fetching corpus: 23199, signal 907652/1032379 (executing program) 2021/03/01 16:32:15 fetching corpus: 23249, signal 908028/1032688 (executing program) 2021/03/01 16:32:15 fetching corpus: 23299, signal 908428/1032995 (executing program) 2021/03/01 16:32:16 fetching corpus: 23349, signal 908824/1033279 (executing program) 2021/03/01 16:32:16 fetching corpus: 23399, signal 909557/1033628 (executing program) 2021/03/01 16:32:16 fetching corpus: 23449, signal 909982/1033950 (executing program) 2021/03/01 16:32:16 fetching corpus: 23499, signal 910363/1034212 (executing program) 2021/03/01 16:32:17 fetching corpus: 23549, signal 910897/1034526 (executing program) 2021/03/01 16:32:17 fetching corpus: 23599, signal 911272/1034820 (executing program) 2021/03/01 16:32:17 fetching corpus: 23649, signal 911670/1035122 (executing program) 2021/03/01 16:32:17 fetching corpus: 23699, signal 912010/1035404 (executing program) 2021/03/01 16:32:18 fetching corpus: 23749, signal 912650/1035743 (executing program) 2021/03/01 16:32:18 fetching corpus: 23799, signal 913164/1036040 (executing program) 2021/03/01 16:32:18 fetching corpus: 23849, signal 913395/1036321 (executing program) 2021/03/01 16:32:18 fetching corpus: 23899, signal 913785/1036616 (executing program) 2021/03/01 16:32:19 fetching corpus: 23949, signal 914320/1036897 (executing program) 2021/03/01 16:32:19 fetching corpus: 23999, signal 914781/1037181 (executing program) 2021/03/01 16:32:20 fetching corpus: 24049, signal 915300/1037482 (executing program) 2021/03/01 16:32:20 fetching corpus: 24099, signal 915650/1037754 (executing program) 2021/03/01 16:32:20 fetching corpus: 24149, signal 916074/1038038 (executing program) 2021/03/01 16:32:20 fetching corpus: 24199, signal 916665/1038366 (executing program) 2021/03/01 16:32:20 fetching corpus: 24249, signal 917082/1038661 (executing program) 2021/03/01 16:32:21 fetching corpus: 24299, signal 917482/1038946 (executing program) 2021/03/01 16:32:21 fetching corpus: 24349, signal 917901/1039249 (executing program) 2021/03/01 16:32:21 fetching corpus: 24399, signal 918406/1039542 (executing program) 2021/03/01 16:32:21 fetching corpus: 24449, signal 918768/1039802 (executing program) 2021/03/01 16:32:21 fetching corpus: 24499, signal 919141/1040083 (executing program) 2021/03/01 16:32:22 fetching corpus: 24549, signal 919685/1040360 (executing program) 2021/03/01 16:32:22 fetching corpus: 24599, signal 920061/1040645 (executing program) 2021/03/01 16:32:22 fetching corpus: 24649, signal 920477/1040948 (executing program) 2021/03/01 16:32:23 fetching corpus: 24699, signal 920927/1041211 (executing program) 2021/03/01 16:32:23 fetching corpus: 24749, signal 921330/1041476 (executing program) 2021/03/01 16:32:23 fetching corpus: 24799, signal 921826/1041734 (executing program) 2021/03/01 16:32:23 fetching corpus: 24849, signal 922319/1042018 (executing program) 2021/03/01 16:32:24 fetching corpus: 24899, signal 922855/1042273 (executing program) 2021/03/01 16:32:24 fetching corpus: 24949, signal 923358/1042562 (executing program) 2021/03/01 16:32:25 fetching corpus: 24999, signal 923976/1042820 (executing program) 2021/03/01 16:32:25 fetching corpus: 25049, signal 924390/1043063 (executing program) 2021/03/01 16:32:25 fetching corpus: 25099, signal 925101/1043320 (executing program) 2021/03/01 16:32:25 fetching corpus: 25149, signal 925677/1043584 (executing program) 2021/03/01 16:32:26 fetching corpus: 25199, signal 925976/1043815 (executing program) 2021/03/01 16:32:26 fetching corpus: 25249, signal 926483/1044080 (executing program) 2021/03/01 16:32:26 fetching corpus: 25299, signal 926973/1044332 (executing program) 2021/03/01 16:32:26 fetching corpus: 25349, signal 927473/1044580 (executing program) 2021/03/01 16:32:27 fetching corpus: 25399, signal 928021/1044825 (executing program) 2021/03/01 16:32:27 fetching corpus: 25449, signal 928340/1045048 (executing program) 2021/03/01 16:32:27 fetching corpus: 25499, signal 928706/1045275 (executing program) 2021/03/01 16:32:27 fetching corpus: 25549, signal 929372/1045507 (executing program) 2021/03/01 16:32:28 fetching corpus: 25599, signal 929702/1045737 (executing program) 2021/03/01 16:32:28 fetching corpus: 25649, signal 930240/1045955 (executing program) 2021/03/01 16:32:28 fetching corpus: 25699, signal 930669/1046196 (executing program) 2021/03/01 16:32:28 fetching corpus: 25749, signal 931108/1046417 (executing program) 2021/03/01 16:32:29 fetching corpus: 25799, signal 931690/1046651 (executing program) 2021/03/01 16:32:29 fetching corpus: 25849, signal 932021/1046856 (executing program) 2021/03/01 16:32:29 fetching corpus: 25899, signal 932795/1047091 (executing program) 2021/03/01 16:32:29 fetching corpus: 25949, signal 933431/1047307 (executing program) 2021/03/01 16:32:30 fetching corpus: 25999, signal 933977/1047534 (executing program) 2021/03/01 16:32:30 fetching corpus: 26049, signal 934315/1047747 (executing program) 2021/03/01 16:32:30 fetching corpus: 26099, signal 934736/1047971 (executing program) 2021/03/01 16:32:30 fetching corpus: 26149, signal 935142/1048186 (executing program) 2021/03/01 16:32:31 fetching corpus: 26199, signal 935722/1048206 (executing program) [ 193.989176][ T3267] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.995528][ T3267] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/01 16:32:31 fetching corpus: 26249, signal 936020/1048206 (executing program) 2021/03/01 16:32:31 fetching corpus: 26299, signal 936528/1048206 (executing program) 2021/03/01 16:32:31 fetching corpus: 26349, signal 937036/1048206 (executing program) 2021/03/01 16:32:31 fetching corpus: 26399, signal 937437/1048206 (executing program) 2021/03/01 16:32:32 fetching corpus: 26449, signal 937982/1048218 (executing program) 2021/03/01 16:32:32 fetching corpus: 26499, signal 938396/1048218 (executing program) 2021/03/01 16:32:32 fetching corpus: 26549, signal 938826/1048218 (executing program) 2021/03/01 16:32:33 fetching corpus: 26599, signal 939265/1048222 (executing program) 2021/03/01 16:32:33 fetching corpus: 26649, signal 939610/1048222 (executing program) 2021/03/01 16:32:33 fetching corpus: 26699, signal 940280/1048222 (executing program) 2021/03/01 16:32:33 fetching corpus: 26749, signal 940710/1048222 (executing program) 2021/03/01 16:32:34 fetching corpus: 26799, signal 940981/1048222 (executing program) 2021/03/01 16:32:34 fetching corpus: 26849, signal 941249/1048222 (executing program) 2021/03/01 16:32:34 fetching corpus: 26899, signal 941660/1048224 (executing program) 2021/03/01 16:32:34 fetching corpus: 26949, signal 942358/1048224 (executing program) 2021/03/01 16:32:35 fetching corpus: 26999, signal 942682/1048224 (executing program) 2021/03/01 16:32:35 fetching corpus: 27049, signal 942981/1048224 (executing program) 2021/03/01 16:32:35 fetching corpus: 27099, signal 943505/1048224 (executing program) 2021/03/01 16:32:35 fetching corpus: 27149, signal 943855/1048224 (executing program) 2021/03/01 16:32:35 fetching corpus: 27199, signal 944263/1048224 (executing program) 2021/03/01 16:32:36 fetching corpus: 27249, signal 944649/1048224 (executing program) 2021/03/01 16:32:36 fetching corpus: 27299, signal 945202/1048224 (executing program) 2021/03/01 16:32:36 fetching corpus: 27349, signal 945618/1048224 (executing program) 2021/03/01 16:32:36 fetching corpus: 27399, signal 945867/1048225 (executing program) 2021/03/01 16:32:37 fetching corpus: 27449, signal 946199/1048225 (executing program) 2021/03/01 16:32:37 fetching corpus: 27499, signal 946666/1048225 (executing program) 2021/03/01 16:32:37 fetching corpus: 27549, signal 947068/1048225 (executing program) 2021/03/01 16:32:37 fetching corpus: 27599, signal 947576/1048225 (executing program) 2021/03/01 16:32:38 fetching corpus: 27649, signal 948054/1048225 (executing program) 2021/03/01 16:32:38 fetching corpus: 27699, signal 948525/1048226 (executing program) 2021/03/01 16:32:38 fetching corpus: 27749, signal 948873/1048226 (executing program) 2021/03/01 16:32:38 fetching corpus: 27799, signal 949318/1048226 (executing program) 2021/03/01 16:32:38 fetching corpus: 27849, signal 949786/1048226 (executing program) 2021/03/01 16:32:39 fetching corpus: 27899, signal 950243/1048227 (executing program) 2021/03/01 16:32:39 fetching corpus: 27949, signal 950626/1048227 (executing program) 2021/03/01 16:32:39 fetching corpus: 27999, signal 951116/1048227 (executing program) 2021/03/01 16:32:39 fetching corpus: 28049, signal 951353/1048227 (executing program) 2021/03/01 16:32:40 fetching corpus: 28099, signal 951876/1048227 (executing program) 2021/03/01 16:32:40 fetching corpus: 28149, signal 952361/1048228 (executing program) 2021/03/01 16:32:40 fetching corpus: 28199, signal 953965/1048228 (executing program) 2021/03/01 16:32:40 fetching corpus: 28249, signal 954298/1048228 (executing program) 2021/03/01 16:32:40 fetching corpus: 28299, signal 954873/1048228 (executing program) 2021/03/01 16:32:41 fetching corpus: 28349, signal 955355/1048229 (executing program) 2021/03/01 16:32:41 fetching corpus: 28399, signal 955852/1048229 (executing program) 2021/03/01 16:32:41 fetching corpus: 28449, signal 956265/1048229 (executing program) 2021/03/01 16:32:41 fetching corpus: 28499, signal 957086/1048229 (executing program) 2021/03/01 16:32:42 fetching corpus: 28549, signal 957559/1048229 (executing program) 2021/03/01 16:32:42 fetching corpus: 28599, signal 958124/1048229 (executing program) 2021/03/01 16:32:42 fetching corpus: 28649, signal 958377/1048229 (executing program) 2021/03/01 16:32:42 fetching corpus: 28699, signal 958729/1048229 (executing program) 2021/03/01 16:32:43 fetching corpus: 28749, signal 959007/1048230 (executing program) 2021/03/01 16:32:43 fetching corpus: 28799, signal 959345/1048230 (executing program) 2021/03/01 16:32:43 fetching corpus: 28849, signal 959698/1048230 (executing program) 2021/03/01 16:32:43 fetching corpus: 28899, signal 960051/1048230 (executing program) 2021/03/01 16:32:44 fetching corpus: 28949, signal 960587/1048230 (executing program) 2021/03/01 16:32:44 fetching corpus: 28999, signal 960835/1048230 (executing program) 2021/03/01 16:32:44 fetching corpus: 29049, signal 961373/1048230 (executing program) 2021/03/01 16:32:44 fetching corpus: 29099, signal 961615/1048230 (executing program) 2021/03/01 16:32:44 fetching corpus: 29149, signal 961903/1048230 (executing program) 2021/03/01 16:32:44 fetching corpus: 29199, signal 962524/1048230 (executing program) 2021/03/01 16:32:45 fetching corpus: 29249, signal 963208/1048230 (executing program) 2021/03/01 16:32:45 fetching corpus: 29299, signal 963691/1048230 (executing program) 2021/03/01 16:32:45 fetching corpus: 29349, signal 964036/1048230 (executing program) 2021/03/01 16:32:45 fetching corpus: 29399, signal 964643/1048230 (executing program) 2021/03/01 16:32:46 fetching corpus: 29449, signal 964958/1048230 (executing program) 2021/03/01 16:32:46 fetching corpus: 29499, signal 965317/1048230 (executing program) 2021/03/01 16:32:46 fetching corpus: 29549, signal 965925/1048230 (executing program) 2021/03/01 16:32:47 fetching corpus: 29599, signal 966298/1048230 (executing program) 2021/03/01 16:32:47 fetching corpus: 29649, signal 967200/1048230 (executing program) 2021/03/01 16:32:47 fetching corpus: 29699, signal 967636/1048230 (executing program) 2021/03/01 16:32:47 fetching corpus: 29749, signal 968089/1048230 (executing program) 2021/03/01 16:32:47 fetching corpus: 29799, signal 968427/1048230 (executing program) 2021/03/01 16:32:48 fetching corpus: 29849, signal 968691/1048230 (executing program) 2021/03/01 16:32:48 fetching corpus: 29899, signal 968969/1048230 (executing program) 2021/03/01 16:32:48 fetching corpus: 29949, signal 969556/1048230 (executing program) 2021/03/01 16:32:48 fetching corpus: 29999, signal 969938/1048230 (executing program) 2021/03/01 16:32:49 fetching corpus: 30049, signal 970556/1048230 (executing program) 2021/03/01 16:32:49 fetching corpus: 30099, signal 971007/1048230 (executing program) 2021/03/01 16:32:49 fetching corpus: 30149, signal 971802/1048230 (executing program) 2021/03/01 16:32:49 fetching corpus: 30199, signal 972266/1048230 (executing program) 2021/03/01 16:32:50 fetching corpus: 30249, signal 972701/1048230 (executing program) 2021/03/01 16:32:50 fetching corpus: 30299, signal 973418/1048230 (executing program) 2021/03/01 16:32:50 fetching corpus: 30349, signal 973680/1048230 (executing program) 2021/03/01 16:32:51 fetching corpus: 30399, signal 974383/1048230 (executing program) 2021/03/01 16:32:51 fetching corpus: 30449, signal 974892/1048230 (executing program) 2021/03/01 16:32:51 fetching corpus: 30499, signal 975180/1048230 (executing program) 2021/03/01 16:32:51 fetching corpus: 30549, signal 975460/1048230 (executing program) 2021/03/01 16:32:51 fetching corpus: 30599, signal 975788/1048230 (executing program) 2021/03/01 16:32:52 fetching corpus: 30649, signal 976116/1048230 (executing program) 2021/03/01 16:32:52 fetching corpus: 30699, signal 976441/1048230 (executing program) 2021/03/01 16:32:52 fetching corpus: 30749, signal 976785/1048230 (executing program) 2021/03/01 16:32:52 fetching corpus: 30799, signal 977079/1048230 (executing program) 2021/03/01 16:32:53 fetching corpus: 30849, signal 977420/1048230 (executing program) 2021/03/01 16:32:53 fetching corpus: 30899, signal 977731/1048230 (executing program) 2021/03/01 16:32:53 fetching corpus: 30949, signal 978086/1048236 (executing program) 2021/03/01 16:32:53 fetching corpus: 30999, signal 978366/1048236 (executing program) 2021/03/01 16:32:54 fetching corpus: 31049, signal 978766/1048236 (executing program) 2021/03/01 16:32:54 fetching corpus: 31099, signal 979326/1048236 (executing program) 2021/03/01 16:32:54 fetching corpus: 31149, signal 979905/1048236 (executing program) 2021/03/01 16:32:54 fetching corpus: 31199, signal 980419/1048236 (executing program) 2021/03/01 16:32:55 fetching corpus: 31249, signal 981507/1048236 (executing program) 2021/03/01 16:32:55 fetching corpus: 31299, signal 982135/1048237 (executing program) 2021/03/01 16:32:55 fetching corpus: 31349, signal 982580/1048237 (executing program) 2021/03/01 16:32:55 fetching corpus: 31399, signal 982865/1048237 (executing program) 2021/03/01 16:32:55 fetching corpus: 31449, signal 983212/1048237 (executing program) 2021/03/01 16:32:56 fetching corpus: 31499, signal 983615/1048237 (executing program) 2021/03/01 16:32:56 fetching corpus: 31549, signal 984073/1048237 (executing program) 2021/03/01 16:32:56 fetching corpus: 31599, signal 984363/1048238 (executing program) 2021/03/01 16:32:57 fetching corpus: 31649, signal 985022/1048238 (executing program) 2021/03/01 16:32:57 fetching corpus: 31699, signal 985314/1048238 (executing program) 2021/03/01 16:32:57 fetching corpus: 31749, signal 985570/1048239 (executing program) 2021/03/01 16:32:58 fetching corpus: 31799, signal 985968/1048239 (executing program) 2021/03/01 16:32:58 fetching corpus: 31849, signal 986347/1048239 (executing program) 2021/03/01 16:32:58 fetching corpus: 31899, signal 986716/1048239 (executing program) 2021/03/01 16:32:58 fetching corpus: 31949, signal 987022/1048247 (executing program) 2021/03/01 16:32:59 fetching corpus: 31999, signal 987781/1048249 (executing program) 2021/03/01 16:32:59 fetching corpus: 32049, signal 988253/1048254 (executing program) 2021/03/01 16:32:59 fetching corpus: 32099, signal 988629/1048254 (executing program) 2021/03/01 16:32:59 fetching corpus: 32149, signal 988905/1048258 (executing program) 2021/03/01 16:32:59 fetching corpus: 32199, signal 989251/1048258 (executing program) 2021/03/01 16:33:00 fetching corpus: 32249, signal 989573/1048258 (executing program) 2021/03/01 16:33:00 fetching corpus: 32299, signal 989958/1048258 (executing program) 2021/03/01 16:33:00 fetching corpus: 32349, signal 990306/1048261 (executing program) 2021/03/01 16:33:00 fetching corpus: 32399, signal 990680/1048261 (executing program) 2021/03/01 16:33:01 fetching corpus: 32449, signal 990969/1048263 (executing program) 2021/03/01 16:33:01 fetching corpus: 32499, signal 991224/1048263 (executing program) 2021/03/01 16:33:01 fetching corpus: 32549, signal 991748/1048265 (executing program) 2021/03/01 16:33:01 fetching corpus: 32599, signal 992089/1048265 (executing program) 2021/03/01 16:33:01 fetching corpus: 32649, signal 992724/1048265 (executing program) 2021/03/01 16:33:02 fetching corpus: 32699, signal 993220/1048265 (executing program) 2021/03/01 16:33:02 fetching corpus: 32749, signal 993538/1048265 (executing program) 2021/03/01 16:33:02 fetching corpus: 32799, signal 994117/1048265 (executing program) 2021/03/01 16:33:02 fetching corpus: 32849, signal 994418/1048265 (executing program) 2021/03/01 16:33:03 fetching corpus: 32899, signal 994900/1048265 (executing program) 2021/03/01 16:33:03 fetching corpus: 32949, signal 995196/1048267 (executing program) 2021/03/01 16:33:03 fetching corpus: 32999, signal 995602/1048267 (executing program) 2021/03/01 16:33:03 fetching corpus: 33049, signal 996685/1048267 (executing program) 2021/03/01 16:33:04 fetching corpus: 33099, signal 997399/1048268 (executing program) 2021/03/01 16:33:04 fetching corpus: 33149, signal 997688/1048286 (executing program) 2021/03/01 16:33:04 fetching corpus: 33199, signal 997978/1048286 (executing program) 2021/03/01 16:33:04 fetching corpus: 33249, signal 998189/1048287 (executing program) 2021/03/01 16:33:05 fetching corpus: 33299, signal 998674/1048287 (executing program) 2021/03/01 16:33:05 fetching corpus: 33349, signal 998914/1048287 (executing program) 2021/03/01 16:33:05 fetching corpus: 33399, signal 999327/1048289 (executing program) 2021/03/01 16:33:05 fetching corpus: 33449, signal 999536/1048289 (executing program) 2021/03/01 16:33:06 fetching corpus: 33499, signal 999785/1048289 (executing program) 2021/03/01 16:33:06 fetching corpus: 33549, signal 1000322/1048291 (executing program) 2021/03/01 16:33:06 fetching corpus: 33599, signal 1000805/1048291 (executing program) 2021/03/01 16:33:06 fetching corpus: 33649, signal 1001299/1048291 (executing program) 2021/03/01 16:33:06 fetching corpus: 33699, signal 1001695/1048291 (executing program) 2021/03/01 16:33:07 fetching corpus: 33749, signal 1001960/1048291 (executing program) 2021/03/01 16:33:07 fetching corpus: 33799, signal 1002207/1048291 (executing program) 2021/03/01 16:33:07 fetching corpus: 33849, signal 1002527/1048291 (executing program) 2021/03/01 16:33:07 fetching corpus: 33899, signal 1003363/1048291 (executing program) 2021/03/01 16:33:08 fetching corpus: 33949, signal 1003762/1048291 (executing program) 2021/03/01 16:33:08 fetching corpus: 33999, signal 1004165/1048291 (executing program) 2021/03/01 16:33:08 fetching corpus: 34049, signal 1004639/1048291 (executing program) 2021/03/01 16:33:08 fetching corpus: 34099, signal 1005045/1048291 (executing program) 2021/03/01 16:33:08 fetching corpus: 34149, signal 1005414/1048291 (executing program) 2021/03/01 16:33:09 fetching corpus: 34199, signal 1005674/1048291 (executing program) 2021/03/01 16:33:09 fetching corpus: 34249, signal 1006141/1048292 (executing program) 2021/03/01 16:33:09 fetching corpus: 34299, signal 1006450/1048292 (executing program) 2021/03/01 16:33:09 fetching corpus: 34349, signal 1006795/1048292 (executing program) 2021/03/01 16:33:09 fetching corpus: 34399, signal 1007095/1048292 (executing program) 2021/03/01 16:33:10 fetching corpus: 34449, signal 1007395/1048292 (executing program) 2021/03/01 16:33:10 fetching corpus: 34499, signal 1007821/1048293 (executing program) 2021/03/01 16:33:10 fetching corpus: 34549, signal 1008097/1048293 (executing program) 2021/03/01 16:33:10 fetching corpus: 34599, signal 1008550/1048293 (executing program) 2021/03/01 16:33:11 fetching corpus: 34649, signal 1009140/1048294 (executing program) 2021/03/01 16:33:11 fetching corpus: 34699, signal 1009604/1048294 (executing program) 2021/03/01 16:33:11 fetching corpus: 34749, signal 1009906/1048294 (executing program) 2021/03/01 16:33:11 fetching corpus: 34799, signal 1010302/1048294 (executing program) 2021/03/01 16:33:12 fetching corpus: 34849, signal 1010626/1048294 (executing program) 2021/03/01 16:33:12 fetching corpus: 34899, signal 1011007/1048294 (executing program) 2021/03/01 16:33:12 fetching corpus: 34949, signal 1011262/1048294 (executing program) 2021/03/01 16:33:12 fetching corpus: 34999, signal 1011518/1048294 (executing program) 2021/03/01 16:33:12 fetching corpus: 35049, signal 1011829/1048294 (executing program) 2021/03/01 16:33:13 fetching corpus: 35099, signal 1012251/1048294 (executing program) 2021/03/01 16:33:13 fetching corpus: 35149, signal 1012575/1048294 (executing program) 2021/03/01 16:33:13 fetching corpus: 35199, signal 1012990/1048294 (executing program) 2021/03/01 16:33:13 fetching corpus: 35249, signal 1013255/1048294 (executing program) 2021/03/01 16:33:14 fetching corpus: 35299, signal 1013617/1048294 (executing program) 2021/03/01 16:33:14 fetching corpus: 35349, signal 1013861/1048295 (executing program) 2021/03/01 16:33:14 fetching corpus: 35399, signal 1014133/1048295 (executing program) 2021/03/01 16:33:14 fetching corpus: 35449, signal 1014477/1048298 (executing program) 2021/03/01 16:33:14 fetching corpus: 35499, signal 1014723/1048298 (executing program) 2021/03/01 16:33:15 fetching corpus: 35549, signal 1015095/1048298 (executing program) 2021/03/01 16:33:15 fetching corpus: 35599, signal 1015440/1048298 (executing program) 2021/03/01 16:33:15 fetching corpus: 35649, signal 1015643/1048298 (executing program) 2021/03/01 16:33:15 fetching corpus: 35699, signal 1016361/1048298 (executing program) 2021/03/01 16:33:15 fetching corpus: 35749, signal 1016692/1048298 (executing program) 2021/03/01 16:33:15 fetching corpus: 35799, signal 1017024/1048298 (executing program) 2021/03/01 16:33:16 fetching corpus: 35849, signal 1017374/1048298 (executing program) 2021/03/01 16:33:16 fetching corpus: 35899, signal 1017722/1048304 (executing program) 2021/03/01 16:33:16 fetching corpus: 35949, signal 1018045/1048306 (executing program) 2021/03/01 16:33:16 fetching corpus: 35999, signal 1018473/1048306 (executing program) 2021/03/01 16:33:17 fetching corpus: 36049, signal 1018983/1048306 (executing program) 2021/03/01 16:33:17 fetching corpus: 36099, signal 1019251/1048306 (executing program) 2021/03/01 16:33:17 fetching corpus: 36149, signal 1019558/1048306 (executing program) 2021/03/01 16:33:17 fetching corpus: 36199, signal 1019785/1048306 (executing program) 2021/03/01 16:33:17 fetching corpus: 36248, signal 1020102/1048306 (executing program) 2021/03/01 16:33:18 fetching corpus: 36298, signal 1020485/1048307 (executing program) 2021/03/01 16:33:18 fetching corpus: 36348, signal 1020802/1048307 (executing program) 2021/03/01 16:33:18 fetching corpus: 36398, signal 1021367/1048307 (executing program) 2021/03/01 16:33:18 fetching corpus: 36448, signal 1021992/1048307 (executing program) 2021/03/01 16:33:19 fetching corpus: 36498, signal 1022214/1048307 (executing program) 2021/03/01 16:33:19 fetching corpus: 36548, signal 1022567/1048307 (executing program) 2021/03/01 16:33:19 fetching corpus: 36598, signal 1022845/1048307 (executing program) 2021/03/01 16:33:19 fetching corpus: 36648, signal 1023295/1048307 (executing program) 2021/03/01 16:33:19 fetching corpus: 36698, signal 1023678/1048307 (executing program) 2021/03/01 16:33:20 fetching corpus: 36748, signal 1024063/1048308 (executing program) 2021/03/01 16:33:20 fetching corpus: 36798, signal 1024530/1048308 (executing program) 2021/03/01 16:33:20 fetching corpus: 36848, signal 1024776/1048308 (executing program) 2021/03/01 16:33:20 fetching corpus: 36898, signal 1025068/1048308 (executing program) 2021/03/01 16:33:21 fetching corpus: 36948, signal 1025644/1048308 (executing program) 2021/03/01 16:33:21 fetching corpus: 36998, signal 1025918/1048313 (executing program) 2021/03/01 16:33:21 fetching corpus: 37048, signal 1026193/1048313 (executing program) 2021/03/01 16:33:21 fetching corpus: 37098, signal 1026580/1048313 (executing program) 2021/03/01 16:33:22 fetching corpus: 37148, signal 1026855/1048313 (executing program) 2021/03/01 16:33:22 fetching corpus: 37198, signal 1027064/1048313 (executing program) 2021/03/01 16:33:22 fetching corpus: 37248, signal 1027416/1048313 (executing program) 2021/03/01 16:33:22 fetching corpus: 37298, signal 1027730/1048313 (executing program) 2021/03/01 16:33:22 fetching corpus: 37348, signal 1027962/1048313 (executing program) 2021/03/01 16:33:22 fetching corpus: 37398, signal 1028233/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37448, signal 1028499/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37498, signal 1028800/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37548, signal 1029151/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37598, signal 1029534/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37648, signal 1029804/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37698, signal 1030138/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37748, signal 1030361/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37798, signal 1030591/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37848, signal 1030934/1048313 (executing program) 2021/03/01 16:33:23 fetching corpus: 37898, signal 1031167/1048313 (executing program) 2021/03/01 16:33:24 fetching corpus: 37948, signal 1031582/1048313 (executing program) 2021/03/01 16:33:24 fetching corpus: 37998, signal 1031915/1048313 (executing program) 2021/03/01 16:33:24 fetching corpus: 38048, signal 1032217/1048313 (executing program) 2021/03/01 16:33:24 fetching corpus: 38098, signal 1032504/1048313 (executing program) 2021/03/01 16:33:24 fetching corpus: 38148, signal 1032728/1048314 (executing program) 2021/03/01 16:33:24 fetching corpus: 38198, signal 1033053/1048314 (executing program) 2021/03/01 16:33:24 fetching corpus: 38248, signal 1033318/1048314 (executing program) 2021/03/01 16:33:24 fetching corpus: 38298, signal 1035953/1048314 (executing program) 2021/03/01 16:33:24 fetching corpus: 38348, signal 1036358/1048314 (executing program) 2021/03/01 16:33:24 fetching corpus: 38398, signal 1036749/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38448, signal 1037050/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38498, signal 1037547/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38548, signal 1038046/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38598, signal 1038444/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38648, signal 1038743/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38698, signal 1038954/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38748, signal 1039336/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38798, signal 1039624/1048314 (executing program) 2021/03/01 16:33:25 fetching corpus: 38848, signal 1039883/1048314 (executing program) 2021/03/01 16:33:26 fetching corpus: 38897, signal 1040144/1048314 (executing program) 2021/03/01 16:33:26 fetching corpus: 38947, signal 1040468/1048314 (executing program) 2021/03/01 16:33:26 fetching corpus: 38992, signal 1041139/1048314 (executing program) 2021/03/01 16:33:26 fetching corpus: 38992, signal 1041139/1048314 (executing program) 2021/03/01 16:33:28 starting 6 fuzzer processes 16:33:28 executing program 0: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/84) 16:33:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000047c0), 0x0, 0x0) 16:33:28 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000065c0)='/dev/null\x00', 0x4000, 0x0) 16:33:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000047c0), 0x0, 0x40) 16:33:29 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) dup2(r0, r1) 16:33:29 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)='net_prio.ifpriomap\x00', 0x2, 0x0) [ 252.470392][ T8439] IPVS: ftp: loaded support on port[0] = 21 [ 252.744130][ T8439] chnl_net:caif_netlink_parms(): no params data found [ 252.745733][ T8475] IPVS: ftp: loaded support on port[0] = 21 [ 252.935041][ T8439] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.943577][ T8439] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.951828][ T8439] device bridge_slave_0 entered promiscuous mode [ 252.963938][ T8439] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.971102][ T8439] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.979894][ T8439] device bridge_slave_1 entered promiscuous mode [ 253.019220][ T8439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.032999][ T8439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.035553][ T8587] IPVS: ftp: loaded support on port[0] = 21 [ 253.073994][ T8439] team0: Port device team_slave_0 added [ 253.086408][ T8439] team0: Port device team_slave_1 added [ 253.119289][ T8439] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.144793][ T8439] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.192245][ T8439] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.198238][ T8647] IPVS: ftp: loaded support on port[0] = 21 [ 253.207829][ T8439] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.216523][ T8439] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.249609][ T8439] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.390558][ T8439] device hsr_slave_0 entered promiscuous mode [ 253.406478][ T8439] device hsr_slave_1 entered promiscuous mode [ 253.436114][ T8761] IPVS: ftp: loaded support on port[0] = 21 [ 253.436337][ T8475] chnl_net:caif_netlink_parms(): no params data found [ 253.615756][ T8475] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.624296][ T8475] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.633936][ T8475] device bridge_slave_0 entered promiscuous mode [ 253.644293][ T8475] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.651362][ T8475] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.659647][ T8475] device bridge_slave_1 entered promiscuous mode [ 253.735617][ T8475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.808443][ T8475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.891091][ T8647] chnl_net:caif_netlink_parms(): no params data found [ 253.997557][ T8475] team0: Port device team_slave_0 added [ 254.027479][ T9113] IPVS: ftp: loaded support on port[0] = 21 [ 254.047802][ T8475] team0: Port device team_slave_1 added [ 254.084990][ T8587] chnl_net:caif_netlink_parms(): no params data found [ 254.105705][ T8761] chnl_net:caif_netlink_parms(): no params data found [ 254.170926][ T8475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.178811][ T8475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.205797][ T8475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 254.219548][ T8475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 254.228281][ T8475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.254762][ T8475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 254.314754][ T8475] device hsr_slave_0 entered promiscuous mode [ 254.322044][ T8475] device hsr_slave_1 entered promiscuous mode [ 254.329574][ T8475] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 254.337878][ T8475] Cannot create hsr debugfs directory [ 254.426790][ T8647] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.436347][ T8647] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.444919][ T8647] device bridge_slave_0 entered promiscuous mode [ 254.455580][ T8439] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 254.463176][ T2971] Bluetooth: hci0: command 0x0409 tx timeout [ 254.508123][ T8761] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.516650][ T8761] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.525408][ T8761] device bridge_slave_0 entered promiscuous mode [ 254.538443][ T8647] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.546194][ T8647] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.554553][ T8647] device bridge_slave_1 entered promiscuous mode [ 254.562124][ T8439] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 254.578187][ T8587] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.585477][ T8587] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.594659][ T8587] device bridge_slave_0 entered promiscuous mode [ 254.604348][ T8587] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.611405][ T8587] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.619917][ T8587] device bridge_slave_1 entered promiscuous mode [ 254.628072][ T8761] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.636369][ T8761] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.645321][ T8761] device bridge_slave_1 entered promiscuous mode [ 254.666446][ T8439] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 254.698231][ T8647] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.708895][ T8101] Bluetooth: hci1: command 0x0409 tx timeout [ 254.716754][ T8439] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 254.746099][ T8761] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.764694][ T8647] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.792089][ T8587] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.802890][ T8761] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.836253][ T8587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.863599][ T8647] team0: Port device team_slave_0 added [ 254.885536][ T8761] team0: Port device team_slave_0 added [ 254.911357][ T8647] team0: Port device team_slave_1 added [ 254.931936][ T8761] team0: Port device team_slave_1 added [ 254.942682][ T8101] Bluetooth: hci2: command 0x0409 tx timeout [ 254.969387][ T8587] team0: Port device team_slave_0 added [ 254.991806][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.999618][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.026224][ T8647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.078066][ T8587] team0: Port device team_slave_1 added [ 255.097036][ T8647] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.107654][ T8647] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.134765][ T8647] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.180650][ T8761] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.182201][ T19] Bluetooth: hci3: command 0x0409 tx timeout [ 255.194397][ T8761] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.224515][ T8761] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.245370][ T9113] chnl_net:caif_netlink_parms(): no params data found [ 255.260271][ T8587] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 255.267727][ T8587] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.294694][ T8587] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.308591][ T8587] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.315750][ T8587] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.343878][ T8587] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.357700][ T8761] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.365314][ T8761] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.392489][ T8761] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.422978][ T3267] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.427804][ T2971] Bluetooth: hci4: command 0x0409 tx timeout [ 255.429302][ T3267] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.461631][ T8647] device hsr_slave_0 entered promiscuous mode [ 255.470152][ T8647] device hsr_slave_1 entered promiscuous mode [ 255.477210][ T8647] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.487744][ T8647] Cannot create hsr debugfs directory [ 255.539231][ T8587] device hsr_slave_0 entered promiscuous mode [ 255.547759][ T8587] device hsr_slave_1 entered promiscuous mode [ 255.557313][ T8587] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.566479][ T8587] Cannot create hsr debugfs directory [ 255.635608][ T8761] device hsr_slave_0 entered promiscuous mode [ 255.647503][ T8761] device hsr_slave_1 entered promiscuous mode [ 255.654113][ T8761] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.661660][ T8761] Cannot create hsr debugfs directory [ 255.686208][ T8475] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 255.777046][ T8475] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 255.788768][ T8475] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 255.827542][ T8475] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 255.837023][ T9113] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.848480][ T9113] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.857653][ T9113] device bridge_slave_0 entered promiscuous mode [ 255.867376][ T9113] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.877481][ T9113] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.885808][ T9113] device bridge_slave_1 entered promiscuous mode [ 255.970006][ T8439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.993417][ T7] Bluetooth: hci5: command 0x0409 tx timeout [ 256.041455][ T9113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.058725][ T8439] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.084418][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.094876][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.108702][ T9113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.147725][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.165192][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.175027][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.182405][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.191037][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.203175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.211498][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.218691][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.228030][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.243452][ T8587] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 256.265986][ T8587] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 256.289357][ T9113] team0: Port device team_slave_0 added [ 256.298162][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.313252][ T8587] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 256.327297][ T9113] team0: Port device team_slave_1 added [ 256.351235][ T9113] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 256.358512][ T9113] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.386311][ T9113] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 256.401075][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.410532][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.420190][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.429474][ T8587] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 256.456318][ T9113] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 256.465438][ T9113] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 256.493142][ T9113] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 256.505837][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.542278][ T9587] Bluetooth: hci0: command 0x041b tx timeout [ 256.565135][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.579208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.596729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.607979][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.617557][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.626770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.638445][ T8439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.660061][ T9113] device hsr_slave_0 entered promiscuous mode [ 256.669568][ T9113] device hsr_slave_1 entered promiscuous mode [ 256.676793][ T9113] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 256.685297][ T9113] Cannot create hsr debugfs directory [ 256.708334][ T8761] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 256.717487][ T8761] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 256.740370][ T8475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.757887][ T8761] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 256.770493][ T8761] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 256.781937][ T8101] Bluetooth: hci1: command 0x041b tx timeout [ 256.807229][ T8475] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.837281][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.846549][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.896274][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.907502][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.916818][ T3196] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.924043][ T3196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.932578][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.940631][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.948939][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.957785][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.966301][ T3196] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.973422][ T3196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.981422][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.996364][ T8439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.016518][ T8647] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 257.031918][ T9701] Bluetooth: hci2: command 0x041b tx timeout [ 257.045244][ T9587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.064124][ T8647] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 257.083364][ T8647] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 257.109355][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.118401][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.127322][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.136873][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.146271][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.167343][ T8647] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 257.205405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.218836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.228686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.256530][ T8475] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.267233][ T9635] Bluetooth: hci3: command 0x041b tx timeout [ 257.269999][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.303640][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.316094][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.347095][ T8587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.387487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.397660][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.460252][ T8761] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.491325][ T8439] device veth0_vlan entered promiscuous mode [ 257.507400][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.515899][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.525001][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.533089][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.540555][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.549940][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.559184][ T9635] Bluetooth: hci4: command 0x041b tx timeout [ 257.573958][ T8587] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.599277][ T8475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.607084][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.615124][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.624169][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.632996][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.641366][ T9635] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.648484][ T9635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.659510][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.670049][ T9113] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 257.685868][ T8439] device veth1_vlan entered promiscuous mode [ 257.697507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 257.709287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.719019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.729027][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.736210][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.758722][ T8761] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.770000][ T9113] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 257.781278][ T9113] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 257.802066][ T9113] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 257.819063][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 257.829331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.838127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.848000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.898994][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.908273][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.921484][ T9701] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.928596][ T9701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.938443][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.947200][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.956140][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.966510][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.975739][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.985129][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.994384][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.003275][ T9701] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.010329][ T9701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.018678][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.028291][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 258.037898][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.045971][ T9701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.071839][ T9650] Bluetooth: hci5: command 0x041b tx timeout [ 258.081419][ T8647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.090004][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 258.099750][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.134601][ T8439] device veth0_macvtap entered promiscuous mode [ 258.148103][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 258.160070][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.170420][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.182645][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.191162][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.200772][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.209901][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.219086][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.227458][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.236170][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.251834][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.260492][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.278888][ T8439] device veth1_macvtap entered promiscuous mode [ 258.293677][ T8647] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.308079][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.317807][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.327953][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.337029][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.346189][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.355481][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.364638][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.373888][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.384627][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.394233][ T9632] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.401334][ T9632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.409594][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.418140][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.426524][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.443569][ T8587] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 258.454926][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.488059][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.498902][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.510603][ T8475] device veth0_vlan entered promiscuous mode [ 258.524412][ T8761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.555188][ T8439] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 258.570619][ T8475] device veth1_vlan entered promiscuous mode [ 258.581294][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 258.594734][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.606361][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.617515][ T9304] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.624642][ T9304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.632008][ T8101] Bluetooth: hci0: command 0x040f tx timeout [ 258.641294][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.648889][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.661018][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.669872][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.680331][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.700105][ T8587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 258.716129][ T8439] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 258.743738][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 258.752547][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.761064][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.772885][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 258.781447][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.791310][ T9650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.806000][ T9113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.836582][ T8439] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.849535][ T8439] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.864844][ T9701] Bluetooth: hci1: command 0x040f tx timeout [ 258.866211][ T8439] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.879980][ T8439] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.903248][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.911462][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.925514][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.935058][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.944002][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.953481][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.962911][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.985133][ T8647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.993742][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.008362][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.021032][ T8475] device veth0_macvtap entered promiscuous mode [ 259.039240][ T9113] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.058147][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.069474][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.092595][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.100120][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.125634][ T8475] device veth1_macvtap entered promiscuous mode [ 259.135638][ T9736] Bluetooth: hci2: command 0x040f tx timeout [ 259.192331][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 259.200370][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.218221][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.229710][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.242136][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.250838][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.264573][ T3196] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.271687][ T3196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.280465][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.289333][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.298698][ T3196] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.305815][ T3196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.318788][ T8101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.343730][ T3196] Bluetooth: hci3: command 0x040f tx timeout [ 259.348635][ T8761] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.397898][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.412249][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.419743][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.442345][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.450976][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.465066][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.474445][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.483487][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.498983][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.512599][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.525929][ T8475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 259.536091][ T8587] device veth0_vlan entered promiscuous mode [ 259.560363][ T8647] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.583071][ T9734] Bluetooth: hci4: command 0x040f tx timeout [ 259.586231][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.602609][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.610539][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.618790][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.628426][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.637951][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.646891][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.656425][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.666144][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.683997][ T8475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.698092][ T8475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.711130][ T8475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 259.727508][ T9113] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 259.741118][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.771422][ T8587] device veth1_vlan entered promiscuous mode [ 259.814942][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 259.824614][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.835681][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.844851][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.854593][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.863664][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.873120][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.885596][ T8475] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.898309][ T8475] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.907563][ T8475] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.916769][ T8475] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.989601][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 260.014285][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.026661][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 260.028757][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.054370][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.064538][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.074063][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 260.086410][ T8761] device veth0_vlan entered promiscuous mode [ 260.110589][ T9113] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.141322][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.141788][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 260.150411][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.165983][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 260.168535][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.182068][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.189518][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 260.198140][ T9304] Bluetooth: hci5: command 0x040f tx timeout [ 260.257752][ T8587] device veth0_macvtap entered promiscuous mode [ 260.265473][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.275360][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.284383][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.293798][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.304124][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.313297][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.327858][ T8761] device veth1_vlan entered promiscuous mode [ 260.351711][ T8647] device veth0_vlan entered promiscuous mode [ 260.369100][ T8587] device veth1_macvtap entered promiscuous mode [ 260.385710][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.408187][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 260.423182][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.431273][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.443053][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.494148][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 260.513123][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:33:37 executing program 0: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/84) [ 260.549591][ T9113] device veth0_vlan entered promiscuous mode [ 260.583307][ T8647] device veth1_vlan entered promiscuous mode [ 260.634938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.652627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.661089][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 260.677562][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.689058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.702056][ T9632] Bluetooth: hci0: command 0x0419 tx timeout [ 260.707778][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.733481][ T3196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.750310][ T8761] device veth0_macvtap entered promiscuous mode [ 260.789513][ T9113] device veth1_vlan entered promiscuous mode [ 260.826403][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 16:33:37 executing program 0: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/84) [ 260.834871][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 16:33:37 executing program 0: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000000)=""/84) [ 260.877951][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.900527][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 260.935000][ T8587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.947496][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 260.959183][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 260.961105][ T7] Bluetooth: hci1: command 0x0419 tx timeout [ 260.968418][ T8587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 16:33:38 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x5602, &(0x7f0000000040)={0x0, 0x0, 0x0}) [ 260.986607][ T8587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.998310][ T8587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.041948][ T8587] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 261.051242][ T8761] device veth1_macvtap entered promiscuous mode [ 261.081177][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 261.081926][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 261.082496][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.083076][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 261.083672][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.084237][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.141665][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.142369][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.150181][ T8647] device veth0_macvtap entered promiscuous mode [ 261.162828][ T8587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.162851][ T8587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.162864][ T8587] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.162880][ T8587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.164601][ T8587] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 261.169857][ T8587] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.169897][ T8587] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.169928][ T8587] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.169960][ T8587] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.182263][ T8101] Bluetooth: hci2: command 0x0419 tx timeout [ 261.193173][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.193867][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.194429][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.195021][ T9304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.195976][ T9758] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 261.207313][ T8761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 16:33:38 executing program 0: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) fgetxattr(r0, &(0x7f0000000080)=@random={'user.', '/dev/zero\x00'}, 0x0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 261.415508][ T8761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.425955][ T9701] Bluetooth: hci3: command 0x0419 tx timeout [ 261.432393][ T8761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.443438][ T8761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.455018][ T8761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.466524][ T8761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.531842][ T8761] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 261.542416][ T9113] device veth0_macvtap entered promiscuous mode [ 261.558979][ T8647] device veth1_macvtap entered promiscuous mode [ 261.576544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 16:33:38 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000f80)='/proc/thread-self\x00', 0x0, 0x0) [ 261.602554][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.629992][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 16:33:38 executing program 0: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000004940)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) [ 261.662371][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.696577][ T9113] device veth1_macvtap entered promiscuous mode 16:33:38 executing program 1: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) [ 261.708260][ T5] Bluetooth: hci4: command 0x0419 tx timeout [ 261.764374][ T8761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.776092][ T8761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.790934][ T8761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.804769][ T8761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.820414][ T8761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.842722][ T8761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.864010][ T8761] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 261.886600][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.928039][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.954144][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.993602][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.013178][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.030925][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.049510][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.061049][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.083661][ T8647] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.100916][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.116389][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.125925][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.135785][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.145095][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.157826][ T8761] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.168859][ T8761] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.180120][ T8761] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.190543][ T8761] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.206514][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.219819][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.230807][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.231646][ T5] Bluetooth: hci5: command 0x0419 tx timeout [ 262.241720][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.257390][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.268197][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.278113][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.288635][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.298745][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.318598][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.330356][ T9113] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.353591][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.368273][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.379669][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.395374][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.406501][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.417743][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.428544][ T8647] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.439226][ T8647] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.451117][ T8647] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.458679][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.468376][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.478224][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.487258][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.516820][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.532293][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.543865][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.554515][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.564446][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.575101][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.585019][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.595539][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.605734][ T9113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.616260][ T9113] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.628865][ T9113] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.640371][ T8647] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.650965][ T8647] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.659978][ T8647] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.668860][ T8647] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.685038][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.694993][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.727109][ T9113] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.745631][ T9113] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.755340][ T9113] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.764250][ T9113] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.787389][ T276] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 262.807945][ T276] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 262.845330][ T8101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 262.954857][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 262.987213][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.009461][ T133] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.028627][ T9758] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 263.057299][ T133] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.074029][ T9635] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 263.153537][ T133] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.174390][ T133] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.258007][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 263.279107][ T133] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.304693][ T133] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.317691][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.327734][ T8101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 263.340275][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.384907][ T99] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.394006][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 263.427767][ T99] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.441028][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.452028][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.463986][ T2971] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 263.489338][ T9632] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 16:33:40 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) fremovexattr(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='s']) 16:33:40 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80) 16:33:40 executing program 0: r0 = getpid() setpriority(0x0, r0, 0x7ff) 16:33:40 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.upper\x00') 16:33:40 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x3, 0xee01, 0x0, 0xffffffffffffffff}}) 16:33:40 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 16:33:40 executing program 2: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@phonet, 0xfffffffffffffed4) 16:33:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') write$P9_RATTACH(r0, 0x0, 0x0) 16:33:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b4b, 0x0) 16:33:40 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 16:33:41 executing program 5: recvfrom(0xffffffffffffffff, 0x0, 0xffffffffffffff12, 0x0, 0x0, 0xffffffffffffff69) 16:33:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001480)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0) 16:33:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 16:33:41 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@broadcast, @random="dc0c2efc8354", @val, {@ipv4}}, 0x0) 16:33:41 executing program 4: syz_emit_ethernet(0x62, &(0x7f0000000280)={@random="c7ec66bb2907", @broadcast, @val, {@ipv6}}, 0x0) 16:33:41 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @local, @val, {@ipv6}}, 0x0) 16:33:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f00000000c0)) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/236) 16:33:41 executing program 3: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 16:33:41 executing program 5: readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/62, 0x3e}, {&(0x7f0000000100)=""/160, 0xfffffffffffffebf}], 0x2) 16:33:41 executing program 1: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1018, 0xffffffffffffffff, 0x0) 16:33:41 executing program 1: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 16:33:41 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@random="4f3f10628a65", @random="d896bb4350e1", @val, {@ipv6}}, 0x0) 16:33:41 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 16:33:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000001740)="68f4196696f0be57e25c80f7893f1e207898b9273ccf1539eeeb3e1a5dadc3ed42da8f26f8c636ba7acaf9370898d082be5d8ecdeb04437bd61535f7e23e9f41f0ae87aed2ec9d6d75fa71225c73bfbc4a10ab715ce9e25c6c852864dc5dd793d480eb50c298148dfd9ce1dcada07d2162e7bb1275ef20f9719bc1ba4288c35e147dece3a0ab6f8622e6bfeb7fc49d05c9", 0x91, 0x8, 0x0, 0x0) 16:33:41 executing program 3: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) 16:33:41 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) fcntl$getown(r0, 0x5) 16:33:41 executing program 1: socket$inet6(0x18, 0x1, 0x6) 16:33:41 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x309, 0x0) 16:33:41 executing program 2: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 16:33:41 executing program 3: poll(0x0, 0x0, 0x6597) 16:33:41 executing program 0: syz_emit_ethernet(0xde, &(0x7f0000000200)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 16:33:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000000), 0x4) 16:33:41 executing program 1: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @random="dc0c2efc8354", @val, {@ipv4}}, 0x0) 16:33:41 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 16:33:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r2, &(0x7f0000001740)="68f4196696f0be57e25c80f7893f1e207898b9273ccf1539eeeb3e1a5dadc3ed42da8f26f8c636ba7acaf9370898d082be5d8ecdeb04437bd61535f7e23e9f41f0ae87aed2ec9d6d75fa71225c73bfbc4a10ab715ce9e25c6c852864dc5dd793d480eb50c298148dfd9ce1dcada07d2162e7bb1275ef20f9719bc1ba4288c35e147dece3a0ab6f8622e6bfeb7fc49d05c9", 0x91, 0x0, &(0x7f0000001840)=@abs={0x0, 0x0, 0x1}, 0x8) r3 = getpgid(0x0) r4 = geteuid() setsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={r3, r4, r1}, 0xc) geteuid() shmget(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_SET(0x0, 0x1, 0x0) setreuid(0x0, 0x0) 16:33:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) 16:33:41 executing program 5: select(0x40, &(0x7f0000000000)={0x7}, 0x0, 0x0, &(0x7f00000000c0)) 16:33:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 16:33:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001400)=[{&(0x7f0000000240)="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", 0x171}], 0x1}, 0x0) 16:33:42 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffea0, 0x0, 0x61}, 0x0) 16:33:42 executing program 5: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, 0x0, 0x0) 16:33:42 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) 16:33:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="f797a4aa45c8a38a667552c7838479f3ac5050df8b77d40608ccdb10483ddb160b8649b0d194afe59e29769f68665134905b9008d5ee0091f96a23aa621f76a5df14c31d00e443fe219b3206df8d5c2d690a0275c9ce80be77ec34d5de162cf5981f9bb7dcc9f521f805bb7ec647c1fbb60c9ade06d10490c40db9f53fd103f8c3422cad051e1210f9284c6bd8892db6600bd69b030703e6fe70f20d716db0a2b1d1021b9bdf7455763d8abcf536ce72df9a28cdf48364b6dddaa7370c142150664bf572", 0xc4}, {&(0x7f0000000140)="6e000fd1b0f55ee386937ac304d186a0b411434654f31dca67ae662ad39edcd88fb2316638bd642d3b2c5e65a69ca9d322892293a7fd87530f39bf8bcc15685f9262052abd363e0b70921e9b60fb1dd7e0044dc3eb4638d9d87e4e33274dbab4e989d7f62d68744ad1d7090e580972601f5abded46b1081d67b7955fd7cb5c92206599f6410052243d40e8e7767df60774c60953cfca00d2a888054bf320f461c0b5be090de2f10214a0d396a2ae6a89831577d03c8322e95eb169fc048729a0468f9c99d7", 0xad}], 0x10000000000000b3}, 0x0) 16:33:42 executing program 1: r0 = msgget(0x3, 0x268) msgctl$IPC_RMID(r0, 0x0) 16:33:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r0) 16:33:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0}, 0x0) 16:33:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001640)={&(0x7f0000000240)=@in={0x2, 0x3}, 0xc, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, &(0x7f0000000440)=[{0x808, 0x0, 0x0, "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"}], 0x808}, 0x0) 16:33:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1004, 0x0, 0x0) 16:33:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xcc) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', 0x8) 16:33:42 executing program 5: mlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 16:33:42 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100), 0xc) 16:33:42 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 16:33:42 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000000)={@broadcast, @random="dc0c2efc8354", @val, {@ipv4}}, 0x0) 16:33:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40a) 16:33:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) getpgid(r1) 16:33:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002cc0)={&(0x7f00000013c0)=@in6={0x18}, 0xc, &(0x7f0000002980)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:33:43 executing program 4: mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 16:33:43 executing program 2: msgget(0x2, 0x240) 16:33:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000000), 0x4) 16:33:43 executing program 1: read(0xffffffffffffffff, &(0x7f00000000c0)=""/250, 0xfffffffffffffd4d) 16:33:43 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x22) 16:33:43 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x1}, 0xc) 16:33:43 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000000)={@random="af1f5efba307", @empty, @val, {@generic={0x800}}}, 0x0) 16:33:43 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @random="390568dc6e39", @val, {@ipv4}}, 0x0) 16:33:43 executing program 4: r0 = semget(0x1, 0x0, 0x0) semctl$GETNCNT(r0, 0x0, 0x3, 0x0) 16:33:43 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x3011, r0, 0x0) 16:33:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) 16:33:43 executing program 5: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 16:33:43 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 16:33:43 executing program 4: r0 = geteuid() setreuid(r0, 0xffffffffffffffff) 16:33:43 executing program 3: syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv6}}, 0x0) 16:33:43 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) select(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x8}, &(0x7f0000000240)={0xa79}, 0x0) 16:33:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000000), 0x4) 16:33:43 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, 0x0, 0xfffffea1}, 0x0) 16:33:43 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0xfffffffffffffefe) 16:33:43 executing program 4: r0 = semget(0x1, 0x0, 0x0) semctl$GETZCNT(r0, 0x4, 0x7, 0x0) 16:33:43 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @remote, @val, {@ipv4}}, 0x0) 16:33:43 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @rand_addr, @broadcast, @local={0xac, 0x14, 0x0}}}}}, 0x0) 16:33:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setreuid(r1, 0xffffffffffffffff) 16:33:43 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@broadcast, @local, @val, {@ipv4}}, 0x0) 16:33:43 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)=""/176, &(0x7f00000000c0)=0xb0) 16:33:44 executing program 4: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) 16:33:44 executing program 2: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0) 16:33:44 executing program 1: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) 16:33:44 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x50b3f2972c7c8bc6, 0x0) 16:33:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r0, 0x0) 16:33:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 16:33:44 executing program 2: syz_emit_ethernet(0x6b, &(0x7f0000000100)={@random="977209df4af3", @empty, @val, {@ipv4}}, 0x0) 16:33:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) 16:33:44 executing program 0: madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 16:33:44 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @random="dc0c2efc8354", @val, {@ipv4}}, 0x0) 16:33:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) poll(&(0x7f0000000000)=[{r0, 0x4}, {r0, 0x40}], 0x2, 0x0) 16:33:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:33:44 executing program 4: mlock(&(0x7f00007fd000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000e20000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000fb4000/0x4000)=nil, 0x4000, 0x6) 16:33:44 executing program 0: mlock(&(0x7f0000c9b000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x4) 16:33:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000100)={@random="977209df4af3", @empty, @val, {@ipv4}}, 0x0) 16:33:44 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f00000002c0)=[{r0, 0x1}], 0x1, 0x101) 16:33:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001080)={&(0x7f0000000140)=@abs, 0xfea3, 0x0}, 0x0) 16:33:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f000000e880)={0x17, 0x0, 0xb3, 0x9bac, 0x8, 0x1}, 0x40) 16:33:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000000c0)=""/230, 0x26, 0xe6, 0x1}, 0x20) 16:33:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000004c0), 0x8) bpf$MAP_CREATE(0x0, &(0x7f000000e680)={0x1, 0x4, 0x2, 0x400, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) 16:33:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x7}, 0x40) 16:33:44 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001740)={&(0x7f0000001200)=@name, 0x10, 0x0}, 0x0) 16:33:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000151b00003d0301000000000095000e00000000007126000000000000bf67000000000000070600000fff07f07607000002000000070600000ee60000bf050000000000000f650000000000006507f4ff02000000070700004c0000001f75000000000000bf54000000000000070500000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 16:33:45 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) unlink(&(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000500)='./file0\x00', 0x0) 16:33:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 16:33:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x0, 0x0, 0x5}, 0x40) 16:33:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000540)=""/247, 0x2e, 0xf7, 0x1}, 0x20) 16:33:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xd, [@var={0x9, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x2e]}}, &(0x7f0000000040)=""/210, 0x35, 0xd2, 0x1}, 0x20) 16:33:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xd, [@var={0x9, 0x0, 0x0, 0xe, 0x3}, @typedef={0xb}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f, 0x2e]}}, &(0x7f0000000040)=""/210, 0x41, 0xd2, 0x1}, 0x20) 16:33:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x108f, &(0x7f0000000080)=[{&(0x7f0000000000)="48000000150081fb7059ae08030c0400021100b9eb1b87014e2102000000000000007c493872de1df68a6f9da4fc84a0f750371ed08a00000000000000007a033b000700bfe74703", 0x48}], 0x1}, 0x0) 16:33:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000050000000000000002000004"], &(0x7f00000000c0)=""/230, 0x39, 0xe6, 0x1}, 0x20) 16:33:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc0677746342e356e214b6b12e60ac1786a50b595ecb68db5f282675ef467d7fbde500c1e108abfb7491a203f669f83e2bbfbb3ed8d4d47ef5a2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2021) r1 = socket$kcm(0x2, 0x5, 0x84) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f00000001c0)}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="2e00000052008102a00f80854a36b8ab1c9599161a00070003000000", 0x1c}], 0x1}, 0x0) socketpair(0x14, 0x3, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000680)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000001840)=ANY=[@ANYRESOCT], 0x1130}, 0x6001) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x100720e, &(0x7f00000004c0)="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", 0x0, 0x17, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000000000), &(0x7f0000000080)}, 0x28) 16:33:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@datasec={0x3, 0x0, 0x0, 0xe, 0x2, [], "5e1c"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "90ba"}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000040)=""/189, 0x39, 0xbd, 0x1}, 0x20) 16:33:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f000000e880)={0x17, 0x0, 0xb3, 0x9bac, 0x0, 0x1}, 0x40) 16:33:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x10}]}}, &(0x7f00000000c0)=""/230, 0x26, 0xe6, 0x1}, 0x20) 16:33:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f00000000c0)=""/187, 0x32, 0xbb, 0x1}, 0x20) 16:33:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000007940)={0x10, 0x4, 0x0, 0x3}, 0x40) 16:33:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000e880)={0xf, 0x0, 0x0, 0x9bac, 0x0, 0x1}, 0x40) 16:33:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000300)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 16:33:45 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f000000e880)={0x17, 0x0, 0xb3, 0x9bac, 0x0, 0x1}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) 16:33:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x2c1c00}], 0x8, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 16:33:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000540)=""/247, 0x26, 0xf7, 0x1}, 0x20) 16:33:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f00000000c0)=""/230, 0x3a, 0xe6, 0x1}, 0x20) 16:33:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/230, 0x1a, 0xe6, 0x1}, 0x20) 16:33:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000540)=""/247, 0x2c, 0xf7, 0x1}, 0x20) 16:33:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000540)=""/247, 0x1a, 0xf7, 0x1}, 0x20) 16:33:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc0677746342e356e214b6b12e60ac1786a50b595ecb68db5f282675ef467d7fbde500c1e108abfb7491a203f669f83e2bbfbb3ed8d4d47ef5a2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2021) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f00000001c0)}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) socketpair(0x14, 0x3, 0x7, &(0x7f0000000480)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x6001) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000f580)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x100720e, &(0x7f00000004c0)="b95b17b700030000009e40f089061fff060000000000000177fbac141423e0000001c699da153f08e0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x17, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000000000), &(0x7f0000000080)}, 0x28) 16:33:45 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) 16:33:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x5}]}}, &(0x7f0000000240)=""/235, 0x26, 0xeb, 0x1}, 0x20) 16:33:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/uts\x00') close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x20}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000280), 0x3, r0}, 0x38) 16:33:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000040)=""/210, 0x2a, 0xd2, 0x1}, 0x20) 16:33:45 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}) 16:33:46 executing program 0: request_key(&(0x7f0000000000)='id_legacy\x00', 0x0, 0x0, 0x0) 16:33:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x400030) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xd) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000000c0)) 16:33:46 executing program 2: getrusage(0x1, &(0x7f0000000280)) 16:33:46 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x4}]}}]}, 0x3c}}, 0x0) 16:33:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 16:33:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/uts\x00') close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x1, 0x80, 0x400, 0x0, 0xffffffffffffffff, 0x20}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000280), 0x400, r0}, 0x38) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000280), 0x3, r0}, 0x38) 16:33:46 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001980)='./cgroup.net/syz0\x00', 0x200002, 0x0) 16:33:46 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) [ 269.651946][T10241] tun0: tun_chr_ioctl cmd 2147767521 16:33:46 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x4, {0xa, 0x0, 0x0, @empty}}}, 0x3a) 16:33:46 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@ipv4={[], [], @broadcast}, @ipv4={[], [], @private}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1040408}) 16:33:46 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0)='l2tp\x00', 0xffffffffffffffff) 16:33:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000180)={'ip6_vti0\x00', 0x0}) 16:33:46 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\"jNv'}, 0x0, 0x0, @userptr}) 16:33:47 executing program 3: socketpair(0x11, 0xa, 0x9, &(0x7f0000000100)) 16:33:47 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 16:33:47 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5452, &(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 16:33:47 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) 16:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811fdff) [ 270.080781][ T9632] usb 5-1: new high-speed USB device number 2 using dummy_hcd 16:33:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x100000001, 0x0, 0x2811fdff) [ 270.451107][ T9632] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 270.469258][ T9632] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 270.479870][ T9632] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 270.499177][ T9632] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 270.509724][ T9632] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 270.528577][ T9632] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 270.690583][ T9632] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 270.699737][ T9632] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 270.709826][ T9632] usb 5-1: Product: syz [ 270.714686][ T9632] usb 5-1: Manufacturer: syz [ 270.714757][ T9632] usb 5-1: SerialNumber: syz [ 271.020848][ T9632] cdc_ncm 5-1:1.0: bind() failure [ 271.036578][ T9632] cdc_ncm 5-1:1.1: bind() failure [ 271.047407][ T9632] usb 5-1: USB disconnect, device number 2 [ 271.760491][ T9632] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 272.150564][ T9632] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 272.161778][ T9632] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 272.171774][ T9632] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 272.181687][ T9632] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 272.191615][ T9632] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 272.201445][ T9632] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 272.400543][ T9632] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 272.409601][ T9632] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 272.418684][ T9632] usb 5-1: Product: syz [ 272.423673][ T9632] usb 5-1: Manufacturer: syz [ 272.428916][ T9632] usb 5-1: SerialNumber: syz 16:33:49 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) r2 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) shutdown(r1, 0x1) r3 = accept4(r0, 0x0, 0x0, 0x0) unshare(0x20000000) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 16:33:49 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000180)) 16:33:49 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) 16:33:49 executing program 1: fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0xee01, 0x0) 16:33:49 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYBLOB="7b00ea183980258d378be0bceca208ca25efe8e7408df2e2fc12d367c102a682d0ad9c1e1809edbabd61900df8b16cce71d69cbed81db197677100ac7aee0cb7dd758f1a8a1cb5accb5ea1acb694e3f85414d9a5d34f3d68800801000000e67091058874751a28e30412544951e9aa5e785a4389866ed2ab166669abba65e6eeead3", @ANYRESDEC=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x16) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 16:33:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x21, 0x0, &(0x7f0000000100)) [ 272.740624][ T9632] cdc_ncm 5-1:1.0: bind() failure [ 272.784752][ T9632] cdc_ncm 5-1:1.1: bind() failure 16:33:49 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 16:33:49 executing program 0: listxattr(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 272.829848][ T9632] usb 5-1: USB disconnect, device number 3 16:33:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) 16:33:49 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x8, 0x1) 16:33:50 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) [ 272.983503][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:33:50 executing program 0: unlink(&(0x7f00000004c0)='\x00') [ 273.074646][T10342] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 16:33:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 16:33:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400080, 0x0) 16:33:51 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40640, 0x0) 16:33:51 executing program 5: setxattr$trusted_overlay_opaque(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) 16:33:51 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) 16:33:51 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 16:33:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) futimesat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 16:33:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'hsr0\x00', &(0x7f0000000100)=@ethtool_perm_addr={0x20, 0x6, "2dbe774131fb"}}) 16:33:51 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2081, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 16:33:51 executing program 4: setxattr$security_capability(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='security.capability\x00', 0x0, 0x0, 0x0) 16:33:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = timerfd_create(0x0, 0x0) dup3(r0, r1, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:33:51 executing program 2: statx(0xffffffffffffff9c, &(0x7f0000004c80)='./file0\x00', 0x0, 0x0, 0x0) 16:33:51 executing program 5: readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/29, 0x1d) 16:33:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x72, 0x0, 0x0) 16:33:51 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) 16:33:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:33:51 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, 0x1c) 16:33:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8953, 0x0) 16:33:51 executing program 5: pipe(&(0x7f00000007c0)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 16:33:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000002e40)={'wg0\x00', &(0x7f0000002d40)=@ethtool_eeprom={0x43}}) 16:33:51 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@local}, 0x0, @in=@remote}}, 0xe8) 16:33:51 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x4e, &(0x7f0000000000), 0x4) 16:33:51 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x4, 0x0, 0x0) 16:33:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x891b, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) 16:33:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth0_macvtap\x00', &(0x7f0000000080)=@ethtool_ringparam={0x11}}) 16:33:51 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x1d, &(0x7f0000000000), 0x4) 16:33:51 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x43, 0x0, 0x0) 16:33:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)=@ethtool_drvinfo={0x3, "2e343217afcd3a19bf4740295be0c9547764a3ae339beaac2453463a7a03c774", "18ca920fbc775c41733a86e0fcc24f002a50e6e41b16ed27c08418e103140095", "108ad0b1da30917fe522bbd3363b9417e6f47c7bb6ca7146eb4a48270bb5fd6d", "b85ec95a46b1c45ea5ddc0aa9a543503dafb24b3be2be740b0050c66dc192a41", "2b7f124bdd29eadc0a0e5142d85113d4ae3b47cf5c380644bdf822ac0a4a2f24", "22e41b976adc8732d232687b"}}) 16:33:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x3, 0x0, 0x0) 16:33:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000380)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 16:33:52 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000080), &(0x7f0000000040)=0x4) 16:33:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x77, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) 16:33:52 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x12, 0x0, 0x0) 16:33:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x3}, @func]}, {0x0, [0x30, 0x0, 0x2e]}}, &(0x7f0000000380)=""/4096, 0x35, 0x1000, 0x1}, 0x20) 16:33:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:52 executing program 1: r0 = socket(0x2, 0x3, 0x15) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0xf0ff7f) 16:33:52 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x1a, &(0x7f0000000000), 0x4) 16:33:52 executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x4000802) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000f40)='ns/user\x00') 16:33:52 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x39, 0x0, 0x0) 16:33:52 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x1e, 0x0, 0x0) 16:33:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x27}}) 16:33:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000002fc0)='ethtool\x00', r0) 16:33:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x16, 0x0, &(0x7f0000000040)) 16:33:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:52 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@local, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) 16:33:52 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x43, &(0x7f0000000000), 0x4) 16:33:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002880)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000002980)=0x100) 16:33:52 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8916, 0x0) 16:33:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, 0x0, &(0x7f0000000040)) 16:33:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'wlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x3e}}) 16:33:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000008e00)={0x1a, 0x0, 0x0, 0x0, 0x1006, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 16:33:52 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000002e40)='ns/uts\x00') 16:33:52 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x21, &(0x7f0000000000), 0x4) 16:33:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000540)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, r1, 0xb71b7d16895fa65f, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 16:33:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000046c0)=[{&(0x7f0000000040)=@in={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000080)="6eefc3fa4a64f0a16b34f776888c5980324214473ad2fb650db8ef6c01bdcb447b84c7", 0x23}, {&(0x7f00000000c0)="51caf5cd339929b126bd126f0dd9b4863442eba1720b07da3e5998ea18c0f29df475a7f9f73c6de04e66110e859b28f3ae19ad7b04413e85b54220a313cc986aee868bdf82d3382105dcbb36c50861e843a10081857bbe1445f3186f58c030538c8f12287702219115b7759a5c499277b7301b7881d317ebb7b6494c04f6326ca987533002", 0x85}, {&(0x7f0000000180)="6ee399cc2b774f9d8d3e0bde610b2750f7648d608a4a798b5eb83eb7cf30b08dc80afa7675a942e4c9706e5ae1343ea693e1fcdbcf44e32d3f4d2211f20ad32be2b293b2f4cd4c18ad403c2a319b41b2576999f8b64583e9f8b105fe14159742fd453d9088d8399b5011ac0d47dcc2ddacc6c858dd0231dceaafa7a86b3820926a8d8c850624749bbd90de658bcdac110a117dfea56fd230ad621c01d25676e9274e441cf64284729ba95a9639a60774972b2f2d2620a8b003966f367fb85f96a64dce6e014700b269c169f37fb36a099199db0359ce135e53f40efdb20efea62d14419c15a829", 0xe7}, {&(0x7f00000002c0)="0bed3ddf4873fb82412da3e9c17558be636fbf213ca34ff2d3079482bb4ca951378dce6b2cb97163224c5b6f53fd2e043c380c165bf20737bc10b08ad81cdb527a34326b34f3b9dadc31ce4d14a3ffbad6098fa2dca91a35989d2aab6c6314220e1071cc990dbe8f6b505d087ad2cb8bef453d093c559429a5c9859beccfd45b665b1d33a4fd0d317aaf10bae12e8a259a52bf91d63531b96511eac3b023373694b33a60077b4ff73f831d1356cbd0147e006fd9f4b6c4f35578254485e404232a95ce29e5580d953d071740a7751306de510cc13261f5ca6d", 0xd9}, {&(0x7f00000003c0)="f2a316114f5ea281752ada21d2963068cc517d5e8e9c8da86490c6a308e8dd0e5548a03f958108b9e93d00c5ff595c07451e7098d20329abc096d90c91c6c9cbdd6f8e063a67b1fea7f1e66f96e6d42ceda9d23431ba61068c32962d9ae755", 0x5f}, {&(0x7f0000000680)="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", 0x21d}], 0x6}], 0x1, 0x4000040) 16:33:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000009040)={0x0, &(0x7f0000009000)=""/32, 0x0, 0x20}, 0x20) 16:33:53 executing program 2: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000012c0)=0x1, 0x4) 16:33:53 executing program 1: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x1ff) 16:33:53 executing program 5: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000046c0)=[{&(0x7f0000000040)=@in={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000080)="6eefc3fa4a64f0a16b34f776888c5980324214473ad2fb650db8ef6c01bdcb447b84c7", 0x23}, {&(0x7f00000000c0)="51caf5cd339929b126bd126f0dd9b4863442eba1720b07da3e5998ea18c0f29df475a7f9f73c6de04e66110e859b28f3ae19ad7b04413e85b54220a313cc986aee868bdf82d3382105dcbb36c50861e843a10081857bbe1445f3186f58c030538c8f12287702219115b7759a5c499277b7301b7881d317ebb7b6494c04f6326ca987533002", 0x85}, {&(0x7f0000000180)="6ee399cc2b774f9d8d3e0bde610b2750f7648d608a4a798b5eb83eb7cf30b08dc80afa7675a942e4c9706e5ae1343ea693e1fcdbcf44e32d3f4d2211f20ad32be2b293b2f4cd4c18ad403c2a319b41b2576999f8b64583e9f8b105fe14159742fd453d9088d8399b5011ac0d47dcc2ddacc6c858dd0231dceaafa7a86b3820926a8d8c850624749bbd90de658bcdac110a117dfea56fd230ad621c01d25676e9274e441cf64284729ba95a9639a60774972b2f2d2620a8b003966f367fb85f96a64dce6e014700b269c169f37fb36a099199db0359ce135e53f40efdb20efea62d14419c15a829", 0xe7}, {&(0x7f00000002c0)="0bed3ddf4873fb82412da3e9c17558be636fbf213ca34ff2d3079482bb4ca951378dce6b2cb97163224c5b6f53fd2e043c380c165bf20737bc10b08ad81cdb527a34326b34f3b9dadc31ce4d14a3ffbad6098fa2dca91a35989d2aab6c6314220e1071cc990dbe8f6b505d087ad2cb8bef453d093c559429a5c9859beccfd45b665b1d33a4fd0d317aaf10bae12e8a259a52bf91d63531b96511eac3b023373694b33a60077b4ff73f831d1356cbd0147e006fd9f4b6c4f35578254485e404232a95ce29e5580d953d071740a7751306de510cc13261f5ca6d", 0xd9}, {&(0x7f00000003c0)="f2a316114f5ea281752ada21d2963068cc517d5e8e9c8da86490c6a308e8dd0e5548a03f958108b9e93d00c5ff595c07451e7098d20329abc096d90c91c6c9cbdd6f8e063a67b1fea7f1e66f96e6d42ceda9d23431ba61068c32962d9ae755", 0x5f}, {&(0x7f0000000680)="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", 0x21d}], 0x6}], 0x1, 0x4000040) 16:33:53 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 16:33:53 executing program 0: r0 = socket(0x22, 0x3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 16:33:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0xc, 0x0, &(0x7f0000000040)) 16:33:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x1, 0xaa8}]}]}}, &(0x7f0000000380)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 16:33:53 executing program 5: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 16:33:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x6f, 0x0, &(0x7f0000000040)) 16:33:53 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x16, 0x0, 0x0) 16:33:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x71, 0x0, 0x0) 16:33:53 executing program 1: socketpair(0x11, 0x3, 0xebe, &(0x7f0000000000)) 16:33:53 executing program 5: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:53 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x6, 0x0, 0x0) 16:33:53 executing program 2: semget(0x3, 0x2, 0x605) 16:33:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x2, 0x0, &(0x7f0000000040)) 16:33:53 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009100)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000008ec0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:33:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x23, 0x0, 0x0) 16:33:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x101, 0x4) 16:33:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8953, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) 16:33:53 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x30, 0x0, 0x0) 16:33:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendto$l2tp(r0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x2, 0x0, @dev}, 0x10) 16:33:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000046c0)=[{&(0x7f0000000040)=@in={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000080)="6eefc3fa4a64f0a16b34f776888c5980324214473ad2fb650db8ef6c01bdcb447b84c7", 0x23}, {&(0x7f00000000c0)="51caf5cd339929b126bd126f0dd9b4863442eba1720b07da3e5998ea18c0f29df475a7f9f73c6de04e66110e859b28f3ae19ad7b04413e85b54220a313cc986aee868bdf82d3382105dcbb36c50861e843a10081857bbe1445f3186f58c030538c8f12287702219115b7759a5c499277b7301b7881d317ebb7b6494c04f6326ca987533002", 0x85}, {&(0x7f0000000180)="6ee399cc2b774f9d8d3e0bde610b2750f7648d608a4a798b5eb83eb7cf30b08dc80afa7675a942e4c9706e5ae1343ea693e1fcdbcf44e32d3f4d2211f20ad32be2b293b2f4cd4c18ad403c2a319b41b2576999f8b64583e9f8b105fe14159742fd453d9088d8399b5011ac0d47dcc2ddacc6c858dd0231dceaafa7a86b3820926a8d8c850624749bbd90de658bcdac110a117dfea56fd230ad621c01d25676e9274e441cf64284729ba95a9639a60774972b2f2d2620a8b003966f367fb85f96a64dce6e014700b269c169f37fb36a099199db0359ce135e53f40efdb20efea62d14419c15a8", 0xe6}, {&(0x7f00000002c0)="0bed3ddf4873fb82412da3e9c17558be636fbf213ca34ff2d3079482bb4ca951378dce6b2cb97163224c5b6f53fd2e043c380c165bf20737bc10b08ad81cdb527a34326b34f3b9dadc31ce4d14a3ffbad6098fa2dca91a35989d2aab6c6314220e1071cc990dbe8f6b505d087ad2cb8bef453d093c559429a5c9859beccfd45b665b1d33a4fd0d317aaf10bae12e8a259a52bf91d63531b96511eac3b023373694b33a60077b4ff73f831d1356cbd0147e006fd9f4b6c4f35578254485e404232a95ce29e5580d953d071740a7751306de510cc13261f5ca6d", 0xd9}, {&(0x7f00000003c0)="f2a316114f5ea281752ada21d2963068cc517d5e8e9c8da86490c6a308e8dd0e5548a03f958108b9e93d00c5ff595c07451e7098d20329abc096d90c91c6c9cbdd6f8e063a67b1fea7f1e66f96e6d42ceda9d23431ba61068c32962d9ae755bd", 0x60}, {&(0x7f0000000680)="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", 0x21d}], 0x6}], 0x1, 0x4000040) 16:33:54 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_mtu(r0, 0x29, 0x3e, 0x0, 0x0) 16:33:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1c, 0x0, &(0x7f0000000040)) 16:33:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f00000046c0)=[{&(0x7f0000000040)=@in={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000080)="6eefc3fa4a64f0a16b34f776888c5980324214473ad2fb650db8ef6c01bdcb447b84c7", 0x23}, {&(0x7f00000000c0)="51caf5cd339929b126bd126f0dd9b4863442eba1720b07da3e5998ea18c0f29df475a7f9f73c6de04e66110e859b28f3ae19ad7b04413e85b54220a313cc986aee868bdf82d3382105dcbb36c50861e843a10081857bbe1445f3186f58c030538c8f12287702219115b7759a5c499277b7301b7881d317ebb7b6494c04f6326ca9875330", 0x84}, {&(0x7f0000000180)="6ee399cc2b774f9d8d3e0bde610b2750f7648d608a4a798b5eb83eb7cf30b08dc80afa7675a942e4c9706e5ae1343ea693e1fcdbcf44e32d3f4d2211f20ad32be2b293b2f4cd4c18ad403c2a319b41b2576999f8b64583e9f8b105fe14159742fd453d9088d8399b5011ac0d47dcc2ddacc6c858dd0231dceaafa7a86b3820926a8d8c850624749bbd90de658bcdac110a117dfea56fd230ad621c01d25676e9274e441cf64284729ba95a9639a60774972b2f2d2620a8b003966f367fb85f96a64dce6e014700b269c169f37fb36a099199db0359ce135e53f40efdb20efea62d14419c15a829", 0xe7}, {&(0x7f00000002c0)="0bed3ddf4873fb82412da3e9c17558be636fbf213ca34ff2d3079482bb4ca951378dce6b2cb97163224c5b6f53fd2e043c380c165bf20737bc10b08ad81cdb527a34326b34f3b9dadc31ce4d14a3ffbad6098fa2dca91a35989d2aab6c6314220e1071cc990dbe8f6b505d087ad2cb8bef453d093c559429a5c9859beccfd45b665b1d33a4fd0d317aaf10bae12e8a259a52bf91d63531b96511eac3b023373694b33a60077b4ff73f831d1356cbd0147e006fd9f4b6c4f35578254485e404232a95ce29e5580d953d071740a7751306de510cc13261f5ca6d", 0xd9}, {&(0x7f00000003c0)="f2a316114f5ea281752ada21d2963068cc517d5e8e9c8da86490c6a308e8dd0e5548a03f958108b9e93d00c5ff595c07451e7098d20329abc096d90c91c6c9cbdd6f8e063a67b1fea7f1e66f96e6d42ceda9d23431ba61068c32962d9ae755bd", 0x60}, {&(0x7f0000000680)="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", 0x21d}], 0x6}], 0x1, 0x4000040) 16:33:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x3, 0x0, &(0x7f0000000040)) 16:33:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x14, 0x0, &(0x7f00000001c0)) 16:33:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2140, 0x0) 16:33:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@loopback, @local}, 0x8) 16:33:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 16:33:54 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000600)={{}, {0x0, 0x3938700}}, &(0x7f0000000640)) 16:33:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x70) 16:33:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:54 executing program 2: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x3ff, 0x0) 16:33:54 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000380)=0x80) write$nbd(r1, 0x0, 0x0) 16:33:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 16:33:54 executing program 3: r0 = socket(0x2, 0x3, 0x1) write$nbd(r0, &(0x7f0000000180)=ANY=[], 0x53) 16:33:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0) 16:33:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) 16:33:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 16:33:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @private1}, 0x1c) 16:33:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fstat(r0, &(0x7f0000000140)) 16:33:54 executing program 1: pipe2(&(0x7f0000001080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r0, 0x0, 0xfffffffffffffdec) 16:33:54 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:54 executing program 0: pipe2(&(0x7f0000004240)={0xffffffffffffffff}, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0xfffffffffffffca8) 16:33:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000040), 0x4) 16:33:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000001040)="d0", 0x1) 16:33:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000016c0)) 16:33:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x70) 16:33:55 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 16:33:55 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/psched\x00') ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 16:33:55 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000003040)) recvmmsg(r0, &(0x7f0000002f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16:33:55 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x240300, 0x0) 16:33:55 executing program 5: socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:55 executing program 3: select(0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, 0x2710}) [ 278.190521][T10625] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:33:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') fstat(r0, &(0x7f0000000540)) 16:33:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002f80), 0x0, 0x0, &(0x7f0000003080)) 16:33:55 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) 16:33:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x0) 16:33:55 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x220000, 0x0) 16:33:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xd3, &(0x7f00000000c0), 0x0) 16:33:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x0) 16:33:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f00000000c0), 0x0) 16:33:56 executing program 2: openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x201, 0x0) 16:33:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000280)={0x0, {{0x2, 0x0, @remote}}}, 0x108) 16:33:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f0000000040)='L', 0x1) 16:33:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x0) 16:33:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @remote, @dev}, 0xc) 16:33:56 executing program 1: r0 = eventfd(0x62) read$eventfd(r0, &(0x7f0000000140), 0x8) 16:33:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 16:33:56 executing program 0: select(0x47, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, 0x2710}) 16:33:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 16:33:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @private=0xa010100}, 0x10) 16:33:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640), 0x0, 0x0) 16:33:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) link(&(0x7f0000000000)='./file0\x00', 0x0) 16:33:56 executing program 0: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x95be969e000, 0x4) 16:33:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) 16:33:56 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 16:33:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)="f7de9d7df446dcff78ea6d5aa79fe87fb3c587c17bf259c15893c324c6a0bb61e2b106eab59a7b499976aedfe44c35833b9bf5ec05f6c3ddd1b77860143531c24dcf184316fbcc21be302ca9707f4bd27ca22bb74bfe5efbfa7f27c87b3bde4fdcb3d870a75e3212bec7edb66d4a00fb02ea134d725d4826b082b8261741b2745b165a5e46ec6df12dbc7561c3e04a378a", 0x91}], 0x1}, 0x9) 16:33:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640), 0x0, 0x0) 16:33:56 executing program 2: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 16:33:56 executing program 0: r0 = getpid() r1 = getpid() setpgid(r1, r0) 16:33:56 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 16:33:56 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) 16:33:56 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000300)=[{&(0x7f00000000c0)="f38ca7b96daedbeb61ed0221a65292b559a5c33892f00b8c0dfb677477cbe8a6b161bea2e6ead7343ad64508c27072dfe9ca498989c730c6d0df2476af3e1d522c4e3f896dcc0799648392e7174c13489645d4bfb2a89430a89643241c6d0d6714713c4d52b6da39e3c691f4b8a68653da425eb55304f573077e540c59fa28a93fa2dd5c650778efd2", 0x89}, {&(0x7f0000000180)="6825e7810b473d42db5e237017d460cda43c1ab71692433857841d21f8a876b4ea71af3ed575d0586b13b22e42ccb4132ebe5ae5b89a04729c06a5d63202139c2ec3ac89301fbe45d02af52b1137bcca66e7b8e2c251238201790723729d21aca231fcc4709fd05ecda751ec20247b99fb34af8fb78896fce8514add5bc499d0428ffe4301c7caf95897bb8f592d8caf0d1cfd11f3cb888b83de61042c773e6b8dc97a15b8e508", 0xa7}, {&(0x7f0000000040)="a9f4072bb6f7e4729855d3bab2edc2b807a24569e771f16930bb613ae54f63dbeeacc5", 0x23}, {&(0x7f0000000500)="6a20946286ea400d41c108ef7667e4fe924318e67c749332a45c725d34ce35703907137e07111efdb54ee1b66078764349e372c05bc3f735b6342568e41ef42d98546725a3807d7fa2d33ec64dae244d08d3d704127cd7bd2dcc0fe038c0c2891407a44c896ac06fd46581b27d99d18f2f364c227e0141aaa999206fa19927dfc6fa0e0b5e8310b8728db3b2954f8621c6c534062e0043ddbb3fa99ca50b5f26b7a34f691147e21b2674af8d62638598cfc1c9ca7a0132f0c537c9677dd28a9155416e135a4b3abacfda57125b8872c0dc6dbfa8618f17858b56f8ed6c8bbc8ac8cdc4ad28af83d34e9ecd4e8e5d8a4e931d5463669efc6a8b9fc5e2882230335fc7f3244709f452fe3fc75099c89b0226fdd6ed084a22d2fe4c4e15eadddc5cc97be9c9483b16791c7c90ac347ad6f8e0ace7fc48509ba8c4e615b29685ef258167369f0f9a4c6401bdcd8aeb77060b7aac9dfd6a78402f283604e65c91d340ba163aeb764ec929730705f3a6c9b57b2f9b5b7f8fe71f1473c9d88830d2a52b8958df8cc55c5ea7b12289f30b50419005ae7b19529cc6eb1796fecb86f61c2b5de07c4b9972399a61d860a2441bbf499766e225dfe19f4d2ed8a2f25a1676b35629a681647f73cef66b0dfc69906eb95501cb9f3318900be4c506684a1852d8a8955081fa841118fe937a6a8a8e375fbbc491344df90d517b9f8aee730af7868243ad0cecfd9ae4bcd67d20a721f373c25e0bf4eb12034de9bace207d2677a91f240fc9b890d5a5b15f507b8d294869264490a2af51a25a9dc57198d8ea71bb6b7901bbb6fa3e5e60cb885b1c7df6e08fb12297daf4eab040ef6a9204484c702b0e0e24e7aa8681f130257a4e418f6684d2fdb75f09806e85e5653ac2dc3aee82421a6290ade4d56255803900a715ef0efc183b4fbc9115dbd68a6e12ff7dd9e56cd31f9ad01c68bf555c4c7aab4325fe34e58fc7702f666771b9996206a4d4513cb36b8fa05174b2b08b208c2ba5a6eaa34c2583a5291d6817daae95916f35b3630d2a2243d1039898779cb8d139199edd9b7e823e61cc57a82f1f75e9b4ef020b2ea37c2f1534c52a2ded52f8a3c6484c0d270d1eed5f1c853dfaf231b348b43172654026ccd22841cc2aa9efe75416decd7058d01561fca94cbd064ab41137eaf2b9513225f1f96b1400f5633805d8c0dc6859b265cafe25ae107e4db156a882d66aa0ce47e9ef073f045b9f4a736e01fc166f0a7d84ce404610582b9e59e16e9c46f276839dea169299b498d51b9b6a3f62b32c55a8bb780716bef0cc9656459c28d59b2193d3a96076e5180bf886836a3e97da00449ec43cb9dd4decfe3b391f5bdd9199a26d6d655f621781d470acbb4353afb4c43d8b38bbf332562ffec92f1181e14ddb40f10be5ffd72274e42e7c60c6e92ee8999764fe92d4fd96f91a2835f1bbd9c3a5b84a743a35334c56e5300e841b7d430d681d8703c8acfaf0eecd71a781ede4ca2982a78a61ea094a80d0a57ed131b1972eaa1642fbc88fe96660c8f469e814f47614d74b3ea96fd5c91f3fb25f83a091845a880bece9bb4886ccc865f49721a07b45563271c073b5b477c27ca31b30a3bd28bd2ad2486a987dcbb5a745b02ee31ebbd339a194c49d72104b9795d020635bae6b83265340949d25f55df18ab67444d32394b4d05c4879dc761cc04c61823d3b65be3289370694a851e81d5cf175c43e8bfa6cb370d139f07f655eff1f88d2a8273c9d0604178a0f4cf13784171abec439620821652c17047fce13f729b2ca5f1de57cb107e1b84d1730e351ed3ef6e3dea9d6f9fbcadfaaf0a5202241355e51ad7bdf0985880a50c0afd59030f49889a9b3a96f969d3c145017d19f55fca5d81738fa979e6c57aaf3e84fd5ca4a0eca62e87b15666c85e5e307563640bd249589c1ff2dac7b046c9b6fc79449cabe71ac81aeb2310756aedae75354b3a7dd753888e5b974a52719b8e8497644726fe7d1ad11275f4965ed2485bda6acd730dbc21dedb2ccaf902b627dbc86c98b775ca4cebc2c2c0070057fa8c2bc88dc23555170450b79df1ee47d4464a93b68c241970509a6f73903ab175b65a12a31bcd497b699c695de6d7fe3f5e9fce9351b6b5dbf11b8a26f56edc37847e0409021d582292f9e78abc83fda1aefa6cad213414536f175378b4bf6e5f13027f0b17aafc12c96d43535ea3b87813fc390af9abeb4c4fcb47a31", 0x631}], 0x4}, 0x0) 16:33:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640), 0x0, 0x0) 16:33:56 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000440)=[{0x0, 0xc600000000000000}, {0x0, 0x2e}, {&(0x7f0000000280)="d6", 0x1}], 0x3}, 0x0) 16:33:57 executing program 0: wait4(0x0, 0x0, 0x1a, 0x0) 16:33:57 executing program 1: socketpair(0x15, 0x5, 0x5, &(0x7f0000000040)) 16:33:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5807}, 0x78) 16:33:57 executing program 3: perf_event_open(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:33:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000143c0)={&(0x7f0000014240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, 0x0, 0x26}, 0x20) 16:33:57 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="529b78092ee98b18a8587a3eb270937e88440fa21e538824a111a0277a0d0a16", 0x20}], 0x1}, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000440)=[{0x0}, {0x0, 0x2e}, {&(0x7f0000000280)="d6", 0x1}], 0x190}, 0x0) 16:33:57 executing program 4: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4002) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 16:33:57 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x1ff) 16:33:57 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002140)={&(0x7f0000000080), 0x20000090, 0x0}, 0x0) 16:33:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:57 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x4, 0x0, 0x9}, 0x40) 16:33:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1b, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5807}, 0x78) 16:33:57 executing program 4: socketpair(0x2, 0x5, 0x79, &(0x7f0000000000)) 16:33:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:33:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000)='W', 0x1, 0x22000000, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 16:33:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:57 executing program 2: syz_io_uring_setup(0x14ff, &(0x7f0000000380)={0x0, 0xb770, 0x8}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000400), &(0x7f0000000440)) [ 280.565355][T10755] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:33:57 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x227a, 0x0) 16:33:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:57 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000004580), 0x10) 16:33:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000380)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000580)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0xe3, &(0x7f00000003c0)=""/227}, &(0x7f00000004c0)="cb45bc4dde56", 0x0, 0x0, 0x0, 0x0, 0x0}) 16:33:57 executing program 4: io_setup(0x2, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 16:33:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2287, 0x0) 16:33:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x1275, 0x0) 16:33:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x20, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASTER={0x4}]}, 0x20}}, 0x0) 16:33:58 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x2, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x800) 16:33:58 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) 16:33:58 executing program 0: r0 = fork() capset(&(0x7f0000000200)={0x20071026, r0}, 0x0) 16:33:58 executing program 2: socketpair(0xa, 0x1, 0x106, &(0x7f0000000080)) 16:33:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b4000000000000007911c0000000000004000000000000009500000000000000499631fc2b94e5a3dd6c410e74"], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x36c}, 0x48) [ 281.126082][T10785] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure 16:33:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:58 executing program 4: socketpair(0x25, 0x5, 0x0, &(0x7f00000001c0)) 16:33:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0xfffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) r2 = dup3(r1, r0, 0x0) fallocate(r0, 0x100000003, 0x0, 0x80019c) lseek(r2, 0x0, 0x3) 16:33:58 executing program 3: r0 = openat$cuse(0xffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30}, 0x30) 16:33:58 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="2e00000013008105e00f80ecdbc0b5f207c804a01e000000302e20000000a3030e000c0002000200aacc2b2043b2", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 16:33:58 executing program 0: open$dir(&(0x7f0000000080)='./file1/../file0\x00', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file1\x00', 0x1411c2, 0x0) [ 281.722099][T10810] bridge0: port 1(bridge_slave_0) entered learning state 16:33:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) [ 281.776271][T10817] bridge0: port 1(bridge_slave_0) entered learning state 16:33:58 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x8000) mmap(&(0x7f0000702000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 16:33:58 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x240001a0) 16:33:58 executing program 1: syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) 16:33:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000001140)={0x0, 0x8, &(0x7f0000000140)="e705fa98c9e4be83"}) 16:33:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000100), 0x4) 16:33:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:33:59 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x240001a0) 16:33:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 16:33:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=""/28, 0x1c}}], 0x2a, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0xfffffd82) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8486, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x804, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r4, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x40000000011, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) 16:33:59 executing program 2: r0 = eventfd2(0x8000, 0x0) read$eventfd(r0, &(0x7f0000000700), 0x8) 16:33:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={&(0x7f0000001c80)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x430, 0x5, 0x0, 0x1, [{0x2e0, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x1fc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xac, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xb0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4}, @NL80211_PMSR_PEER_ATTR_REQ={0x60, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}]}, {0x14c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x118, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xe4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}]}, @NL80211_PMSR_ATTR_PEERS={0x684, 0x5, 0x0, 0x1, [{0x98, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x80, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x4c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}]}, {0x4d4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x74, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x6c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1b8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xac, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1d8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xcc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xa8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xa4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2d}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x84, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x218, 0x5, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x1c8, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x1ac, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x48, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x15c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x1dc, 0x5, 0x0, 0x1, [{0x1d8, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0xfc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xac, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x5c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x70, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x5c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}]}]}]}]}]}]}, 0xec4}}, 0x0) 16:33:59 executing program 1: sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getpgrp(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1}, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x20000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:33:59 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x240001a0) 16:33:59 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f000000df00)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 16:33:59 executing program 2: syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x145000) 16:33:59 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00', 0xffffffffffffffff) time(&(0x7f0000000b00)) 16:34:00 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x240001a0) 16:34:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, 0x0, 0x0, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:00 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000025c0)={0x2020}, 0x2020) 16:34:00 executing program 2: sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) pipe2$9p(&(0x7f0000001ac0), 0x0) 16:34:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=""/28, 0x1c}}], 0x2a, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0xfffffd82) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8486, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x804, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r4, &(0x7f0000000080)={0x10}, 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000340)=0x9, 0x4) fcntl$setstatus(r5, 0x4, 0x6100) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) 16:34:00 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 16:34:00 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x0, 0x0) write$FUSE_POLL(r0, 0x0, 0x0) 16:34:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x40, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6}, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000003240)=[{{0x0, 0x0, &(0x7f0000000640)=[{0x0}, {&(0x7f0000000840)=""/229, 0xe5}, {&(0x7f0000000a40)=""/199, 0xc7}], 0x3}, 0x4}, {{0x0, 0x0, 0x0}, 0xfff}], 0x2, 0x20, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x0, 0x1000004a, 0x200, 0x0, 0x8, 0x9, 0x7, 0x3, 0x2}, 0x0) getpgrp(r0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd5f}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x2, 0x2, 0x10001, 0x8, 0x5bf, 0x3, 0x3, 0x4}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x20000, 0x4) clone(0xd48d24434713bd52, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:34:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, 0x0, 0x0, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:00 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000041bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) removexattr(0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x6) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16d, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) msgctl$MSG_STAT(0x0, 0xb, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x20040004) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYRESDEC], 0x1000001bd) 16:34:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x20, 0x17, 0x101, 0x0, 0x0, {0x4}, [@typed={0xc, 0xc, 0x0, 0x0, @u64=0x1}]}, 0x20}}, 0x0) 16:34:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) close(r1) inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x2c00) 16:34:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, 0x0, 0x0, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:00 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') 16:34:00 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip_mr_vif\x00') 16:34:01 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0xefe, 0x100) 16:34:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0), 0x0, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, 0x0, 0x0) 16:34:01 executing program 4: mq_open(&(0x7f0000000040)='%$,--.$\'&,\x94\'\x00', 0x0, 0x0, 0x0) 16:34:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='pagemap\x00') read$FUSE(r0, &(0x7f0000004e80)={0x2020}, 0x2020) 16:34:01 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/anycast6\x00') 16:34:01 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 16:34:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0), 0x0, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:01 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/vlan/vlan0\x00') 16:34:01 executing program 4: socketpair(0x0, 0x8080b, 0x0, 0x0) 16:34:01 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121000, 0x0) 16:34:01 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0), 0x0, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:01 executing program 3: r0 = getpgid(0x0) ioprio_set$pid(0x1, r0, 0x4004) 16:34:01 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x18, 0x0) 16:34:01 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) 16:34:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{0x0}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:02 executing program 4: setrlimit(0x6, &(0x7f0000002080)={0x0, 0xfffffffffffffffb}) 16:34:02 executing program 3: syslog(0x3, &(0x7f0000000080)=""/82, 0x52) 16:34:02 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:34:02 executing program 2: sysfs$1(0x1, &(0x7f0000000180)='$}[\x00') 16:34:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4101, 0x0) 16:34:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{0x0}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:02 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000400), 0x0) 16:34:02 executing program 0: mq_open(&(0x7f0000000100)='.{\\3\x00', 0x0, 0x0, 0x0) 16:34:02 executing program 1: r0 = creat(&(0x7f0000001940)='./file0\x00', 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 16:34:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) 16:34:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{0x0}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/zoneinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004140)={0x2020}, 0x2020) 16:34:02 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/snmp6\x00') 16:34:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r2) 16:34:02 executing program 1: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040)={0x1257}, 0x0) 16:34:02 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x3f) 16:34:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:02 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:34:02 executing program 2: socket$inet(0x2, 0x0, 0xffffffff) 16:34:02 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000009680)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 16:34:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, 0x0}) 16:34:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:02 executing program 4: r0 = creat(&(0x7f0000001940)='./file0\x00', 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000180)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00}}}}, 0xa0) creat(&(0x7f0000000240)='./file0\x00', 0x0) 16:34:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/packet\x00') 16:34:02 executing program 2: getrandom(&(0x7f0000000080)=""/182, 0xb6, 0x0) 16:34:02 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 16:34:03 executing program 1: sched_setscheduler(0x0, 0x0, &(0x7f0000002080)) 16:34:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:03 executing program 4: r0 = getpgid(0x0) migrate_pages(r0, 0x5, 0x0, &(0x7f0000000040)=0x9) 16:34:03 executing program 3: socket$inet(0x2, 0xa, 0x4) 16:34:03 executing program 1: set_mempolicy(0x1, 0x0, 0x0) fork() 16:34:03 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') 16:34:03 executing program 0: name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000) 16:34:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1}], 0x1, 0x0) [ 286.222356][T11035] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 16:34:03 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) 16:34:03 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x3a, 0x0, 0x54) 16:34:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000002300)='nl80211\x00', r0) 16:34:03 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) futimesat(r0, 0x0, &(0x7f0000000040)) 16:34:03 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000140)) 16:34:03 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x5, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, 0x0) 16:34:03 executing program 4: socket(0x11, 0xa, 0x6658) 16:34:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1}], 0x1, 0x0) 16:34:03 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_gettime(0x0, 0x0) 16:34:03 executing program 3: sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, 0x0, 0xadfc18c9e9fad110) 16:34:03 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcsa\x00', 0x0, 0x0) 16:34:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000023c0)={&(0x7f00000022c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002380)={&(0x7f0000002340)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 16:34:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1}], 0x1, 0x0) 16:34:03 executing program 2: r0 = fork() process_vm_writev(r0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000340)=""/189, 0xbd}, {&(0x7f0000000400)=""/215, 0xd7}, {&(0x7f0000000500)=""/138, 0x8a}], 0x4, &(0x7f0000001a80)=[{&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f00000005c0)=""/204, 0xcc}, {0x0}, {&(0x7f0000000780)=""/92, 0x5c}, {&(0x7f0000000800)=""/25, 0x19}, {&(0x7f0000000840)=""/200, 0xc8}, {0x0}, {0x0}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x9, 0x0) 16:34:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 16:34:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f0000000080)) 16:34:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x338, 0xffffffff, 0x224, 0x0, 0x224, 0xffffffff, 0xffffffff, 0x35c, 0x35c, 0x35c, 0xffffffff, 0x4, 0x0, {[{{@ip={@remote, @private, 0x0, 0x0, 'bond0\x00', 'bridge0\x00'}, 0x0, 0xbc, 0x11c, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@ah={{0x2c, 'ah\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'batadv0\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x394) 16:34:03 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f00000010c0)='.log\x00', 0x283c0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:34:04 executing program 3: mq_open(&(0x7f0000000040)='#\x00', 0x40, 0x0, &(0x7f0000000080)={0x5, 0xdfe, 0x5}) 16:34:04 executing program 0: getitimer(0x1, &(0x7f0000000240)) 16:34:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)}], 0x1, 0x0) 16:34:04 executing program 1: r0 = openat$cuse(0xffffff9c, &(0x7f0000002140)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002040)={0x50, 0x0, r1}, 0x50) 16:34:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x2, 0x0, 0x3ff}, 0x40) 16:34:04 executing program 4: memfd_create(&(0x7f0000000000)='wpan0\x00', 0x2) 16:34:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000240)=0xc, 0x4) 16:34:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x1c, 0x0, 0x6, 0x101, 0x0, 0x0, {}, [@nested={0x4, 0xe, 0x0, 0x1, [@generic]}, @generic="f4"]}, 0x1c}}, 0x0) 16:34:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)}], 0x1, 0x0) 16:34:04 executing program 2: r0 = add_key$keyring(&(0x7f0000003640)='keyring\x00', &(0x7f0000003680)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_security(0x11, r0, 0x0, 0x0) 16:34:04 executing program 1: r0 = openat$cuse(0xffffff9c, &(0x7f0000002580)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$cuse(0xffffff9c, &(0x7f0000002140)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002500)={0x20, 0x0, r3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000002080)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x90) 16:34:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00'}) [ 287.288837][T11105] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 16:34:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f00000000c0)) 16:34:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)}], 0x1, 0x0) 16:34:04 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x8c183164632af04}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 16:34:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000)={0x0, 0xfe, [], [@generic={0x0, 0x7ef, "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"}]}, 0x800) 16:34:04 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0xffffffffffffff58) 16:34:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400, 0x0, 0x1, 0x1}, 0x20) 16:34:04 executing program 0: r0 = add_key$keyring(&(0x7f0000003640)='keyring\x00', &(0x7f0000003680)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000004d40)='logon\x00', &(0x7f0000004d80)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000004dc0)={0x0, "e70ccd9c7ce48499c53ea7d997bf794072c250c4d9d83c941331f2a726cf00425211c753c82777252a8ebc5e186be32b6738efc330450d8932cab5285a884a07"}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000002480)='logon\x00', &(0x7f00000024c0)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000002500)={0x0, "697f065fdfff01924395345005f305798469cbb8478e98848e687efcae457a97a22385d1b121288f80c828838b863b12c5d7fac4bb9f40c82de1b458c652dd29"}, 0x48, r0) 16:34:04 executing program 3: r0 = add_key$keyring(&(0x7f0000003640)='keyring\x00', &(0x7f0000003680)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000004d40)='logon\x00', &(0x7f0000004d80)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000004dc0)={0x0, "e70ccd9c7ce48499c53ea7d997bf794072c250c4d9d83c941331f2a726cf00425211c753c82777252a8ebc5e186be32b6738efc330450d8932cab5285a884a07"}, 0x48, r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r1, r2) 16:34:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000080)=""/43, &(0x7f00000000c0)=0x2b) 16:34:04 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x8c183164632af04}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 16:34:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 16:34:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000004000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r1 = socket(0x10, 0x400000000080803, 0x0) write(r1, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) 16:34:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001880)={0x4c, 0x12, 0xea5094c8dde63345, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0x4000000}}, 0x4c}}, 0x0) 16:34:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x50, 0x13, 0xea5094c8dde63345, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0x50}}, 0x0) 16:34:04 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="1f0000000104fffffd3b000007110600f30501000b00010002", 0x19) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write(r2, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 16:34:04 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000dc0)='batadv\x00', 0xffffffffffffffff) 16:34:04 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x8c183164632af04}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 16:34:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={0x0, @l2tp={0x2, 0x0, @dev}, @qipcrtr, @nfc, 0x5}) 16:34:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000070603000000000000000000000000000500010007"], 0x1c}}, 0x0) 16:34:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a2a76e252922cb18f6e2e2aba000000092e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000000000000001012b2bbfeaeb647b875027ecce66fd792bbf0e5bf3f6db1c00010000000000deff000000c0060000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002b80)=ANY=[@ANYBLOB="f80700002c00270d00"/20, @ANYRES32=r2, @ANYBLOB="02000000000000000f000009090001"], 0x7f8}}, 0x0) [ 288.008031][T11157] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 16:34:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket(0x10, 0x3, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492858, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x80) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) splice(r0, &(0x7f00000000c0)=0x200, r1, &(0x7f00000001c0), 0x1000, 0x9) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x1b}], 0x1, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b00000001000a0026000000450001070300001419001a0012000200040001000a000300"/57, 0x39}], 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket(0x10, 0x3, 0x0) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) [ 288.107151][T11166] netlink: 1992 bytes leftover after parsing attributes in process `syz-executor.0'. 16:34:05 executing program 2: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x8c183164632af04}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 16:34:05 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6, @link_local}, 0x10) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x3, @local}, 0x10) 16:34:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a2a76e252922cb18f6e2e2aba000000092e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000000000000001012b2bbfeaeb647b875027ecce66fd792bbf0e5bf3f6db1c00010000000000deff000000c0060000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=@newtfilter={0x58, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xf}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x2c, 0x2, [@TCA_U32_SEL={0x14}, @TCA_U32_INDEV={0x14, 0x8, 'nr0\x00'}]}}]}, 0x58}}, 0x0) [ 288.155042][T11167] netlink: 1992 bytes leftover after parsing attributes in process `syz-executor.0'. 16:34:05 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00', 0xffffffffffffffff) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)={0x1c, r1, 0x301, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 288.258774][T11175] device batadv0 entered promiscuous mode [ 288.278133][T11170] device batadv0 left promiscuous mode 16:34:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000400)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000440)={r1, 0x1, 0x6, @random="a583062746bf"}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) [ 288.323709][T11175] device batadv0 entered promiscuous mode [ 288.337019][T11170] device batadv0 left promiscuous mode [ 288.448762][T11188] device batadv_slave_1 entered promiscuous mode [ 288.477199][T11185] device batadv_slave_1 left promiscuous mode [ 288.497285][T11189] device batadv_slave_1 entered promiscuous mode [ 288.519851][T11185] device batadv_slave_1 left promiscuous mode 16:34:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000280), 0x4) 16:34:05 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="ab"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@remote, 0x39, r1}) r3 = socket(0x0, 0x1, 0x0) ioctl(r3, 0x8916, &(0x7f0000000000)) ioctl(r3, 0x8936, &(0x7f0000000000)) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) 16:34:05 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000160000000019000c04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r2}, 0x10) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x2) 16:34:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x4}}]}, 0x30}}, 0x0) 16:34:05 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x96a44f1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 16:34:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001d40)={&(0x7f0000002040)={0x6c, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x6c}}, 0x0) 16:34:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket(0x10, 0x3, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492858, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x80) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) splice(r0, &(0x7f00000000c0)=0x200, r1, &(0x7f00000001c0), 0x1000, 0x9) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x1b}], 0x1, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b00000001000a0026000000450001070300001419001a0012000200040001000a000300"/57, 0x39}], 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket(0x10, 0x3, 0x0) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 16:34:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x130, 0x130, 0x130, 0x0, 0x0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0x110, 0x130, 0x0, {}, [@common=@unspec=@rateest={{0x68, 'rateest\x00'}, {'macvlan0\x00', 'veth0_vlan\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x392) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000980)=ANY=[@ANYBLOB="17eba383cd68731bdf2cea884c7be94c8d2ff4656c85fbf3281fc9a37e7b7072d05bb3d74a1d36a16b7f4e3a12ebd0d7f7128665109b828ac35aa70a4e6e5d51589e28b10aea83e3ab69a3e88c519defc938e55d11fc01fd28c104544b9d850916140541d52605d860776f37284d47efc1c927172d3b9887e635e6a800", @ANYRES16, @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC, @ANYRES16], 0x0, 0x6e}, 0x20) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x4) r3 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, 0x0) pipe(0x0) read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r2, 0x0, 0x4002800) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x8000) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x78) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffbff7f6b, &(0x7f0000000040)={0xa, 0x4e20, 0x5, @loopback, 0x3}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="635efbd1e209882ce1476a5255f4972e9397778ca7998e778baa0b8598794174c2542c50203d308d2b3c34000586f8a9cd1b55da8a31b2794778", 0xfffffffffffffeb9, 0x8905, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0xc, &(0x7f0000000000)=@gcm_128={{}, '\x00', "5ad32d65000000ad5a9f979b8878634b", "ff97db00", "0200ea00"}, 0x28) 16:34:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000016007b2f"], 0x4c}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', r0) 16:34:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001880)={0x4c, 0x12, 0xea5094c8dde63345, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xffffff7f}}, 0x4c}}, 0x0) 16:34:06 executing program 5: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000042001fff"], 0x14}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 16:34:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a2a76e252922cb18f6e2e2aba000000092e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000000000000001012b2bbfeaeb647b875027ecce66fd792bbf0e5bf3f6db1c00010000000000deff000000c0060000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xf}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) 16:34:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000300)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@multicast1, @local, 0x0, 0x1, [@local]}, 0x14) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 16:34:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000002010500000000000000000002000000240001801400018008000100ac1414aa08000200ac1e00010c000280050001008e"], 0x38}}, 0x0) 16:34:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r1, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x80000007, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78605a5cf65ac618ded8974895abaff4b4834ff922b3f1e0b02bd67aa03059bcecc7a9541aa3b77e758044ab4ea6f7ae56d88fecf93a1a7503bf746bec66ba", 0x88012, 0x20c49a, 0x0, 0x27) 16:34:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000016007b2f"], 0x4c}}, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 16:34:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a2a76e252922cb18f6e2e2aba000000092e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000000000000001012b2bbfeaeb647b875027ecce66fd792bbf0e5bf3f6db1c00010000000000deff000000c0060000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x30, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xf}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x3}}]}, 0x30}}, 0x0) 16:34:07 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x17}}]}, 0x78}}, 0x0) [ 290.060523][T11253] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:34:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket(0x10, 0x3, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492858, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x80) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) splice(r0, &(0x7f00000000c0)=0x200, r1, &(0x7f00000001c0), 0x1000, 0x9) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x1b}], 0x1, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b00000001000a0026000000450001070300001419001a0012000200040001000a000300"/57, 0x39}], 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket(0x10, 0x3, 0x0) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) [ 290.116478][T11256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:34:07 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x12}, 0x1c, 0x0}, 0x0) 16:34:07 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x17}}, 0x2000009c, 0x0}, 0x0) 16:34:07 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x200006e4) [ 290.193506][T11259] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 290.247786][T11261] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 16:34:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x0, 0x3, &(0x7f0000004240)=@framed, &(0x7f0000004280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:34:07 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c, 0x0}, 0x0) 16:34:07 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c, 0x0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@private2={0xfc, 0x2, [], 0x1}, @mcast2, @mcast2, 0x0, 0x2, 0x5, 0x500, 0x655f, 0x140000, r2}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x37}, 0xb, r2}) 16:34:07 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001540)={&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, &(0x7f00000014c0)=[{0x0}, {0x0}, {&(0x7f00000002c0)='b', 0x1}], 0x3}, 0x0) 16:34:07 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0}, 0xcd) 16:34:07 executing program 4: socketpair(0x11, 0x2, 0x8000, &(0x7f0000000000)) 16:34:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000080)="5c063fce61250373c82e61eaa30d5408", 0x10) 16:34:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004400)={0x11, 0x3, &(0x7f0000004240)=@framed, &(0x7f0000004280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:34:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x4}]}, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) socket(0x10, 0x3, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492858, 0x0) bind(0xffffffffffffffff, &(0x7f0000000200)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x80) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) splice(r0, &(0x7f00000000c0)=0x200, r1, &(0x7f00000001c0), 0x1000, 0x9) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x1b}], 0x1, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001000090468fe07002b00000001000a0026000000450001070300001419001a0012000200040001000a000300"/57, 0x39}], 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001e001909"], 0x1}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket(0x10, 0x3, 0x0) splice(r3, 0x0, r5, 0x0, 0x4ffe0, 0x0) 16:34:08 executing program 5: bpf$OBJ_GET_PROG(0x17, 0x0, 0x0) 16:34:08 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000002c0)={0x2020}, 0x2020) 16:34:08 executing program 2: bpf$OBJ_GET_PROG(0x23, &(0x7f0000002280)={0x0, 0x0, 0x20}, 0x10) 16:34:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(tea)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) 16:34:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', r0) 16:34:08 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000600)={&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}, 0x0) 16:34:08 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) 16:34:08 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) 16:34:08 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x1000) 16:34:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}]}, 0x20}}, 0x0) 16:34:08 executing program 2: r0 = socket(0x25, 0x1, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x20004881) 16:34:09 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) 16:34:09 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1b, 0x0}, 0x0) 16:34:09 executing program 4: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r0, 0x0, &(0x7f0000000300)) 16:34:09 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 16:34:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 16:34:09 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0x0) 16:34:09 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) 16:34:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 16:34:09 executing program 4: shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffb000/0x4000)=nil) 16:34:09 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80400, 0x0) 16:34:09 executing program 0: pselect6(0x40, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000340)={0x0}) 16:34:09 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x2000)=nil, 0x2000) 16:34:09 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001800)='/dev/null\x00', 0x0, 0x0) getsockname(r0, 0x0, 0x0) 16:34:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) 16:34:09 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 16:34:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, 0x0) 16:34:09 executing program 0: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000) 16:34:09 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 16:34:09 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 16:34:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000700)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 16:34:09 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 16:34:09 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 16:34:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind(r0, 0x0, 0x0) 16:34:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 16:34:09 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/null\x00', 0x44a80, 0x0) 16:34:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000700)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 16:34:09 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_SECTGET(r0, 0x1267, 0x0) 16:34:09 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, 0x0, 0x0) 16:34:09 executing program 1: pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x20}, 0x0, 0x0) 16:34:10 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, 0x0) 16:34:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000700)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 16:34:10 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/204) 16:34:10 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROSET(r0, 0x125d, 0x0) 16:34:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 16:34:10 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_HDIO_GETGEO(r0, 0x301, 0x0) 16:34:10 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 16:34:10 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 16:34:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000700)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 16:34:10 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 16:34:10 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) 16:34:10 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 16:34:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 16:34:10 executing program 2: setitimer(0x0, &(0x7f0000000040)={{}, {0x8000}}, 0x0) setitimer(0x0, &(0x7f00000000c0)={{}, {0x0, 0x8e}}, &(0x7f0000000140)) 16:34:10 executing program 3: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x200000000000002}, {0xfcb1}}, 0x0) 16:34:10 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:34:10 executing program 5: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @dev, 'syzkaller0\x00'}}, 0x80) 16:34:10 executing program 0: shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f00000010c0)=""/4102) 16:34:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000240)=[{&(0x7f0000000040)="d966c814f783398feb3d8a7fc3afd1d0e12d7f16760701913081424122f09f8d7cc5837c9b4f541a96ded4a0fe35e2027bfb6885111e08561a385e1f0508de9e80a10731b6b21e95a28f7e28588e8cf1167aea4cedf4ea8786d23af913e77f5e30940618eaadc3cb54f9940a37b92c1ac2132d31ae939f9bf10fdbf3be93307fb172bc8150e1e76f3128ec4be165e056a46dc6f0ac3e8b580b675bf020abd803acc4fb62af7731429ba00772d5de6ccee1556d106fd40add6280611181", 0xbd}, {&(0x7f00000002c0)="10ce18355454e2893c3cd678fbac42fab850adc3df87c96497485baf2c620d24c5f16d34f5843b8792d498d3af928871f4b662ef7a66e24d9a36587215eb069540c810c59430ad54a6360ad20aa829533278723448a755a7227ccb4c591e604bcdb66e36a5d4e5581eeec4836544f84ac35cdcd0e8c703fe4d0d87c17169edeea7e9556b148c29885b7209fc876a0671dcad3fb5", 0x94}, {&(0x7f0000000200)}], 0x3, &(0x7f00000003c0)=[@rights, @rights, @cred, @rights, @cred], 0xfffffe49}, 0x0) 16:34:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights], 0x10}, 0x0) 16:34:10 executing program 5: setitimer(0x0, &(0x7f0000000380)={{}, {0x7fffffff}}, 0x0) 16:34:10 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) poll(&(0x7f0000000180)=[{r0, 0x164}], 0x1, 0x0) 16:34:10 executing program 3: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x200000000000002}, {0xfcb1}}, 0x0) 16:34:10 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3}, 0xc) 16:34:10 executing program 4: poll(0x0, 0x0, 0xfffffff9) 16:34:10 executing program 1: r0 = eventfd2(0x8000, 0x801) read$eventfd(r0, &(0x7f0000000700), 0x8) 16:34:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @private0, @mcast1}}) 16:34:10 executing program 5: socket(0x1, 0x2, 0x1) 16:34:10 executing program 3: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x200000000000002}, {0xfcb1}}, 0x0) 16:34:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) getsockname$unix(r0, 0x0, 0x0) 16:34:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:34:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0xf, 0x0, 0x0) 16:34:11 executing program 3: setitimer(0x0, &(0x7f0000000040)={{0x0, 0x200000000000002}, {0xfcb1}}, 0x0) 16:34:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:34:11 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8001, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@v={0x93, 0x0, 0x80, 0x0, @MIDI_NOTEON=@special}, @l={0x92, 0x0, 0xc0}], 0x10) 16:34:11 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 16:34:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r1}}, 0x18) 16:34:11 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f0000000040)={'bridge_slave_1\x00'}) 16:34:11 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000006b80)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc2c45512, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x1}) 16:34:11 executing program 5: msgget$private(0x0, 0x0) r0 = msgget$private(0x0, 0x1b0) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000180)=""/69) r1 = msgget(0x2, 0x0) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/84) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f0000000000)=""/84) msgctl$IPC_RMID(r2, 0x0) getegid() geteuid() getegid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc28, 0x4002) 16:34:11 executing program 2: socketpair(0x2, 0x6, 0x0, &(0x7f00000001c0)) 16:34:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x31}}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}, 'veth0_to_bond\x00'}) 16:34:12 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_ifreq(r0, 0x8936, &(0x7f0000000000)={'caif0\x00', @ifru_addrs=@nfc}) 16:34:12 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000001200)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000001240)) 16:34:12 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 16:34:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:12 executing program 5: r0 = socket(0x1, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00', r0) 16:34:12 executing program 4: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, &(0x7f0000000000), 0x18) 16:34:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 16:34:12 executing program 2: r0 = socket(0x18, 0x0, 0x2) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 16:34:12 executing program 0: select(0xffffffc0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 16:34:12 executing program 5: r0 = socket(0xa, 0x6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00', r0) 16:34:12 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, 0x0) 16:34:12 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', 0x0, &(0x7f0000000100)={0x0, "7d4dd5f67f8f6c5f82ccd4b9c50799324e9616d1407fc797ed9a86e3226146d2ef6cb937a90632cd5a3c4cb1170dd46d7e08750f34303ba25072c4cb31c0c978"}, 0x48, 0xfffffffffffffffb) 16:34:12 executing program 3: r0 = socket(0x29, 0x5, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 16:34:12 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002380)={0x10}, 0x10) 16:34:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000ac0)={'macvtap0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) 16:34:12 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/timer\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000002, 0x11, r0, 0x0) 16:34:12 executing program 0: r0 = socket(0x15, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, 0x0) 16:34:12 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) mmap$fb(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x11, r0, 0x0) 16:34:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x128, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0xb, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0xffffffb6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x128}}, 0x0) 16:34:12 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 16:34:12 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000000400)) 16:34:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x18, r1, 0x305, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}}, 0x0) 16:34:12 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000040)={@dev, @broadcast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) [ 295.701749][T11555] mmap: syz-executor.3 (11555) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 16:34:12 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f000000bd80)='ns/pid\x00') 16:34:12 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x0, 0x7ff}) 16:34:12 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000500)={0x0, 0x9, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "6248d5e7"}, 0x0, 0x0, @planes=0x0, 0x3859}) 16:34:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000480)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40) 16:34:12 executing program 1: r0 = socket(0x2, 0x801, 0x0) connect$bt_rfcomm(r0, 0x0, 0x0) 16:34:12 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002a80)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000008b40)={0x548, 0x0, r1, [{{}, {0x0, 0x0, 0x11, 0x0, '/dev/dlm-monitor\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {0x0, 0x0, 0xa, 0x0, '/dev/cuse\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {0x0, 0x0, 0x11, 0x0, '/dev/dlm-monitor\x00'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xffffffffffffffff}}, {0x0, 0x0, 0x3, 0x0, '^*&'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee01}}, {0x0, 0x0, 0x1, 0x0, '.'}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {0x0, 0x0, 0xa, 0x0, '/dev/cuse\x00'}}, {{}, {0x0, 0x0, 0x6, 0x0, '\xa1!+(]-'}}, {{}, {0x0, 0x0, 0xa, 0x0, '/dev/cuse\x00'}}]}, 0x548) 16:34:13 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$khugepaged_scan(r0, 0x0, 0x0) 16:34:13 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x44, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x30, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x14, 0x4, @private0}}}]}]}, 0x44}}, 0x0) 16:34:13 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000180), &(0x7f00000000c0)=0xfffffffffffffd6a) 16:34:13 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000480)={&(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000380)="fc", 0x1}, 0x68) 16:34:13 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000006c0)={0x2020}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002b80)={0x5d}, 0x10) 16:34:13 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x1}) 16:34:13 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x12) 16:34:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x118, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x2}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x118}}, 0x0) 16:34:13 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0xffffffffffffffff) 16:34:13 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1aa882a004183c0e, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f0000000000)) 16:34:13 executing program 3: r0 = socket(0x25, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @remote}, @private0}}) 16:34:13 executing program 4: r0 = add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 16:34:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01"], 0x14}}, 0x0) 16:34:13 executing program 5: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f00000003c0)={0x5}, 0x0, 0x0) 16:34:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x128, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0xffffffb6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x128}, 0x1, 0x0, 0x0, 0x2}, 0x0) 16:34:13 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:13 executing program 4: socket(0x26, 0x5, 0x4) 16:34:13 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, 0x0) 16:34:13 executing program 1: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) write$eventfd(r0, &(0x7f00000016c0), 0x8) 16:34:13 executing program 3: r0 = add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000280)="8347", 0x2, r0) 16:34:13 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvfrom$l2tp6(r0, 0x0, 0x0, 0x40002061, 0x0, 0x0) 16:34:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00', r0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x20, r1, 0x305, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0x20}}, 0x0) 16:34:13 executing program 0: r0 = socket(0x15, 0x5, 0x0) getpeername$l2tp6(r0, 0x0, 0x0) 16:34:13 executing program 2: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 16:34:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0x1}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x38}}, 0x0) 16:34:14 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', 0xffffffffffffffff) 16:34:14 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="e3", 0x1}, {&(0x7f0000000280)='Y', 0x1}], 0x2}, 0x0) 16:34:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:34:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14, r1, 0xa01}, 0x14}}, 0x0) 16:34:14 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f0000000040)=0x31f, 0x1b) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4) 16:34:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, r0) 16:34:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:14 executing program 4: r0 = socket(0xa, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x10003) 16:34:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000ac0)={'gre0\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x0, &(0x7f0000000b00)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) 16:34:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:34:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00', r0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x20, r1, 0x305, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) 16:34:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:14 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000080)) 16:34:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00', r0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x20, r1, 0x305, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) 16:34:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local}}}, 0x30) 16:34:14 executing program 2: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x1f) 16:34:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, r0) 16:34:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="28010000", @ANYRES16=r1, @ANYBLOB="0100000000000000000009000000080001"], 0x128}}, 0x0) 16:34:15 executing program 0: r0 = socket(0x2b, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 16:34:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000ec0)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:34:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:15 executing program 1: r0 = socket(0x29, 0x5, 0x0) getsockname(r0, 0x0, 0x0) 16:34:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)) 16:34:15 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/221, 0xdd) 16:34:15 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, 0x32) 16:34:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:34:15 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc_s\x00', 0x0, 0xffffffffffffffff) 16:34:15 executing program 4: r0 = add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 16:34:15 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000080)=0x7f) 16:34:15 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "8e63b3e2"}}) 16:34:15 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) 16:34:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) 16:34:15 executing program 1: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000540)='/dev/adsp1\x00', 0x82802, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000580)=0xb32b) 16:34:15 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x81, 0x0) 16:34:15 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x0) 16:34:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00', 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x2c}}, 0x0) 16:34:15 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x20, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}]}, 0x20}}, 0x0) 16:34:15 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x88202, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000180)=0x1000) 16:34:15 executing program 4: r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r0) [ 298.770265][T11740] tipc: Started in network mode 16:34:15 executing program 5: r0 = add_key$keyring(&(0x7f00000041c0)='keyring\x00', &(0x7f0000004200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000340)=""/75, 0x4b) [ 298.802095][T11740] tipc: Node identity 3, cluster identity 4711 [ 298.828980][T11740] tipc: Node number set to 3 16:34:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$pptp(r0, 0x0, 0x0) 16:34:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x10, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0xa0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}]}, 0x38}}, 0x0) 16:34:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000180)={'veth1\x00', @ifru_mtu}) 16:34:16 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000016c0)={0x18, 0x0, {0x2, @empty, 'lo\x00'}}, 0x1e) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', r0) 16:34:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x1}, {0xc, 0x90, 0xdf11}}]}, 0x54}}, 0x0) 16:34:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1, 0xe2, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x40) 16:34:16 executing program 2: sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)={0x1e4, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}]}, 0x1e4}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:34:16 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0) 16:34:16 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self\x00', 0x20100, 0x0) 16:34:16 executing program 5: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, 0x0, &(0x7f0000000000)='],\\$\x00') 16:34:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}) 16:34:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc}) 16:34:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 16:34:16 executing program 1: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) 16:34:16 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x50000010}) [ 299.763884][T11787] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 16:34:17 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000001c0)) 16:34:17 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0x5421, 0x400000) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, 0x0) 16:34:17 executing program 1: r0 = socket(0x2b, 0x1, 0x0) bind$vsock_stream(r0, 0x0, 0x0) 16:34:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x28}}, 0x0) 16:34:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002140)='net/ip6_tables_targets\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0xffffffad) 16:34:17 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x25c24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41, 0x2000400000000}, r0, 0x0, 0xffffffffffffffff, 0xd) 16:34:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x58, r1, 0x1, 0x0, 0x0, {0x10}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x58}}, 0x0) 16:34:17 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 16:34:17 executing program 3: fsopen(&(0x7f0000000040)='jffs2\x00', 0x0) 16:34:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x4}]}, 0x1c}}, 0x0) 16:34:17 executing program 2: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000003840)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000000)={0x3c}) 16:34:17 executing program 0: sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x12, &(0x7f0000000000)={0x0, 0x1}, 0xa4) 16:34:17 executing program 3: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0x500e, 0x0) 16:34:17 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_qrtr_TIOCINQ(r0, 0x5760, 0x0) 16:34:17 executing program 5: r0 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) write$binfmt_script(r0, 0x0, 0x0) 16:34:17 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x7, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000040)={0x0, 0x0, 0x0, @stepwise}) 16:34:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) read(r1, &(0x7f0000001d00)=""/4096, 0x1000) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 16:34:17 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x3}) 16:34:17 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000240)={0x1, @sdr}) 16:34:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x48, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8}, @CTA_TIMEOUT_SCTP_HEARTBEAT_SENT={0x8}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x48}}, 0x0) 16:34:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)={0x14, 0x3, 0x2, 0x401}, 0x14}}, 0x0) [ 300.544789][T11840] input: syz1 as /devices/virtual/input/input5 16:34:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 16:34:17 executing program 3: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 16:34:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000002240)=ANY=[@ANYBLOB="726160000000000000000000000000000000000000000000000000000000000003"], 0x58) [ 300.714049][T11840] input input6: cannot allocate more than FF_MAX_EFFECTS effects 16:34:17 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000200)) 16:34:17 executing program 5: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8905, &(0x7f0000000100)={'team0\x00'}) 16:34:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) 16:34:17 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x2f, 0x0) 16:34:17 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 16:34:18 executing program 0: syz_emit_vhci(&(0x7f0000000500)=@HCI_VENDOR_PKT, 0x2) 16:34:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x29, &(0x7f0000002240)={'raw\x00', 0x2, [{}, {}]}, 0x48) 16:34:18 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='statm\x00') read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 16:34:18 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x541b, 0x0) 16:34:18 executing program 2: prctl$PR_SET_SPECULATION_CTRL(0x23, 0x0) 16:34:18 executing program 3: r0 = socket(0x2a, 0x2, 0x0) accept(r0, 0x0, 0x0) 16:34:18 executing program 1: r0 = fsopen(&(0x7f0000000440)='cpuset\x00', 0x0) fsmount(r0, 0x0, 0x0) 16:34:18 executing program 4: r0 = socket$packet(0x2, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8921, &(0x7f0000000980)={'batadv_slave_0\x00'}) 16:34:18 executing program 0: r0 = socket(0xa, 0x3, 0x4) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x29, 0x1b, 0x0, 0x300) 16:34:18 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\xa0*\x82\x19\xf1\xaf<\x9cM\xf9\x8bg.\x04?\x02\xf6\xa6Ov\xdb{\x97\xec\xa3\xae*\x86\x88\xf7*\x01\x00\x00\x00\x00\x00\x00\x006\xf4\f\xbd\xfa\xd1v\"#\x8b\xde\x8a\xd1G\xe7e\x16m\x0e\xb8~^\x12\xb7\xe7W\x1bh\xd60/\x86D\xb1\xfe\xe1\xd4\xa8s\x0e\xfb', 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 16:34:18 executing program 3: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) fcntl$F_SET_RW_HINT(r0, 0xb, 0x0) 16:34:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000000)={'bond0\x00', @ifru_hwaddr}) 16:34:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xc008aec1, 0x0) 16:34:18 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000180)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000001c0)={0x0, "ef0e73174a1924544d0d23f84f68dbaf4418bc0ffb76a8cd6167cffcffffffbf47da47aa0b796bb0c9b59457eba81aacd65645fa1317f69f5081b61d00"}, 0x66, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000240)='big_key\x00', &(0x7f0000000280)='\x80(\x00') 16:34:18 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000200)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0x125f, 0x0) 16:34:18 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x8000) 16:34:18 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) fsetxattr(r0, &(0x7f0000000080)=@random={'security.', '\x00'}, 0x0, 0x0, 0x0) 16:34:18 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0), 0xc, 0x0) 16:34:18 executing program 3: userfaultfd(0x22f1a530109177cf) 16:34:18 executing program 5: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000004bc0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r0, 0x400448c9, &(0x7f0000005040)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "121b45eb"}, 0x0, 0x0, @userptr}) 16:34:18 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x6, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x8, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c84a1804"}, 0x0, 0x0, @userptr}) 16:34:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, &(0x7f0000002240)={'raw\x00', 0x2, [{}, {}]}, 0x48) 16:34:18 executing program 0: r0 = io_uring_setup(0x3128, &(0x7f0000000000)={0x0, 0xa479}) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 16:34:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'wlan1\x00', &(0x7f0000000240)=@ethtool_ringparam={0x11}}) 16:34:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x58, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0x34, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x58}}, 0x0) 16:34:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000002240)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 16:34:18 executing program 5: add_key$fscrypt_v1(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000280)={0x0, "f5f780eb6705838f6ac1daf8a6bf9e8352cfa2f82d844e4d78e94383f10b2ff0136d227d7139b67b333cfebe5c42c21b67148ca662793b77e4c33a899d000002"}, 0x48, 0xfffffffffffffffe) r0 = add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000140)={0x0, "f9d05f0f115ddca414a0b4cd28cb664923a4e6502d13747f7a2d93aaf3b6fef4bd464e3d6c7de1d0f28e31e26a964f8bb41de1e48f7a3b42662ad9c2e8106300"}, 0x48, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, r0) 16:34:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x15, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 16:34:18 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000001480)='/dev/video#\x00', 0x3, 0x2) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 16:34:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x1f, 0x4, 0xfffffff7, 0x44, 0x1}, 0x40) 16:34:19 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000200)={0x0, "1fc9b2d7493f41671a412df19a49801836054d94713bd8c377332d62f24407ed8959013e7002ce99c2633f2c90ee0b7d95f6172d729bedc2c6230e658be62820"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080)={r0}, &(0x7f0000000280)={'enc=', 'raw', ' hash=', {'sha256-arm64\x00'}}, 0x0, 0x0) 16:34:19 executing program 3: r0 = socket(0x1, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 16:34:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x40) 16:34:19 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000040)={'veth0\x00'}) 16:34:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x15, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 16:34:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000040), 0x4) 16:34:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 16:34:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 16:34:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x15, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 16:34:19 executing program 0: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x8}], 0x9, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, 0x0) 16:34:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 16:34:19 executing program 2: r0 = socket(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_macvtap\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x26, 0x1, [{}]}}) 16:34:19 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 16:34:19 executing program 3: openat$mice(0xffffffffffffff9c, &(0x7f0000000140)='/dev/input/mice\x00', 0x0) 16:34:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x15, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 16:34:19 executing program 2: r0 = socket(0x2a, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c}}) 16:34:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x19, 0x1, &(0x7f0000000c40)=@raw=[@exit], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 302.576818][T11972] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 302.576818][T11972] The task syz-executor.0 (11972) triggered the difference, watch for misbehavior. 16:34:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x1f, 0x4, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={&(0x7f0000001700)="ea", 0x0, 0x0, 0x0, 0x3f, r0}, 0x38) 16:34:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 16:34:19 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000025c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x0, 0x20241) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 16:34:19 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 16:34:20 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0xfffffffffffffffe, 0x0, 0x0, 0xfffffffffffffff8) 16:34:20 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x560c, 0x0) 16:34:20 executing program 3: syz_open_dev$ttys(0xc, 0x2, 0x0) r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCOUTQ(r0, 0x80045440, &(0x7f0000000040)) 16:34:20 executing program 5: r0 = socket(0x2, 0x3, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 16:34:20 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:20 executing program 2: r0 = openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/raw/rawctl\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x40) ioctl$RAW_CHAR_CTRL_GETBIND(r0, 0xac00, &(0x7f0000000000)={0x0, 0x7, 0x0}) r2 = signalfd4(r1, &(0x7f0000000040)={[0xca]}, 0x8, 0x800) r3 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x100000, 0x10d) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000100)=[r2], 0x1) [ 303.484401][T12005] FAULT_INJECTION: forcing a failure. [ 303.484401][T12005] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 303.558167][T12005] CPU: 0 PID: 12005 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 303.566988][T12005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.577096][T12005] Call Trace: [ 303.580454][T12005] dump_stack+0xfa/0x151 [ 303.584784][T12005] should_fail.cold+0x5/0xa [ 303.589318][T12005] _copy_from_user+0x2c/0x180 [ 303.594113][T12005] __copy_msghdr_from_user+0x91/0x4b0 [ 303.599582][T12005] ? __ia32_sys_shutdown+0x70/0x70 [ 303.604718][T12005] ? _raw_spin_unlock_irq+0x2a/0x40 [ 303.609966][T12005] ? finish_task_switch.isra.0+0x158/0x7e0 [ 303.615868][T12005] ? finish_task_switch.isra.0+0x122/0x7e0 [ 303.621694][T12005] ? __switch_to+0x57c/0x1010 [ 303.626498][T12005] ? lock_is_held_type+0xd5/0x130 [ 303.631583][T12005] sendmsg_copy_msghdr+0xa1/0x160 [ 303.636639][T12005] ? do_recvmmsg+0x6d0/0x6d0 [ 303.641260][T12005] ? lock_chain_count+0x20/0x20 [ 303.646163][T12005] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 303.652184][T12005] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 16:34:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x11, &(0x7f0000002240)={'raw\x00', 0x2, [{}, {}]}, 0x48) 16:34:20 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) 16:34:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000280)={0x0, r2}) [ 303.658436][T12005] ___sys_sendmsg+0xc6/0x170 [ 303.663060][T12005] ? sendmsg_copy_msghdr+0x160/0x160 [ 303.668383][T12005] ? lock_release+0x3bb/0x710 [ 303.673090][T12005] ? __fget_files+0x266/0x3d0 [ 303.677824][T12005] ? lock_downgrade+0x6d0/0x6d0 [ 303.682711][T12005] ? __fget_files+0x288/0x3d0 [ 303.687432][T12005] ? __fget_light+0xea/0x280 [ 303.692047][T12005] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 303.698385][T12005] __sys_sendmmsg+0x195/0x470 [ 303.703108][T12005] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 303.708163][T12005] ? lock_downgrade+0x6d0/0x6d0 [ 303.713041][T12005] ? lock_release+0x3bb/0x710 [ 303.717742][T12005] ? ksys_write+0x12d/0x250 [ 303.722360][T12005] ? __mutex_unlock_slowpath+0xe2/0x610 [ 303.727941][T12005] ? lock_is_held_type+0xd5/0x130 [ 303.732991][T12005] ? wait_for_completion_io+0x270/0x270 [ 303.738560][T12005] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 303.744832][T12005] ? vfs_write+0x18e/0xa30 [ 303.749301][T12005] __x64_sys_sendmmsg+0x99/0x100 16:34:20 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x541b, 0x0) [ 303.754265][T12005] ? syscall_enter_from_user_mode+0x1d/0x50 [ 303.760188][T12005] do_syscall_64+0x2d/0x70 [ 303.764621][T12005] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 303.770541][T12005] RIP: 0033:0x465ef9 [ 303.774457][T12005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 303.794094][T12005] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 16:34:20 executing program 4: r0 = fsopen(&(0x7f0000000000)='ufs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) [ 303.802539][T12005] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 303.810535][T12005] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 303.818521][T12005] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 303.826510][T12005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.834496][T12005] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:21 executing program 5: request_key(&(0x7f0000000300)='rxrpc_s\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='*]\x00', 0x0) 16:34:21 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f00000002c0)=""/4096, 0x2a, 0x1000, 0x8}, 0x20) 16:34:21 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000001c0)={0x5, @output}) 16:34:21 executing program 2: sysfs$2(0x2, 0xc0bd, 0x0) [ 304.092290][T12034] FAULT_INJECTION: forcing a failure. [ 304.092290][T12034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 304.162010][T12034] CPU: 1 PID: 12034 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 304.170836][T12034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.180918][T12034] Call Trace: [ 304.184230][T12034] dump_stack+0xfa/0x151 [ 304.188515][T12034] should_fail.cold+0x5/0xa [ 304.193054][T12034] _copy_from_user+0x2c/0x180 [ 304.197771][T12034] move_addr_to_kernel.part.0+0x31/0x110 [ 304.203442][T12034] __copy_msghdr_from_user+0x3da/0x4b0 [ 304.208943][T12034] ? __ia32_sys_shutdown+0x70/0x70 [ 304.214209][T12034] ? lock_chain_count+0x20/0x20 [ 304.219108][T12034] sendmsg_copy_msghdr+0xa1/0x160 [ 304.224171][T12034] ? do_recvmmsg+0x6d0/0x6d0 [ 304.228801][T12034] ? lock_chain_count+0x20/0x20 [ 304.233694][T12034] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 304.239721][T12034] ___sys_sendmsg+0xc6/0x170 [ 304.244349][T12034] ? sendmsg_copy_msghdr+0x160/0x160 [ 304.249667][T12034] ? lock_release+0x3bb/0x710 [ 304.254382][T12034] ? __fget_files+0x266/0x3d0 [ 304.259095][T12034] ? lock_downgrade+0x6d0/0x6d0 [ 304.263989][T12034] ? __fget_files+0x288/0x3d0 [ 304.268704][T12034] ? __fget_light+0xea/0x280 [ 304.273321][T12034] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 304.279598][T12034] __sys_sendmmsg+0x195/0x470 [ 304.284318][T12034] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 304.289374][T12034] ? lock_downgrade+0x6d0/0x6d0 [ 304.294257][T12034] ? lock_release+0x3bb/0x710 [ 304.298962][T12034] ? ksys_write+0x12d/0x250 [ 304.303502][T12034] ? __mutex_unlock_slowpath+0xe2/0x610 [ 304.309104][T12034] ? lock_is_held_type+0xd5/0x130 [ 304.314160][T12034] ? wait_for_completion_io+0x270/0x270 [ 304.319769][T12034] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 304.326041][T12034] ? vfs_write+0x18e/0xa30 [ 304.330490][T12034] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 304.336765][T12034] ? fput+0x2a/0x50 [ 304.340619][T12034] __x64_sys_sendmmsg+0x99/0x100 [ 304.345594][T12034] ? syscall_enter_from_user_mode+0x1d/0x50 [ 304.351517][T12034] do_syscall_64+0x2d/0x70 [ 304.355957][T12034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 304.361881][T12034] RIP: 0033:0x465ef9 [ 304.365794][T12034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 304.385427][T12034] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 304.393878][T12034] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 304.401877][T12034] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 16:34:21 executing program 2: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'caif0\x00', @ifru_addrs=@nfc}) 16:34:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) 16:34:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x894c, 0x0) 16:34:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f0000001100)) [ 304.409871][T12034] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 304.417867][T12034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.425862][T12034] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x8, 0x6, 0x101}, 0x14}}, 0x0) 16:34:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc004ae0a, 0x0) 16:34:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x16, 0x8}, 0x10) 16:34:21 executing program 2: fsopen(&(0x7f0000000200)='sockfs\x00', 0x0) 16:34:21 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:21 executing program 3: request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='/dev/video2\x00', 0xffffffffffffffff) 16:34:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000600)='logon\x00', &(0x7f0000000640)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000680)={0x0, "35fa318d0ee62488b1e209d74c6bd45046f69b45a4b911fb1cd59077f6e657ae84b7a216322b4218288eb3d34309bc6f30809106e47f0fc38c58f51ae0562a10"}, 0x48, r0) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffc, 0x0, 0x0) 16:34:21 executing program 4: add_key(&(0x7f0000000600)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 16:34:21 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0x301) 16:34:21 executing program 2: add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='U', 0x20000181, 0xffffffffffffffff) 16:34:21 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000001400)='trusted.overlay.upper\x00', &(0x7f0000001440)={0x0, 0xfb, 0x15, 0x0, 0x0, "7b1e0c97299e37298ea6b363b07cf28d"}, 0x15, 0x1) [ 304.905006][T12078] FAULT_INJECTION: forcing a failure. [ 304.905006][T12078] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:34:22 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000100)) 16:34:22 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:'}, &(0x7f0000000080)={0x0, "ecbbe2e9de90d71f1ac7c88fab4127ac4fca7eb9a5421fe5bc2dd852a4530df444cf23a80014ce92cd24dc010a9a2e3c34a4500ebcf03a52e02724352a6b186a"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) [ 304.973562][T12078] CPU: 1 PID: 12078 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 304.982507][T12078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.992584][T12078] Call Trace: [ 304.995882][T12078] dump_stack+0xfa/0x151 [ 305.000155][T12078] should_fail.cold+0x5/0xa [ 305.004688][T12078] _copy_from_user+0x2c/0x180 [ 305.009402][T12078] iovec_from_user+0x242/0x3c0 [ 305.014196][T12078] __import_iovec+0x65/0x500 [ 305.018828][T12078] import_iovec+0x10c/0x150 16:34:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) [ 305.023363][T12078] sendmsg_copy_msghdr+0x12d/0x160 [ 305.028516][T12078] ? do_recvmmsg+0x6d0/0x6d0 [ 305.033138][T12078] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 305.039152][T12078] ___sys_sendmsg+0xc6/0x170 [ 305.043767][T12078] ? sendmsg_copy_msghdr+0x160/0x160 [ 305.049077][T12078] ? lock_release+0x3bb/0x710 [ 305.053876][T12078] ? __fget_files+0x266/0x3d0 [ 305.058586][T12078] ? lock_downgrade+0x6d0/0x6d0 [ 305.063483][T12078] ? __fget_files+0x288/0x3d0 [ 305.068200][T12078] ? __fget_light+0xea/0x280 16:34:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000500)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x38) [ 305.072825][T12078] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 305.079106][T12078] __sys_sendmmsg+0x195/0x470 [ 305.083819][T12078] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 305.088876][T12078] ? lock_downgrade+0x6d0/0x6d0 [ 305.093758][T12078] ? lock_release+0x3bb/0x710 [ 305.098459][T12078] ? ksys_write+0x12d/0x250 [ 305.102995][T12078] ? __mutex_unlock_slowpath+0xe2/0x610 [ 305.108563][T12078] ? lock_is_held_type+0xd5/0x130 [ 305.113613][T12078] ? wait_for_completion_io+0x270/0x270 16:34:22 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8495, 0x2, 0x1}) [ 305.119191][T12078] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 305.125464][T12078] ? vfs_write+0x18e/0xa30 [ 305.129910][T12078] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 305.136179][T12078] ? fput+0x2a/0x50 [ 305.140026][T12078] __x64_sys_sendmmsg+0x99/0x100 [ 305.144992][T12078] ? syscall_enter_from_user_mode+0x1d/0x50 [ 305.150914][T12078] do_syscall_64+0x2d/0x70 [ 305.155354][T12078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.161400][T12078] RIP: 0033:0x465ef9 [ 305.165327][T12078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.184981][T12078] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 305.193434][T12078] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 305.201461][T12078] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 305.209491][T12078] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 305.217520][T12078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.225521][T12078] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:22 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:22 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) 16:34:22 executing program 5: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x11) 16:34:22 executing program 3: request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='/dev/video2\x00', 0xffffffffffffffff) 16:34:22 executing program 4: prctl$PR_GET_PDEATHSIG(0x1d, 0x0) 16:34:22 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 16:34:22 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fff}) 16:34:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0x5424, 0x0) [ 305.484129][T12101] FAULT_INJECTION: forcing a failure. [ 305.484129][T12101] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:34:22 executing program 3: request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='/dev/video2\x00', 0xffffffffffffffff) [ 305.563388][T12101] CPU: 1 PID: 12101 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 305.572214][T12101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.582302][T12101] Call Trace: [ 305.585605][T12101] dump_stack+0xfa/0x151 [ 305.589881][T12101] should_fail.cold+0x5/0xa [ 305.594412][T12101] _copy_from_user+0x2c/0x180 [ 305.599124][T12101] ____sys_sendmsg+0x191/0x810 [ 305.603922][T12101] ? kernel_sendmsg+0x50/0x50 [ 305.608627][T12101] ? do_recvmmsg+0x6d0/0x6d0 16:34:22 executing program 4: r0 = socket(0x2a, 0x2, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000940)={&(0x7f0000000840), 0xb, &(0x7f0000000900)={0x0}}, 0x0) [ 305.613374][T12101] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 305.619394][T12101] ___sys_sendmsg+0xf3/0x170 [ 305.624045][T12101] ? sendmsg_copy_msghdr+0x160/0x160 [ 305.629365][T12101] ? __fget_files+0x266/0x3d0 [ 305.634076][T12101] ? lock_downgrade+0x6d0/0x6d0 [ 305.638965][T12101] ? __fget_files+0x288/0x3d0 [ 305.643671][T12101] ? __fget_light+0xea/0x280 [ 305.648284][T12101] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 305.654553][T12101] __sys_sendmmsg+0x195/0x470 [ 305.659267][T12101] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 305.664318][T12101] ? lock_downgrade+0x6d0/0x6d0 [ 305.669211][T12101] ? __mutex_unlock_slowpath+0xe2/0x610 [ 305.674793][T12101] ? lock_is_held_type+0xd5/0x130 [ 305.679847][T12101] ? wait_for_completion_io+0x270/0x270 [ 305.685420][T12101] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 305.691689][T12101] ? vfs_write+0x18e/0xa30 [ 305.696134][T12101] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 305.702403][T12101] ? fput+0x2a/0x50 [ 305.706250][T12101] __x64_sys_sendmmsg+0x99/0x100 [ 305.711214][T12101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 305.717131][T12101] do_syscall_64+0x2d/0x70 [ 305.721571][T12101] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.727489][T12101] RIP: 0033:0x465ef9 [ 305.731394][T12101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.751027][T12101] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 305.759477][T12101] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 305.767474][T12101] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 305.775469][T12101] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 305.783464][T12101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.791456][T12101] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:22 executing program 3: request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='/dev/video2\x00', 0xffffffffffffffff) 16:34:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:34:23 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:23 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f00000024c0), &(0x7f0000002500)=0x30) 16:34:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000640)={"989d8b90403620f5ce363a7750a3905a"}) 16:34:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x0, 0x46, 0x0, "6860deb31971c61fec7690e619572acc1e782e9e8e17e6c14415171d54032f3825708af69c61b4a57ddaaf31ecf2f998325cd7b39cc8f4a4e88a45c65df34d1dc69711bbfc3d7b746ca0964d908d30e3"}, 0xd8) [ 306.111391][T12128] FAULT_INJECTION: forcing a failure. [ 306.111391][T12128] name failslab, interval 1, probability 0, space 0, times 1 [ 306.124626][T12128] CPU: 0 PID: 12128 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 306.133418][T12128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.143497][T12128] Call Trace: [ 306.146799][T12128] dump_stack+0xfa/0x151 [ 306.151074][T12128] should_fail.cold+0x5/0xa [ 306.155608][T12128] ? sctp_get_port_local+0x3ed/0x14d0 [ 306.161073][T12128] should_failslab+0x5/0x10 [ 306.165680][T12128] kmem_cache_alloc+0x5e/0x380 [ 306.170522][T12128] sctp_get_port_local+0x3ed/0x14d0 [ 306.175761][T12128] ? sctp_unhash+0x10/0x10 [ 306.180206][T12128] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 306.186221][T12128] ? sctp_bind_addr_match+0x1d5/0x2c0 [ 306.191625][T12128] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 306.197906][T12128] sctp_do_bind+0x28d/0x6d0 [ 306.202518][T12128] sctp_connect_new_asoc+0x59e/0x770 [ 306.207832][T12128] ? sctp_bind+0x110/0x110 16:34:23 executing program 2: r0 = socket(0x1d, 0x2, 0x6) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 16:34:23 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000001480)='/dev/video#\x00', 0x3, 0x2) pwritev(r0, &(0x7f0000001a80)=[{&(0x7f00000014c0)="15", 0x1}, {0x0}], 0x2, 0x0, 0x0) [ 306.212282][T12128] ? __local_bh_enable_ip+0xa0/0x120 [ 306.217658][T12128] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 306.223935][T12128] ? security_sctp_bind_connect+0x8f/0xc0 [ 306.229754][T12128] sctp_sendmsg+0x13bc/0x1d30 [ 306.234477][T12128] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 306.239623][T12128] ? lock_is_held_type+0xd5/0x130 [ 306.244706][T12128] ? aa_af_perm+0x230/0x230 [ 306.249315][T12128] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 306.255594][T12128] inet_sendmsg+0x99/0xe0 [ 306.259988][T12128] ? inet_send_prepare+0x4d0/0x4d0 [ 306.265132][T12128] sock_sendmsg+0xcf/0x120 [ 306.269581][T12128] ____sys_sendmsg+0x331/0x810 [ 306.274377][T12128] ? kernel_sendmsg+0x50/0x50 [ 306.279084][T12128] ? do_recvmmsg+0x6d0/0x6d0 [ 306.283707][T12128] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 306.289790][T12128] ___sys_sendmsg+0xf3/0x170 [ 306.294414][T12128] ? sendmsg_copy_msghdr+0x160/0x160 [ 306.299740][T12128] ? __fget_files+0x266/0x3d0 [ 306.304435][T12128] ? lock_downgrade+0x6d0/0x6d0 16:34:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'wlan1\x00', &(0x7f0000000240)=@ethtool_ringparam={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}) [ 306.309319][T12128] ? __fget_files+0x288/0x3d0 [ 306.314033][T12128] ? __fget_light+0xea/0x280 [ 306.318650][T12128] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 306.324924][T12128] __sys_sendmmsg+0x195/0x470 [ 306.329639][T12128] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 306.334689][T12128] ? lock_downgrade+0x6d0/0x6d0 [ 306.339586][T12128] ? __mutex_unlock_slowpath+0xe2/0x610 [ 306.345156][T12128] ? lock_is_held_type+0xd5/0x130 [ 306.350206][T12128] ? wait_for_completion_io+0x270/0x270 [ 306.355777][T12128] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 306.362048][T12128] ? vfs_write+0x18e/0xa30 [ 306.366499][T12128] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 306.372771][T12128] ? fput+0x2a/0x50 [ 306.376623][T12128] __x64_sys_sendmmsg+0x99/0x100 [ 306.381591][T12128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 306.387516][T12128] do_syscall_64+0x2d/0x70 [ 306.391957][T12128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.397880][T12128] RIP: 0033:0x465ef9 [ 306.401791][T12128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.421415][T12128] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 306.429859][T12128] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 306.437851][T12128] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 306.445928][T12128] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 306.453941][T12128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:34:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x15, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x28}}, 0x0) [ 306.461930][T12128] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') ioctl$TUNSETQUEUE(r0, 0x5460, &(0x7f0000000100)={'batadv_slave_1\x00'}) 16:34:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x6, 0x101}, 0x14}}, 0x0) 16:34:23 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x541b, 0x0) 16:34:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0xb) 16:34:23 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') ioctl$TUNSETQUEUE(r0, 0x5460, &(0x7f0000000100)={'batadv_slave_1\x00'}) 16:34:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0xc, 0x0, 0x0) 16:34:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x58, r1, 0x1, 0x0, 0x0, {0x25}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x58}}, 0x0) 16:34:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}]}, 0x28}}, 0x0) 16:34:23 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x800) read$char_usb(r0, 0x0, 0x0) 16:34:24 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 306.995691][T12161] FAULT_INJECTION: forcing a failure. [ 306.995691][T12161] name failslab, interval 1, probability 0, space 0, times 0 16:34:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x28, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}]}, 0x28}}, 0x0) 16:34:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') ioctl$TUNSETQUEUE(r0, 0x5460, &(0x7f0000000100)={'batadv_slave_1\x00'}) 16:34:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0xffffffffffffffdc) [ 307.070652][T12161] CPU: 0 PID: 12161 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 307.079477][T12161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.089557][T12161] Call Trace: [ 307.092855][T12161] dump_stack+0xfa/0x151 [ 307.097132][T12161] should_fail.cold+0x5/0xa [ 307.101665][T12161] ? sctp_add_bind_addr+0x90/0x390 [ 307.106803][T12161] should_failslab+0x5/0x10 [ 307.111333][T12161] kmem_cache_alloc_trace+0x55/0x3a0 [ 307.116646][T12161] sctp_add_bind_addr+0x90/0x390 [ 307.121617][T12161] sctp_do_bind+0x375/0x6d0 [ 307.126164][T12161] sctp_connect_new_asoc+0x59e/0x770 [ 307.131492][T12161] ? sctp_bind+0x110/0x110 [ 307.135943][T12161] ? __local_bh_enable_ip+0xa0/0x120 [ 307.141257][T12161] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 307.147528][T12161] ? security_sctp_bind_connect+0x8f/0xc0 [ 307.153283][T12161] sctp_sendmsg+0x13bc/0x1d30 [ 307.158003][T12161] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 307.163141][T12161] ? lock_is_held_type+0xd5/0x130 [ 307.168215][T12161] ? aa_af_perm+0x230/0x230 [ 307.172753][T12161] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 307.179029][T12161] inet_sendmsg+0x99/0xe0 [ 307.183388][T12161] ? inet_send_prepare+0x4d0/0x4d0 [ 307.188536][T12161] sock_sendmsg+0xcf/0x120 [ 307.192983][T12161] ____sys_sendmsg+0x331/0x810 [ 307.197782][T12161] ? kernel_sendmsg+0x50/0x50 [ 307.202581][T12161] ? do_recvmmsg+0x6d0/0x6d0 [ 307.207209][T12161] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 307.213229][T12161] ___sys_sendmsg+0xf3/0x170 [ 307.217854][T12161] ? sendmsg_copy_msghdr+0x160/0x160 [ 307.223176][T12161] ? __fget_files+0x266/0x3d0 [ 307.227881][T12161] ? lock_downgrade+0x6d0/0x6d0 [ 307.232781][T12161] ? __fget_files+0x288/0x3d0 [ 307.237491][T12161] ? __fget_light+0xea/0x280 [ 307.242103][T12161] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 307.248381][T12161] __sys_sendmmsg+0x195/0x470 [ 307.253094][T12161] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 307.258144][T12161] ? lock_downgrade+0x6d0/0x6d0 [ 307.263037][T12161] ? __mutex_unlock_slowpath+0xe2/0x610 [ 307.268612][T12161] ? lock_is_held_type+0xd5/0x130 [ 307.273664][T12161] ? wait_for_completion_io+0x270/0x270 [ 307.279238][T12161] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 307.285509][T12161] ? vfs_write+0x18e/0xa30 [ 307.289961][T12161] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 307.296231][T12161] ? fput+0x2a/0x50 [ 307.300082][T12161] __x64_sys_sendmmsg+0x99/0x100 [ 307.305048][T12161] ? syscall_enter_from_user_mode+0x1d/0x50 [ 307.310980][T12161] do_syscall_64+0x2d/0x70 [ 307.315423][T12161] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.321345][T12161] RIP: 0033:0x465ef9 [ 307.325255][T12161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.344884][T12161] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 307.353330][T12161] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 307.361328][T12161] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 16:34:24 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/mnt\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) [ 307.369324][T12161] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 307.377322][T12161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.385314][T12161] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:24 executing program 3: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000000)) 16:34:24 executing program 1 (fault-call:1 fault-nth:6): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') ioctl$TUNSETQUEUE(r0, 0x5460, &(0x7f0000000100)={'batadv_slave_1\x00'}) 16:34:24 executing program 4: r0 = socket(0x2, 0x6, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5452, &(0x7f0000000000)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 16:34:24 executing program 2: syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0x0, 0x0) mincore(&(0x7f0000fec000/0x2000)=nil, 0x2000, &(0x7f0000000080)=""/195) 16:34:24 executing program 3: r0 = socket(0xa, 0x3, 0x4) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x29, 0x19, 0x0, 0x0) 16:34:24 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x9}) [ 307.725888][T12191] FAULT_INJECTION: forcing a failure. [ 307.725888][T12191] name failslab, interval 1, probability 0, space 0, times 0 16:34:24 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x8, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x3}) [ 307.773509][T12191] CPU: 0 PID: 12191 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 307.782338][T12191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.792415][T12191] Call Trace: [ 307.795713][T12191] dump_stack+0xfa/0x151 [ 307.799991][T12191] should_fail.cold+0x5/0xa [ 307.804526][T12191] ? sctp_association_new+0x91/0x21b0 [ 307.809986][T12191] should_failslab+0x5/0x10 [ 307.814517][T12191] kmem_cache_alloc_trace+0x55/0x3a0 16:34:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @private0, 0x0, 0x7860}}) [ 307.819834][T12191] sctp_association_new+0x91/0x21b0 [ 307.825071][T12191] ? sctp_v4_scope+0x170/0x190 [ 307.830042][T12191] sctp_connect_new_asoc+0x1ac/0x770 [ 307.835359][T12191] ? sctp_bind+0x110/0x110 [ 307.839808][T12191] ? __local_bh_enable_ip+0xa0/0x120 [ 307.845120][T12191] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 307.851390][T12191] ? security_sctp_bind_connect+0x8f/0xc0 [ 307.857143][T12191] sctp_sendmsg+0x13bc/0x1d30 [ 307.861858][T12191] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 307.867015][T12191] ? lock_is_held_type+0xd5/0x130 [ 307.872086][T12191] ? aa_af_perm+0x230/0x230 [ 307.876618][T12191] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 307.882895][T12191] inet_sendmsg+0x99/0xe0 [ 307.887248][T12191] ? inet_send_prepare+0x4d0/0x4d0 [ 307.892382][T12191] sock_sendmsg+0xcf/0x120 [ 307.896821][T12191] ____sys_sendmsg+0x331/0x810 [ 307.901618][T12191] ? kernel_sendmsg+0x50/0x50 [ 307.906313][T12191] ? do_recvmmsg+0x6d0/0x6d0 [ 307.910932][T12191] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 307.916944][T12191] ___sys_sendmsg+0xf3/0x170 [ 307.921562][T12191] ? sendmsg_copy_msghdr+0x160/0x160 [ 307.926882][T12191] ? __fget_files+0x266/0x3d0 [ 307.931581][T12191] ? lock_downgrade+0x6d0/0x6d0 [ 307.936470][T12191] ? __fget_files+0x288/0x3d0 [ 307.941179][T12191] ? __fget_light+0xea/0x280 [ 307.945793][T12191] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 307.952083][T12191] __sys_sendmmsg+0x195/0x470 [ 307.956792][T12191] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 307.961848][T12191] ? lock_downgrade+0x6d0/0x6d0 [ 307.966749][T12191] ? __mutex_unlock_slowpath+0xe2/0x610 [ 307.972324][T12191] ? lock_is_held_type+0xd5/0x130 [ 307.977371][T12191] ? wait_for_completion_io+0x270/0x270 [ 307.982940][T12191] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 307.989210][T12191] ? vfs_write+0x18e/0xa30 [ 307.993655][T12191] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 307.999926][T12191] ? fput+0x2a/0x50 [ 308.003768][T12191] __x64_sys_sendmmsg+0x99/0x100 [ 308.008731][T12191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 308.014651][T12191] do_syscall_64+0x2d/0x70 [ 308.019089][T12191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.025014][T12191] RIP: 0033:0x465ef9 [ 308.028924][T12191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.048550][T12191] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 308.056990][T12191] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 308.064986][T12191] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 16:34:25 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x0, 0x0, 0x11, &(0x7f0000000040)="c72a9a181083276d0236969bc4b680e46a"}) 16:34:25 executing program 3: r0 = socket(0xa, 0x3, 0x4) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1, 0x0, &(0x7f0000000080)) [ 308.072980][T12191] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 308.080977][T12191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.088969][T12191] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x120}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:34:25 executing program 5: r0 = socket(0x18, 0x0, 0x2) accept4$vsock_stream(r0, 0x0, 0x0, 0x0) 16:34:25 executing program 1 (fault-call:1 fault-nth:7): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "d432557690e58267a02d243a1a3e30236045f8f65e6dd8c3e6488468dea236f2d7c3b6cb7d7ce61128263b7a35787c8672d0a5f51b5704d4db59c0905b85432881007149f0b7320c6418ca5034f681f3036a740599339f12287bf6cf91040bd0571bcb2c34563f6e5de531a2445afd1e7f67ddf9979d003f03806bf9415ce7fe8e1bfbf918b501f43e5e1310997fdb15c7d3cceefeaf7e6bdee8a2a42739ef66b32e8d459225f3783b22e13021d17268739445d6a7697990dcd270db12a1c520c9b840bd70e5909a49ba096304b0e98beb533b9fb08f5100c1ae480365a14d8f247be509725b1c5d96cd1a47a42a3d6848e33ff799aaf589759f5872a0d6e36a", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 16:34:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {0x0, r1}}, 0x18) 16:34:25 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:34:25 executing program 4: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x40047452, 0x0) 16:34:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x31, &(0x7f0000002240)={'raw\x00', 0x2, [{}, {}]}, 0x48) 16:34:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x1c, 0xb, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 16:34:25 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000980)={&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80, 0x0}, 0x0) [ 308.469453][T12219] FAULT_INJECTION: forcing a failure. [ 308.469453][T12219] name fail_page_alloc, interval 1, probability 0, space 0, times 1 16:34:25 executing program 3: r0 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) 16:34:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'wlan1\x00', &(0x7f0000000240)=@ethtool_ringparam={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}}) 16:34:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x380000, @remote, 0xfffffffe}, 0x1c) [ 308.574271][T12219] CPU: 1 PID: 12219 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 308.583096][T12219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.593173][T12219] Call Trace: [ 308.596469][T12219] dump_stack+0xfa/0x151 [ 308.600748][T12219] should_fail.cold+0x5/0xa [ 308.605283][T12219] __alloc_pages_nodemask+0x189/0x730 [ 308.610759][T12219] ? __alloc_pages_slowpath.constprop.0+0x2260/0x2260 [ 308.617557][T12219] ? mark_held_locks+0x9f/0xe0 16:34:25 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, 0x0) [ 308.622362][T12219] ? _raw_spin_unlock_irqrestore+0x28/0x50 [ 308.628200][T12219] ? lockdep_hardirqs_on+0x79/0x100 [ 308.633429][T12219] ? _raw_spin_unlock_irqrestore+0x33/0x50 [ 308.639271][T12219] alloc_pages_current+0x18c/0x2a0 [ 308.644485][T12219] __get_free_pages+0x8/0x40 [ 308.649107][T12219] __genradix_ptr_alloc+0x162/0x3c0 [ 308.654346][T12219] __genradix_prealloc+0x56/0x90 [ 308.659322][T12219] sctp_stream_init+0x392/0x5f0 [ 308.664208][T12219] sctp_association_new+0x1384/0x21b0 [ 308.669605][T12219] sctp_connect_new_asoc+0x1ac/0x770 [ 308.674905][T12219] ? sctp_bind+0x110/0x110 [ 308.679334][T12219] ? __local_bh_enable_ip+0xa0/0x120 [ 308.684620][T12219] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 308.690856][T12219] ? security_sctp_bind_connect+0x8f/0xc0 [ 308.696573][T12219] sctp_sendmsg+0x13bc/0x1d30 [ 308.701250][T12219] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 308.706355][T12219] ? lock_is_held_type+0xd5/0x130 [ 308.711388][T12219] ? aa_af_perm+0x230/0x230 [ 308.715890][T12219] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 308.722131][T12219] inet_sendmsg+0x99/0xe0 [ 308.726456][T12219] ? inet_send_prepare+0x4d0/0x4d0 [ 308.731560][T12219] sock_sendmsg+0xcf/0x120 [ 308.735976][T12219] ____sys_sendmsg+0x331/0x810 [ 308.740752][T12219] ? kernel_sendmsg+0x50/0x50 [ 308.745421][T12219] ? do_recvmmsg+0x6d0/0x6d0 [ 308.750012][T12219] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 308.755993][T12219] ___sys_sendmsg+0xf3/0x170 [ 308.760578][T12219] ? sendmsg_copy_msghdr+0x160/0x160 [ 308.765861][T12219] ? __fget_files+0x266/0x3d0 [ 308.770533][T12219] ? lock_downgrade+0x6d0/0x6d0 [ 308.775387][T12219] ? __fget_files+0x288/0x3d0 [ 308.780063][T12219] ? __fget_light+0xea/0x280 [ 308.784645][T12219] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 308.790886][T12219] __sys_sendmmsg+0x195/0x470 [ 308.795562][T12219] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 308.800579][T12219] ? lock_downgrade+0x6d0/0x6d0 [ 308.805433][T12219] ? __mutex_unlock_slowpath+0xe2/0x610 [ 308.810975][T12219] ? lock_is_held_type+0xd5/0x130 [ 308.815995][T12219] ? wait_for_completion_io+0x270/0x270 [ 308.821538][T12219] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 308.827790][T12219] ? vfs_write+0x18e/0xa30 [ 308.832203][T12219] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 308.838438][T12219] ? fput+0x2a/0x50 [ 308.842251][T12219] __x64_sys_sendmmsg+0x99/0x100 [ 308.847185][T12219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 308.853073][T12219] do_syscall_64+0x2d/0x70 [ 308.857482][T12219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.863373][T12219] RIP: 0033:0x465ef9 [ 308.867259][T12219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 308.886868][T12219] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 308.895275][T12219] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 308.903236][T12219] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 308.911198][T12219] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 308.919162][T12219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.927121][T12219] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:26 executing program 1 (fault-call:1 fault-nth:8): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x2, 0x29, 0x0, 0x0) 16:34:26 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000980)={&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80, 0x0}, 0x0) 16:34:26 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5422, 0x0) 16:34:26 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockname$tipc(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 16:34:26 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000000)) 16:34:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0xe, 0x4, 0x0, 0x75}, 0x40) 16:34:26 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) connect(r0, &(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80) [ 309.299361][T12250] FAULT_INJECTION: forcing a failure. [ 309.299361][T12250] name failslab, interval 1, probability 0, space 0, times 0 16:34:26 executing program 2: r0 = epoll_create(0x40fff) r1 = syz_io_uring_setup(0x23f0, &(0x7f0000000240), &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) 16:34:26 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05640, &(0x7f0000000040)) [ 309.347492][T12250] CPU: 1 PID: 12250 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 309.356321][T12250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.366403][T12250] Call Trace: [ 309.369709][T12250] dump_stack+0xfa/0x151 [ 309.373994][T12250] should_fail.cold+0x5/0xa [ 309.378534][T12250] ? sctp_auth_shkey_create+0x81/0x1b0 [ 309.384029][T12250] should_failslab+0x5/0x10 [ 309.388580][T12250] kmem_cache_alloc_trace+0x55/0x3a0 [ 309.393899][T12250] sctp_auth_shkey_create+0x81/0x1b0 [ 309.399220][T12250] sctp_auth_asoc_copy_shkeys+0x1e8/0x350 [ 309.404983][T12250] sctp_association_new+0x17d3/0x21b0 [ 309.410399][T12250] sctp_connect_new_asoc+0x1ac/0x770 [ 309.415718][T12250] ? sctp_bind+0x110/0x110 [ 309.420164][T12250] ? __local_bh_enable_ip+0xa0/0x120 [ 309.425474][T12250] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 309.431738][T12250] ? security_sctp_bind_connect+0x8f/0xc0 [ 309.437484][T12250] sctp_sendmsg+0x13bc/0x1d30 [ 309.442191][T12250] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 309.447358][T12250] ? lock_is_held_type+0xd5/0x130 [ 309.452430][T12250] ? aa_af_perm+0x230/0x230 [ 309.456961][T12250] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 309.463245][T12250] inet_sendmsg+0x99/0xe0 [ 309.467601][T12250] ? inet_send_prepare+0x4d0/0x4d0 [ 309.472739][T12250] sock_sendmsg+0xcf/0x120 [ 309.477181][T12250] ____sys_sendmsg+0x331/0x810 [ 309.481973][T12250] ? kernel_sendmsg+0x50/0x50 [ 309.486665][T12250] ? do_recvmmsg+0x6d0/0x6d0 [ 309.491284][T12250] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 309.497297][T12250] ___sys_sendmsg+0xf3/0x170 [ 309.501914][T12250] ? sendmsg_copy_msghdr+0x160/0x160 [ 309.507231][T12250] ? __fget_files+0x266/0x3d0 [ 309.511930][T12250] ? lock_downgrade+0x6d0/0x6d0 [ 309.516819][T12250] ? __fget_files+0x288/0x3d0 [ 309.521525][T12250] ? __fget_light+0xea/0x280 [ 309.526139][T12250] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 309.532410][T12250] __sys_sendmmsg+0x195/0x470 [ 309.537119][T12250] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 309.542199][T12250] ? lock_downgrade+0x6d0/0x6d0 [ 309.547112][T12250] ? __mutex_unlock_slowpath+0xe2/0x610 [ 309.552684][T12250] ? lock_is_held_type+0xd5/0x130 [ 309.557733][T12250] ? wait_for_completion_io+0x270/0x270 [ 309.563306][T12250] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 309.569575][T12250] ? vfs_write+0x18e/0xa30 [ 309.574019][T12250] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 309.580369][T12250] ? fput+0x2a/0x50 [ 309.584219][T12250] __x64_sys_sendmmsg+0x99/0x100 [ 309.589228][T12250] ? syscall_enter_from_user_mode+0x1d/0x50 [ 309.595145][T12250] do_syscall_64+0x2d/0x70 [ 309.599582][T12250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.605498][T12250] RIP: 0033:0x465ef9 [ 309.609407][T12250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 309.629040][T12250] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 309.637479][T12250] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 16:34:26 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100182, 0x0) [ 309.645470][T12250] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 309.653456][T12250] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 309.661444][T12250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.669433][T12250] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:26 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 16:34:27 executing program 1 (fault-call:1 fault-nth:9): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:27 executing program 3: r0 = socket(0xa, 0x3, 0x4) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x29, 0x30, 0x0, 0x300) 16:34:27 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) mmap$dsp(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) 16:34:27 executing program 0: prctl$PR_GET_PDEATHSIG(0x15, 0x0) 16:34:27 executing program 2: r0 = syz_usb_connect(0x0, 0x58, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000036ee3808d30b55056a694000000109024600010000000009040000000e010000082403ff01030000092403e70580"], 0x0) syz_usb_control_io(r0, &(0x7f0000000280)={0x18, 0x0, &(0x7f0000000140)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x421}}, 0x0, 0x0, 0x0}, 0x0) 16:34:27 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snd/seq\x00', 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000440)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 16:34:27 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)={0x8fb}) 16:34:27 executing program 3: prctl$PR_SET_SPECULATION_CTRL(0x2a, 0x0) 16:34:27 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000300)='/dev/video#\x00', 0xe2, 0x2) ioctl$vim2m_VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000340)) [ 310.141930][T12287] FAULT_INJECTION: forcing a failure. [ 310.141930][T12287] name failslab, interval 1, probability 0, space 0, times 0 [ 310.212014][T12287] CPU: 0 PID: 12287 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 310.220843][T12287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.230918][T12287] Call Trace: [ 310.234214][T12287] dump_stack+0xfa/0x151 [ 310.238491][T12287] should_fail.cold+0x5/0xa [ 310.243024][T12287] ? sctp_auth_shkey_create+0x81/0x1b0 [ 310.248515][T12287] should_failslab+0x5/0x10 [ 310.253045][T12287] kmem_cache_alloc_trace+0x55/0x3a0 [ 310.258360][T12287] sctp_auth_shkey_create+0x81/0x1b0 [ 310.263674][T12287] sctp_auth_asoc_copy_shkeys+0x1e8/0x350 [ 310.269430][T12287] sctp_association_new+0x17d3/0x21b0 [ 310.274844][T12287] sctp_connect_new_asoc+0x1ac/0x770 [ 310.280160][T12287] ? sctp_bind+0x110/0x110 [ 310.284609][T12287] ? __local_bh_enable_ip+0xa0/0x120 [ 310.289921][T12287] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 310.296197][T12287] ? security_sctp_bind_connect+0x8f/0xc0 [ 310.301955][T12287] sctp_sendmsg+0x13bc/0x1d30 [ 310.306669][T12287] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 310.311811][T12287] ? lock_is_held_type+0xd5/0x130 [ 310.316887][T12287] ? aa_af_perm+0x230/0x230 [ 310.321426][T12287] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 310.327711][T12287] inet_sendmsg+0x99/0xe0 [ 310.332070][T12287] ? inet_send_prepare+0x4d0/0x4d0 [ 310.337212][T12287] sock_sendmsg+0xcf/0x120 [ 310.341669][T12287] ____sys_sendmsg+0x331/0x810 [ 310.346468][T12287] ? kernel_sendmsg+0x50/0x50 [ 310.351176][T12287] ? do_recvmmsg+0x6d0/0x6d0 [ 310.355804][T12287] ? lockdep_hardirqs_on_prepare+0x400/0x400 16:34:27 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000040)) [ 310.361831][T12287] ___sys_sendmsg+0xf3/0x170 [ 310.366455][T12287] ? sendmsg_copy_msghdr+0x160/0x160 [ 310.371890][T12287] ? __fget_files+0x266/0x3d0 [ 310.376600][T12287] ? lock_downgrade+0x6d0/0x6d0 [ 310.381496][T12287] ? __fget_files+0x288/0x3d0 [ 310.386210][T12287] ? __fget_light+0xea/0x280 [ 310.390828][T12287] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 310.397105][T12287] __sys_sendmmsg+0x195/0x470 [ 310.401821][T12287] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 310.406873][T12287] ? lock_downgrade+0x6d0/0x6d0 [ 310.411768][T12287] ? __mutex_unlock_slowpath+0xe2/0x610 [ 310.417343][T12287] ? lock_is_held_type+0xd5/0x130 [ 310.422395][T12287] ? wait_for_completion_io+0x270/0x270 [ 310.427968][T12287] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 310.434238][T12287] ? vfs_write+0x18e/0xa30 [ 310.438684][T12287] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 310.444952][T12287] ? fput+0x2a/0x50 [ 310.448807][T12287] __x64_sys_sendmmsg+0x99/0x100 [ 310.453784][T12287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 310.459714][T12287] do_syscall_64+0x2d/0x70 [ 310.464166][T12287] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.470118][T12287] RIP: 0033:0x465ef9 [ 310.474038][T12287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 310.493781][T12287] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 310.502226][T12287] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 310.510223][T12287] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 310.518216][T12287] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 310.526215][T12287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 310.534211][T12287] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYRES16], 0xbd8}}, 0x0) 16:34:27 executing program 1 (fault-call:1 fault-nth:10): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 310.707357][ T3196] usb 3-1: new high-speed USB device number 2 using dummy_hcd 16:34:27 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000020c0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r1, 0x10, &(0x7f0000000300)={&(0x7f0000000280)=""/122, 0x7a}}, 0x10) 16:34:27 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x25) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = memfd_create(&(0x7f0000000600)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8c\xecR\xb2\x1b\x99vS\xa6K&u\x9dX\xcc\r\x12\x01\b\x00\x80\x00\x00\x00\x00E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\xaf\xfdj\x83nj\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c\xdc\xa8\xd30HX\xe9\t\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89m3\x1d\x1c@\x8eu\x85\xce\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D+\x1f\xdd\x9aY\xcd\xbf\xbc\xc8\x85\x1c\xdb1\xee\x14\f{\xf35\xcbH\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \x00\x00\x00\x00\x99\xdd\x80\x03\xec@\x9f\x8elx\b\xf1\xb4^X\x99\xbb\xa0\xf5Bx\xa9cT\f\x99\xbf\xb5\xebj.t\xa2\xaeM\x9c\x14_\x19\xe1\xe0H\x16\xedi:\x00\x00\x00\x00\x00\x00\x00\x00\xca\x97\xba\xf2\x1b\xeb\xa5h\xeb\xb0\xc0xe\xa3\x12\xcb\xef\xda\xa2nBP\xaf(\xb0\x8a\xdb\xa2M\xf1\x84\x05\x8cK\x8b\x93\xe9oBx\xd6\xad\xfdF\xee8\xca\x95|\xe2\x84\x11\x1c\x81M\a\x04\xd6\xd1\xed4\xc8\x82\xf2C\xf61\x13X8\x99M\xf1B\xac\xd7\xc7\x1d\x8f\xb2\x80\xf4\x1a\n\xe5\x8e\x80x^k\xfc\n\xd9?g\xa2\x7f!\xdf,\x7f\xa2\xa43\xd3h\xfd\xe7\x1b\x148\x191M\xf4O\xd1%\xa55\x9f[CBF\x00T\xf0\xdf\xe1\xfdK2(cy\x18K\xef\xfe\xeb\xdf\xc9cX\xf4\xf9\x91._\x9b%\x1a[\xa9ql\x19\xf1\x9bYF\x1e\x90\'\xe5\xd2\x19\f&{t%\xb0z \n4\xba5\xa4:\xe8\xdb\xdd\xef\xc4j\xf4@\x8bc\xec(\xb7\xdb\x85\xa3v&;\xaf\xd9\xed$\x9f\x1b0\xad|\xb7&\xbb\xcd\xae\x85\x1c\x865\xb7\xd4_r\xf157\ri\x9b\xe3\xcc\xa9\xab\xf0\x9e\xaa\r\xa1MV\xbe\x82\xbb\xec\"_\xd1]~\xcd\xd7\xc0;\xc7IM&\xb0\x80\xd4\nBD\x01*\xd3d\xe7]\f\\\x85\xc9Qs:$\xf7\xdcGQY?)\x9a\xee\xe02\xabo\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbaK\x10t{\xd6\x11c\x03\xc9\xb3\xff\xfaUe\"k\xa9\xbc\x1a\x03\xfeC;\xed1W\xe6_d\xff8\xa0\xfa\x99\xdd\x92\xe3\xe5y{\xd6\xa0\xc4\ngNn\x9fND\x99\xd9_6\x8f\xb2\xb3;', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 16:34:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x41}}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}], 0x20) sendto$inet(r0, &(0x7f0000000040)="bd", 0x1, 0x0, &(0x7f0000001040)={0x2, 0x0, @local}, 0x10) [ 310.811564][T12303] FAULT_INJECTION: forcing a failure. [ 310.811564][T12303] name failslab, interval 1, probability 0, space 0, times 0 [ 310.844733][T12303] CPU: 1 PID: 12303 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 310.853562][T12303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.863645][T12303] Call Trace: [ 310.866951][T12303] dump_stack+0xfa/0x151 [ 310.871223][T12303] should_fail.cold+0x5/0xa [ 310.875757][T12303] ? sctp_add_bind_addr+0x90/0x390 [ 310.880905][T12303] should_failslab+0x5/0x10 [ 310.885441][T12303] kmem_cache_alloc_trace+0x55/0x3a0 [ 310.890753][T12303] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 310.896523][T12303] sctp_add_bind_addr+0x90/0x390 [ 310.901506][T12303] sctp_copy_local_addr_list+0x33e/0x4e0 [ 310.907181][T12303] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 310.912328][T12303] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 310.918605][T12303] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 310.924531][T12303] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 310.930463][T12303] sctp_bind_addr_copy+0xde/0x460 [ 310.935532][T12303] sctp_connect_new_asoc+0x1cd/0x770 [ 310.940849][T12303] ? sctp_bind+0x110/0x110 [ 310.945295][T12303] ? __local_bh_enable_ip+0xa0/0x120 [ 310.950600][T12303] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 310.956875][T12303] ? security_sctp_bind_connect+0x8f/0xc0 [ 310.962635][T12303] sctp_sendmsg+0x13bc/0x1d30 [ 310.967352][T12303] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 310.972495][T12303] ? lock_is_held_type+0xd5/0x130 [ 310.977572][T12303] ? aa_af_perm+0x230/0x230 [ 310.982119][T12303] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 310.988397][T12303] inet_sendmsg+0x99/0xe0 [ 310.992759][T12303] ? inet_send_prepare+0x4d0/0x4d0 [ 310.997904][T12303] sock_sendmsg+0xcf/0x120 [ 311.002350][T12303] ____sys_sendmsg+0x331/0x810 [ 311.007140][T12303] ? kernel_sendmsg+0x50/0x50 [ 311.011843][T12303] ? do_recvmmsg+0x6d0/0x6d0 [ 311.016466][T12303] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 311.022488][T12303] ___sys_sendmsg+0xf3/0x170 [ 311.027113][T12303] ? sendmsg_copy_msghdr+0x160/0x160 [ 311.032434][T12303] ? __fget_files+0x266/0x3d0 [ 311.037141][T12303] ? lock_downgrade+0x6d0/0x6d0 [ 311.042037][T12303] ? __fget_files+0x288/0x3d0 [ 311.046747][T12303] ? __fget_light+0xea/0x280 [ 311.051371][T12303] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 311.057653][T12303] __sys_sendmmsg+0x195/0x470 [ 311.062373][T12303] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 311.067431][T12303] ? lock_downgrade+0x6d0/0x6d0 [ 311.072331][T12303] ? __mutex_unlock_slowpath+0xe2/0x610 [ 311.077910][T12303] ? lock_is_held_type+0xd5/0x130 [ 311.082968][T12303] ? wait_for_completion_io+0x270/0x270 [ 311.088551][T12303] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 311.094824][T12303] ? vfs_write+0x18e/0xa30 [ 311.099271][T12303] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 311.105558][T12303] ? fput+0x2a/0x50 [ 311.109410][T12303] __x64_sys_sendmmsg+0x99/0x100 [ 311.114375][T12303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 311.120299][T12303] do_syscall_64+0x2d/0x70 [ 311.124743][T12303] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.130672][T12303] RIP: 0033:0x465ef9 [ 311.134589][T12303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 311.154222][T12303] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 311.162671][T12303] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 311.170800][T12303] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 311.178803][T12303] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 311.186804][T12303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 311.194797][T12303] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:28 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x44}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 311.287298][ T3196] usb 3-1: Using ep0 maxpacket: 8 [ 311.428166][ T3196] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 311.537956][ T3196] usb 3-1: New USB device found, idVendor=0bd3, idProduct=0555, bcdDevice=69.6a [ 311.555597][ T3196] usb 3-1: New USB device strings: Mfr=64, Product=0, SerialNumber=0 [ 311.617211][ T3196] usb 3-1: Manufacturer: syz [ 311.643417][ T3196] usb 3-1: config 0 descriptor?? [ 311.907543][ T3196] usb 3-1: Found UVC 0.00 device (0bd3:0555) [ 311.914652][ T3196] uvcvideo 3-1:0.0: Entity type for entity С was not initialized! [ 311.942808][ T3196] usb 3-1: Failed to create links for entity 255 [ 311.973688][ T3196] usb 3-1: Failed to register entities (-22). [ 311.992645][ T3196] usb 3-1: Failed to create links for entity 231 [ 312.011848][ T3196] usb 3-1: Failed to register entities (-22). [ 312.113575][ T9632] usb 3-1: USB disconnect, device number 2 [ 312.887161][ T8101] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 313.157237][ T8101] usb 3-1: Using ep0 maxpacket: 8 [ 313.297918][ T8101] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config 16:34:30 executing program 2: r0 = syz_usb_connect(0x0, 0x58, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000036ee3808d30b55056a694000000109024600010000000009040000000e010000082403ff01030000092403e70580"], 0x0) syz_usb_control_io(r0, &(0x7f0000000280)={0x18, 0x0, &(0x7f0000000140)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x421}}, 0x0, 0x0, 0x0}, 0x0) 16:34:30 executing program 1 (fault-call:1 fault-nth:11): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a4803600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792ef0fd}, 0x0) 16:34:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000740)=0xc) 16:34:30 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4041, 0x0) [ 313.421581][ T8101] usb 3-1: New USB device found, idVendor=0bd3, idProduct=0555, bcdDevice=69.6a [ 313.430739][ T8101] usb 3-1: New USB device strings: Mfr=64, Product=0, SerialNumber=0 [ 313.440670][ T8101] usb 3-1: Manufacturer: syz [ 313.457522][ T8101] usb 3-1: config 0 descriptor?? [ 313.499041][ T8101] usb 3-1: can't set config #0, error -71 [ 313.512456][ T8101] usb 3-1: USB disconnect, device number 3 [ 313.533035][T12355] FAULT_INJECTION: forcing a failure. [ 313.533035][T12355] name failslab, interval 1, probability 0, space 0, times 0 [ 313.607722][T12355] CPU: 0 PID: 12355 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 313.616552][T12355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.626635][T12355] Call Trace: [ 313.629932][T12355] dump_stack+0xfa/0x151 [ 313.634211][T12355] should_fail.cold+0x5/0xa [ 313.638747][T12355] ? sctp_add_bind_addr+0x90/0x390 [ 313.643972][T12355] should_failslab+0x5/0x10 [ 313.648500][T12355] kmem_cache_alloc_trace+0x55/0x3a0 [ 313.653859][T12355] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 313.659620][T12355] sctp_add_bind_addr+0x90/0x390 [ 313.664600][T12355] sctp_copy_local_addr_list+0x33e/0x4e0 [ 313.670279][T12355] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 313.675438][T12355] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 313.681714][T12355] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 313.687647][T12355] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 313.693583][T12355] sctp_bind_addr_copy+0xde/0x460 [ 313.698650][T12355] sctp_connect_new_asoc+0x1cd/0x770 [ 313.703964][T12355] ? sctp_bind+0x110/0x110 [ 313.708409][T12355] ? __local_bh_enable_ip+0xa0/0x120 [ 313.713716][T12355] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 313.719985][T12355] ? security_sctp_bind_connect+0x8f/0xc0 [ 313.725736][T12355] sctp_sendmsg+0x13bc/0x1d30 [ 313.730450][T12355] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 313.735583][T12355] ? lock_is_held_type+0xd5/0x130 [ 313.740655][T12355] ? aa_af_perm+0x230/0x230 [ 313.745185][T12355] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 313.751458][T12355] inet_sendmsg+0x99/0xe0 [ 313.755817][T12355] ? inet_send_prepare+0x4d0/0x4d0 [ 313.760952][T12355] sock_sendmsg+0xcf/0x120 [ 313.765404][T12355] ____sys_sendmsg+0x331/0x810 [ 313.770193][T12355] ? kernel_sendmsg+0x50/0x50 [ 313.774897][T12355] ? do_recvmmsg+0x6d0/0x6d0 [ 313.779520][T12355] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 313.785538][T12355] ___sys_sendmsg+0xf3/0x170 [ 313.790159][T12355] ? sendmsg_copy_msghdr+0x160/0x160 [ 313.795482][T12355] ? __fget_files+0x266/0x3d0 [ 313.800191][T12355] ? lock_downgrade+0x6d0/0x6d0 [ 313.805086][T12355] ? __fget_files+0x288/0x3d0 [ 313.809800][T12355] ? __fget_light+0xea/0x280 [ 313.814419][T12355] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 313.820695][T12355] __sys_sendmmsg+0x195/0x470 [ 313.825411][T12355] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 313.830498][T12355] ? lock_downgrade+0x6d0/0x6d0 [ 313.835392][T12355] ? __mutex_unlock_slowpath+0xe2/0x610 [ 313.840966][T12355] ? lock_is_held_type+0xd5/0x130 [ 313.846017][T12355] ? wait_for_completion_io+0x270/0x270 [ 313.851590][T12355] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 313.857859][T12355] ? vfs_write+0x18e/0xa30 [ 313.862310][T12355] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 313.868579][T12355] ? fput+0x2a/0x50 [ 313.872430][T12355] __x64_sys_sendmmsg+0x99/0x100 [ 313.877396][T12355] ? syscall_enter_from_user_mode+0x1d/0x50 [ 313.883348][T12355] do_syscall_64+0x2d/0x70 [ 313.887790][T12355] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.893715][T12355] RIP: 0033:0x465ef9 [ 313.897634][T12355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 313.917265][T12355] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 313.925717][T12355] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 313.933716][T12355] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 313.941712][T12355] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 313.949705][T12355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:31 executing program 0: clock_gettime(0x4, &(0x7f0000005140)) 16:34:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000023c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000002400)={0x4, 0x8}, 0x10) [ 313.957698][T12355] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 314.066469][T12360] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.074826][T12360] bridge0: port 1(bridge_slave_0) entered disabled state 16:34:31 executing program 1 (fault-call:1 fault-nth:12): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 314.121768][T12360] device bridge0 entered promiscuous mode 16:34:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000740)) 16:34:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 314.234358][T12383] FAULT_INJECTION: forcing a failure. [ 314.234358][T12383] name failslab, interval 1, probability 0, space 0, times 0 [ 314.301570][T12383] CPU: 1 PID: 12383 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 314.310412][T12383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.320491][T12383] Call Trace: [ 314.323798][T12383] dump_stack+0xfa/0x151 [ 314.328083][T12383] should_fail.cold+0x5/0xa [ 314.332732][T12383] ? sctp_add_bind_addr+0x90/0x390 [ 314.337893][T12383] should_failslab+0x5/0x10 [ 314.342429][T12383] kmem_cache_alloc_trace+0x55/0x3a0 [ 314.347742][T12383] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 314.353503][T12383] sctp_add_bind_addr+0x90/0x390 [ 314.358477][T12383] sctp_copy_local_addr_list+0x33e/0x4e0 [ 314.364163][T12383] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 314.369333][T12383] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 314.375607][T12383] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 314.381542][T12383] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 314.387483][T12383] sctp_bind_addr_copy+0xde/0x460 [ 314.392557][T12383] sctp_connect_new_asoc+0x1cd/0x770 [ 314.397878][T12383] ? sctp_bind+0x110/0x110 [ 314.402326][T12383] ? __local_bh_enable_ip+0xa0/0x120 [ 314.407641][T12383] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 314.413915][T12383] ? security_sctp_bind_connect+0x8f/0xc0 [ 314.419668][T12383] sctp_sendmsg+0x13bc/0x1d30 [ 314.424379][T12383] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 314.429512][T12383] ? lock_is_held_type+0xd5/0x130 [ 314.434583][T12383] ? aa_af_perm+0x230/0x230 [ 314.439114][T12383] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 314.445396][T12383] inet_sendmsg+0x99/0xe0 [ 314.449753][T12383] ? inet_send_prepare+0x4d0/0x4d0 [ 314.454895][T12383] sock_sendmsg+0xcf/0x120 [ 314.459341][T12383] ____sys_sendmsg+0x331/0x810 [ 314.464131][T12383] ? kernel_sendmsg+0x50/0x50 [ 314.468831][T12383] ? do_recvmmsg+0x6d0/0x6d0 [ 314.473453][T12383] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 314.479467][T12383] ___sys_sendmsg+0xf3/0x170 [ 314.484085][T12383] ? sendmsg_copy_msghdr+0x160/0x160 [ 314.489402][T12383] ? __fget_files+0x266/0x3d0 [ 314.494102][T12383] ? lock_downgrade+0x6d0/0x6d0 [ 314.498995][T12383] ? __fget_files+0x288/0x3d0 [ 314.503706][T12383] ? __fget_light+0xea/0x280 [ 314.508350][T12383] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 314.514628][T12383] __sys_sendmmsg+0x195/0x470 [ 314.519342][T12383] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 314.524396][T12383] ? lock_downgrade+0x6d0/0x6d0 [ 314.529290][T12383] ? __mutex_unlock_slowpath+0xe2/0x610 [ 314.534867][T12383] ? lock_is_held_type+0xd5/0x130 [ 314.539940][T12383] ? wait_for_completion_io+0x270/0x270 [ 314.545516][T12383] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 314.551783][T12383] ? vfs_write+0x18e/0xa30 [ 314.556229][T12383] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 314.562501][T12383] ? fput+0x2a/0x50 [ 314.566351][T12383] __x64_sys_sendmmsg+0x99/0x100 [ 314.571318][T12383] ? syscall_enter_from_user_mode+0x1d/0x50 [ 314.577240][T12383] do_syscall_64+0x2d/0x70 [ 314.581680][T12383] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.587601][T12383] RIP: 0033:0x465ef9 [ 314.591520][T12383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 314.611153][T12383] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 314.619599][T12383] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 314.627597][T12383] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 314.635596][T12383] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 314.643585][T12383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 314.651587][T12383] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 [ 314.671744][ T8101] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 314.892463][T12367] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 314.918834][T12367] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.925976][T12367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.933486][T12367] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.940624][T12367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.952343][ T8101] usb 3-1: Using ep0 maxpacket: 8 [ 315.005926][T12393] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.013161][T12393] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.107707][ T8101] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 315.205998][T12394] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 315.215989][T12394] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.223194][T12394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.230641][T12394] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.237895][T12394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.249536][ T8101] usb 3-1: New USB device found, idVendor=0bd3, idProduct=0555, bcdDevice=69.6a [ 315.258789][ T8101] usb 3-1: New USB device strings: Mfr=64, Product=0, SerialNumber=0 [ 315.268202][ T8101] usb 3-1: Manufacturer: syz [ 315.274657][ T8101] usb 3-1: config 0 descriptor?? [ 315.561867][ T8101] usb 3-1: Found UVC 0.00 device (0bd3:0555) [ 315.568893][ T8101] uvcvideo 3-1:0.0: Entity type for entity С was not initialized! [ 315.587174][ T8101] usb 3-1: Failed to create links for entity 255 [ 315.593561][ T8101] usb 3-1: Failed to register entities (-22). [ 315.599767][ T8101] usb 3-1: Failed to create links for entity 231 [ 315.606122][ T8101] usb 3-1: Failed to register entities (-22). [ 315.772704][ T8101] usb 3-1: USB disconnect, device number 4 16:34:33 executing program 2: r0 = socket(0xa, 0x3, 0x7) sendmmsg$unix(r0, &(0x7f00000040c0)=[{&(0x7f0000000180)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x10}}], 0xf}], 0x1, 0x0) 16:34:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01a33f6c5f00000000001b"], 0x14}}, 0x0) 16:34:33 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="6e00000009148d000000000000000000080001"], 0xb0}}, 0x0) 16:34:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:33 executing program 1 (fault-call:1 fault-nth:13): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:33 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="10000000ee13"], 0x10}}, 0x0) [ 316.352190][T12420] netlink: 86 bytes leftover after parsing attributes in process `syz-executor.4'. [ 316.370045][T12422] FAULT_INJECTION: forcing a failure. [ 316.370045][T12422] name failslab, interval 1, probability 0, space 0, times 0 16:34:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'gre0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00bf"]}) [ 316.436425][T12422] CPU: 1 PID: 12422 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 316.445268][T12422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.455349][T12422] Call Trace: [ 316.458655][T12422] dump_stack+0xfa/0x151 [ 316.462934][T12422] should_fail.cold+0x5/0xa [ 316.467482][T12422] ? sctp_add_bind_addr+0x90/0x390 [ 316.472631][T12422] should_failslab+0x5/0x10 [ 316.477168][T12422] kmem_cache_alloc_trace+0x55/0x3a0 [ 316.482475][T12422] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 316.488234][T12422] sctp_add_bind_addr+0x90/0x390 [ 316.493211][T12422] sctp_copy_local_addr_list+0x33e/0x4e0 [ 316.498888][T12422] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 316.504054][T12422] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 316.510327][T12422] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 316.516255][T12422] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 316.522183][T12422] sctp_bind_addr_copy+0xde/0x460 [ 316.527246][T12422] sctp_connect_new_asoc+0x1cd/0x770 [ 316.532568][T12422] ? sctp_bind+0x110/0x110 [ 316.537019][T12422] ? __local_bh_enable_ip+0xa0/0x120 [ 316.542330][T12422] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 316.548600][T12422] ? security_sctp_bind_connect+0x8f/0xc0 [ 316.554351][T12422] sctp_sendmsg+0x13bc/0x1d30 [ 316.559061][T12422] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 316.564197][T12422] ? lock_is_held_type+0xd5/0x130 [ 316.569276][T12422] ? aa_af_perm+0x230/0x230 [ 316.573816][T12422] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 316.580253][T12422] inet_sendmsg+0x99/0xe0 [ 316.584621][T12422] ? inet_send_prepare+0x4d0/0x4d0 [ 316.589762][T12422] sock_sendmsg+0xcf/0x120 [ 316.594207][T12422] ____sys_sendmsg+0x331/0x810 [ 316.599000][T12422] ? kernel_sendmsg+0x50/0x50 [ 316.603699][T12422] ? do_recvmmsg+0x6d0/0x6d0 [ 316.608326][T12422] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 316.614351][T12422] ___sys_sendmsg+0xf3/0x170 [ 316.618975][T12422] ? sendmsg_copy_msghdr+0x160/0x160 [ 316.624300][T12422] ? __fget_files+0x266/0x3d0 [ 316.629008][T12422] ? lock_downgrade+0x6d0/0x6d0 [ 316.633908][T12422] ? __fget_files+0x288/0x3d0 [ 316.638627][T12422] ? __fget_light+0xea/0x280 [ 316.643257][T12422] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 316.649533][T12422] __sys_sendmmsg+0x195/0x470 [ 316.654258][T12422] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 316.659316][T12422] ? lock_downgrade+0x6d0/0x6d0 [ 316.664216][T12422] ? __mutex_unlock_slowpath+0xe2/0x610 [ 316.669794][T12422] ? lock_is_held_type+0xd5/0x130 [ 316.674997][T12422] ? wait_for_completion_io+0x270/0x270 [ 316.680588][T12422] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 316.686859][T12422] ? vfs_write+0x18e/0xa30 [ 316.691309][T12422] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 316.697585][T12422] ? fput+0x2a/0x50 [ 316.701443][T12422] __x64_sys_sendmmsg+0x99/0x100 [ 316.706413][T12422] ? syscall_enter_from_user_mode+0x1d/0x50 [ 316.712337][T12422] do_syscall_64+0x2d/0x70 [ 316.716780][T12422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.722707][T12422] RIP: 0033:0x465ef9 16:34:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 316.726621][T12422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.746252][T12422] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 316.754698][T12422] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 316.762696][T12422] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 316.770692][T12422] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 316.778695][T12422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x5, 0x5, 0xffc}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x10) 16:34:33 executing program 2: r0 = socket(0xa, 0x3, 0x7) ioctl$sock_SIOCINQ(r0, 0x8902, &(0x7f0000000000)) [ 316.786684][T12422] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 [ 316.858920][ T3267] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.865308][ T3267] ieee802154 phy1 wpan1: encryption failed: -22 16:34:33 executing program 1 (fault-call:1 fault-nth:14): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x10, 0x3fb, 0x1}, 0x10}}, 0x0) 16:34:34 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x1410, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x18}}, 0x0) 16:34:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 317.044762][T12451] FAULT_INJECTION: forcing a failure. [ 317.044762][T12451] name failslab, interval 1, probability 0, space 0, times 0 [ 317.084281][T12451] CPU: 0 PID: 12451 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 317.093104][T12451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.103182][T12451] Call Trace: [ 317.106476][T12451] dump_stack+0xfa/0x151 [ 317.110746][T12451] should_fail.cold+0x5/0xa [ 317.115282][T12451] ? sctp_add_bind_addr+0x90/0x390 [ 317.120416][T12451] should_failslab+0x5/0x10 [ 317.124943][T12451] kmem_cache_alloc_trace+0x55/0x3a0 [ 317.130274][T12451] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 317.136034][T12451] sctp_add_bind_addr+0x90/0x390 16:34:34 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="6e00000009148d"], 0xb0}}, 0x0) [ 317.141015][T12451] sctp_copy_local_addr_list+0x33e/0x4e0 [ 317.146695][T12451] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 317.151840][T12451] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.158113][T12451] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 317.164045][T12451] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 317.169973][T12451] sctp_bind_addr_copy+0xde/0x460 [ 317.175053][T12451] sctp_connect_new_asoc+0x1cd/0x770 [ 317.180367][T12451] ? sctp_bind+0x110/0x110 [ 317.184813][T12451] ? __local_bh_enable_ip+0xa0/0x120 [ 317.190123][T12451] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 317.196395][T12451] ? security_sctp_bind_connect+0x8f/0xc0 [ 317.202144][T12451] sctp_sendmsg+0x13bc/0x1d30 [ 317.206986][T12451] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 317.212128][T12451] ? lock_is_held_type+0xd5/0x130 [ 317.217212][T12451] ? aa_af_perm+0x230/0x230 [ 317.221754][T12451] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.228031][T12451] inet_sendmsg+0x99/0xe0 [ 317.232389][T12451] ? inet_send_prepare+0x4d0/0x4d0 [ 317.237528][T12451] sock_sendmsg+0xcf/0x120 [ 317.241976][T12451] ____sys_sendmsg+0x331/0x810 [ 317.246770][T12451] ? kernel_sendmsg+0x50/0x50 [ 317.251465][T12451] ? do_recvmmsg+0x6d0/0x6d0 [ 317.256089][T12451] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 317.262112][T12451] ___sys_sendmsg+0xf3/0x170 [ 317.266736][T12451] ? sendmsg_copy_msghdr+0x160/0x160 [ 317.272056][T12451] ? __fget_files+0x266/0x3d0 [ 317.276767][T12451] ? lock_downgrade+0x6d0/0x6d0 [ 317.281661][T12451] ? __fget_files+0x288/0x3d0 [ 317.286370][T12451] ? __fget_light+0xea/0x280 [ 317.290981][T12451] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.297255][T12451] __sys_sendmmsg+0x195/0x470 [ 317.301964][T12451] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 317.307014][T12451] ? lock_downgrade+0x6d0/0x6d0 [ 317.311915][T12451] ? __mutex_unlock_slowpath+0xe2/0x610 [ 317.317486][T12451] ? lock_is_held_type+0xd5/0x130 [ 317.322537][T12451] ? wait_for_completion_io+0x270/0x270 [ 317.328112][T12451] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 317.334379][T12451] ? vfs_write+0x18e/0xa30 [ 317.338827][T12451] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.345671][T12451] ? fput+0x2a/0x50 [ 317.349513][T12451] __x64_sys_sendmmsg+0x99/0x100 [ 317.355170][T12451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 317.361101][T12451] do_syscall_64+0x2d/0x70 [ 317.365556][T12451] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.371490][T12451] RIP: 0033:0x465ef9 [ 317.375411][T12451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.395047][T12451] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 317.403500][T12451] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 317.411496][T12451] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 317.419490][T12451] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 317.427480][T12451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 317.435472][T12451] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:34 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x5409, 0x0) 16:34:34 executing program 1 (fault-call:1 fault-nth:15): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 317.565168][T12466] netlink: 94 bytes leftover after parsing attributes in process `syz-executor.5'. 16:34:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:34 executing program 2: r0 = socket(0xa, 0x3, 0x7) sendmmsg$unix(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=@abs, 0x6e, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000180)="c3", 0x1}], 0x2}], 0x1, 0x0) [ 317.673193][T12469] FAULT_INJECTION: forcing a failure. [ 317.673193][T12469] name failslab, interval 1, probability 0, space 0, times 0 [ 317.721888][T12469] CPU: 1 PID: 12469 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 317.730708][T12469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.740793][T12469] Call Trace: [ 317.744089][T12469] dump_stack+0xfa/0x151 [ 317.748365][T12469] should_fail.cold+0x5/0xa [ 317.752903][T12469] ? sctp_add_bind_addr+0x90/0x390 [ 317.758064][T12469] should_failslab+0x5/0x10 [ 317.762600][T12469] kmem_cache_alloc_trace+0x55/0x3a0 [ 317.767914][T12469] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 317.773670][T12469] sctp_add_bind_addr+0x90/0x390 [ 317.778653][T12469] sctp_copy_local_addr_list+0x33e/0x4e0 [ 317.784326][T12469] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 317.789473][T12469] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.795755][T12469] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 317.801689][T12469] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 317.807629][T12469] sctp_bind_addr_copy+0xde/0x460 [ 317.812702][T12469] sctp_connect_new_asoc+0x1cd/0x770 [ 317.818018][T12469] ? sctp_bind+0x110/0x110 [ 317.822557][T12469] ? __local_bh_enable_ip+0xa0/0x120 [ 317.827871][T12469] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 317.834145][T12469] ? security_sctp_bind_connect+0x8f/0xc0 [ 317.839895][T12469] sctp_sendmsg+0x13bc/0x1d30 [ 317.844611][T12469] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 317.849747][T12469] ? lock_is_held_type+0xd5/0x130 [ 317.854825][T12469] ? aa_af_perm+0x230/0x230 [ 317.859364][T12469] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.865641][T12469] inet_sendmsg+0x99/0xe0 [ 317.870000][T12469] ? inet_send_prepare+0x4d0/0x4d0 [ 317.875141][T12469] sock_sendmsg+0xcf/0x120 [ 317.879593][T12469] ____sys_sendmsg+0x331/0x810 [ 317.884394][T12469] ? kernel_sendmsg+0x50/0x50 [ 317.889096][T12469] ? do_recvmmsg+0x6d0/0x6d0 [ 317.893726][T12469] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 317.899748][T12469] ___sys_sendmsg+0xf3/0x170 [ 317.904371][T12469] ? sendmsg_copy_msghdr+0x160/0x160 [ 317.909693][T12469] ? __fget_files+0x266/0x3d0 [ 317.914397][T12469] ? lock_downgrade+0x6d0/0x6d0 [ 317.919292][T12469] ? __fget_files+0x288/0x3d0 [ 317.924004][T12469] ? __fget_light+0xea/0x280 [ 317.928622][T12469] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 317.934914][T12469] __sys_sendmmsg+0x195/0x470 [ 317.939628][T12469] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 317.944685][T12469] ? lock_downgrade+0x6d0/0x6d0 [ 317.949580][T12469] ? __mutex_unlock_slowpath+0xe2/0x610 [ 317.955162][T12469] ? lock_is_held_type+0xd5/0x130 [ 317.960223][T12469] ? wait_for_completion_io+0x270/0x270 [ 317.965808][T12469] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 317.972088][T12469] ? vfs_write+0x18e/0xa30 [ 317.976544][T12469] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 317.982820][T12469] ? fput+0x2a/0x50 [ 317.986674][T12469] __x64_sys_sendmmsg+0x99/0x100 [ 317.991645][T12469] ? syscall_enter_from_user_mode+0x1d/0x50 [ 317.997571][T12469] do_syscall_64+0x2d/0x70 [ 318.002017][T12469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.007941][T12469] RIP: 0033:0x465ef9 [ 318.011856][T12469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.031490][T12469] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 318.039943][T12469] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 318.047936][T12469] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 318.055932][T12469] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.063928][T12469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 318.071929][T12469] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:36 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$packet(r0, 0x0, 0x0, 0x40002060, 0x0, 0xfffffffffffffeae) 16:34:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x5, 0x5, 0xffc}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) 16:34:36 executing program 1 (fault-call:1 fault-nth:16): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:36 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmmsg$unix(r0, &(0x7f0000006540)=[{0x0, 0x0, 0x0}], 0x1, 0x0) [ 319.954224][T12490] FAULT_INJECTION: forcing a failure. [ 319.954224][T12490] name failslab, interval 1, probability 0, space 0, times 0 16:34:37 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="6e0000000b148dffffff9e0000000000080001"], 0xb0}}, 0x0) [ 320.020768][T12490] CPU: 1 PID: 12490 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 320.029588][T12490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.039666][T12490] Call Trace: [ 320.042963][T12490] dump_stack+0xfa/0x151 [ 320.047239][T12490] should_fail.cold+0x5/0xa [ 320.051770][T12490] ? sctp_add_bind_addr+0x90/0x390 [ 320.056908][T12490] should_failslab+0x5/0x10 [ 320.061439][T12490] kmem_cache_alloc_trace+0x55/0x3a0 16:34:37 executing program 4: r0 = socket(0xa, 0x3, 0x7) socket$packet(0x11, 0x2, 0x300) sendmmsg$unix(r0, &(0x7f00000040c0)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) [ 320.066749][T12490] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 320.072501][T12490] sctp_add_bind_addr+0x90/0x390 [ 320.077471][T12490] sctp_copy_local_addr_list+0x33e/0x4e0 [ 320.083166][T12490] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 320.088312][T12490] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 320.094581][T12490] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 320.100508][T12490] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 320.106441][T12490] sctp_bind_addr_copy+0xde/0x460 [ 320.111511][T12490] sctp_connect_new_asoc+0x1cd/0x770 [ 320.116827][T12490] ? sctp_bind+0x110/0x110 [ 320.121273][T12490] ? __local_bh_enable_ip+0xa0/0x120 [ 320.126579][T12490] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 320.132845][T12490] ? security_sctp_bind_connect+0x8f/0xc0 [ 320.138594][T12490] sctp_sendmsg+0x13bc/0x1d30 [ 320.143303][T12490] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 320.148440][T12490] ? lock_is_held_type+0xd5/0x130 [ 320.153627][T12490] ? aa_af_perm+0x230/0x230 [ 320.158163][T12490] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 320.164443][T12490] inet_sendmsg+0x99/0xe0 16:34:37 executing program 2: syz_open_procfs(0x0, &(0x7f0000000100)='net/softnet_stat\x00') [ 320.168804][T12490] ? inet_send_prepare+0x4d0/0x4d0 [ 320.173945][T12490] sock_sendmsg+0xcf/0x120 [ 320.178394][T12490] ____sys_sendmsg+0x331/0x810 [ 320.183192][T12490] ? kernel_sendmsg+0x50/0x50 [ 320.187901][T12490] ? do_recvmmsg+0x6d0/0x6d0 [ 320.192533][T12490] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 320.198558][T12490] ___sys_sendmsg+0xf3/0x170 [ 320.203188][T12490] ? sendmsg_copy_msghdr+0x160/0x160 [ 320.208514][T12490] ? __fget_files+0x266/0x3d0 [ 320.213222][T12490] ? lock_downgrade+0x6d0/0x6d0 16:34:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 320.218122][T12490] ? __fget_files+0x288/0x3d0 [ 320.222836][T12490] ? __fget_light+0xea/0x280 [ 320.227463][T12490] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 320.233787][T12490] __sys_sendmmsg+0x195/0x470 [ 320.238501][T12490] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 320.243553][T12490] ? lock_downgrade+0x6d0/0x6d0 [ 320.248451][T12490] ? __mutex_unlock_slowpath+0xe2/0x610 [ 320.254023][T12490] ? lock_is_held_type+0xd5/0x130 [ 320.259075][T12490] ? wait_for_completion_io+0x270/0x270 [ 320.264650][T12490] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 320.270939][T12490] ? vfs_write+0x18e/0xa30 [ 320.275393][T12490] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 320.281674][T12490] ? fput+0x2a/0x50 [ 320.285531][T12490] __x64_sys_sendmmsg+0x99/0x100 [ 320.290498][T12490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 320.296425][T12490] do_syscall_64+0x2d/0x70 [ 320.300866][T12490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.306788][T12490] RIP: 0033:0x465ef9 [ 320.310700][T12490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.330337][T12490] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 320.338789][T12490] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 320.346791][T12490] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 320.354790][T12490] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 320.362789][T12490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 320.370909][T12490] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:37 executing program 1 (fault-call:1 fault-nth:17): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 320.499115][T12510] netlink: 86 bytes leftover after parsing attributes in process `syz-executor.5'. 16:34:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:37 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:34:37 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x402c542d, 0x0) 16:34:37 executing program 2: r0 = socket(0xa, 0x3, 0x7) sendmmsg$unix(r0, &(0x7f0000009280)=[{&(0x7f00000000c0)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="1c000000000000000100000003"], 0xe8}], 0x1, 0x0) [ 320.673485][T12519] FAULT_INJECTION: forcing a failure. [ 320.673485][T12519] name failslab, interval 1, probability 0, space 0, times 0 16:34:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:37 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$TIOCSRS485(r0, 0x5409, 0x0) [ 320.736645][T12519] CPU: 1 PID: 12519 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 320.745482][T12519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.755576][T12519] Call Trace: [ 320.758888][T12519] dump_stack+0xfa/0x151 [ 320.763180][T12519] should_fail.cold+0x5/0xa [ 320.767723][T12519] ? sctp_add_bind_addr+0x90/0x390 [ 320.773015][T12519] should_failslab+0x5/0x10 [ 320.777556][T12519] kmem_cache_alloc_trace+0x55/0x3a0 16:34:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 320.782884][T12519] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 320.788657][T12519] sctp_add_bind_addr+0x90/0x390 [ 320.793775][T12519] sctp_copy_local_addr_list+0x33e/0x4e0 [ 320.799454][T12519] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 320.804613][T12519] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 320.810952][T12519] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 320.817002][T12519] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 320.822936][T12519] sctp_bind_addr_copy+0xde/0x460 [ 320.828013][T12519] sctp_connect_new_asoc+0x1cd/0x770 [ 320.833771][T12519] ? sctp_bind+0x110/0x110 [ 320.838229][T12519] ? __local_bh_enable_ip+0xa0/0x120 [ 320.843561][T12519] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 320.849848][T12519] ? security_sctp_bind_connect+0x8f/0xc0 [ 320.855672][T12519] sctp_sendmsg+0x13bc/0x1d30 [ 320.860403][T12519] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 320.865554][T12519] ? lock_is_held_type+0xd5/0x130 [ 320.870638][T12519] ? aa_af_perm+0x230/0x230 [ 320.875189][T12519] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 320.881473][T12519] inet_sendmsg+0x99/0xe0 [ 320.885852][T12519] ? inet_send_prepare+0x4d0/0x4d0 [ 320.891107][T12519] sock_sendmsg+0xcf/0x120 [ 320.895561][T12519] ____sys_sendmsg+0x331/0x810 [ 320.900363][T12519] ? kernel_sendmsg+0x50/0x50 [ 320.905071][T12519] ? do_recvmmsg+0x6d0/0x6d0 [ 320.909712][T12519] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 320.915758][T12519] ___sys_sendmsg+0xf3/0x170 [ 320.920390][T12519] ? sendmsg_copy_msghdr+0x160/0x160 [ 320.925727][T12519] ? __fget_files+0x266/0x3d0 [ 320.930443][T12519] ? lock_downgrade+0x6d0/0x6d0 [ 320.935347][T12519] ? __fget_files+0x288/0x3d0 [ 320.940065][T12519] ? __fget_light+0xea/0x280 [ 320.944740][T12519] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 320.951021][T12519] __sys_sendmmsg+0x195/0x470 [ 320.955848][T12519] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 320.960917][T12519] ? lock_downgrade+0x6d0/0x6d0 [ 320.966775][T12519] ? __mutex_unlock_slowpath+0xe2/0x610 [ 320.972357][T12519] ? lock_is_held_type+0xd5/0x130 [ 320.977417][T12519] ? wait_for_completion_io+0x270/0x270 16:34:38 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="6e00000001148d00000000000000000008000100000000000800030000000000080008"], 0xb0}}, 0x0) [ 320.982998][T12519] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 320.989277][T12519] ? vfs_write+0x18e/0xa30 [ 320.993738][T12519] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 321.000023][T12519] ? fput+0x2a/0x50 [ 321.003886][T12519] __x64_sys_sendmmsg+0x99/0x100 [ 321.008878][T12519] ? syscall_enter_from_user_mode+0x1d/0x50 [ 321.014822][T12519] do_syscall_64+0x2d/0x70 [ 321.019270][T12519] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.025201][T12519] RIP: 0033:0x465ef9 16:34:38 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x1407, 0x1}, 0x10}}, 0x0) [ 321.029120][T12519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.048871][T12519] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 321.057322][T12519] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 321.065327][T12519] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 321.073332][T12519] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 321.081339][T12519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 321.089344][T12519] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:38 executing program 1 (fault-call:1 fault-nth:18): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 321.200737][T12538] netlink: 'syz-executor.5': attribute type 8 has an invalid length. [ 321.270901][T12542] FAULT_INJECTION: forcing a failure. [ 321.270901][T12542] name failslab, interval 1, probability 0, space 0, times 0 [ 321.312052][T12542] CPU: 1 PID: 12542 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 321.320885][T12542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.331064][T12542] Call Trace: [ 321.334498][T12542] dump_stack+0xfa/0x151 [ 321.338783][T12542] should_fail.cold+0x5/0xa [ 321.343453][T12542] ? sctp_add_bind_addr+0x90/0x390 [ 321.348607][T12542] should_failslab+0x5/0x10 [ 321.353154][T12542] kmem_cache_alloc_trace+0x55/0x3a0 [ 321.358587][T12542] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 321.364350][T12542] sctp_add_bind_addr+0x90/0x390 [ 321.369336][T12542] sctp_copy_local_addr_list+0x33e/0x4e0 [ 321.375217][T12542] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 321.380378][T12542] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 321.386669][T12542] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 321.392605][T12542] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 321.398555][T12542] sctp_bind_addr_copy+0xde/0x460 [ 321.403629][T12542] sctp_connect_new_asoc+0x1cd/0x770 [ 321.408955][T12542] ? sctp_bind+0x110/0x110 [ 321.413411][T12542] ? __local_bh_enable_ip+0xa0/0x120 [ 321.418746][T12542] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 321.425029][T12542] ? security_sctp_bind_connect+0x8f/0xc0 [ 321.430790][T12542] sctp_sendmsg+0x13bc/0x1d30 [ 321.435615][T12542] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 321.440766][T12542] ? lock_is_held_type+0xd5/0x130 [ 321.445847][T12542] ? aa_af_perm+0x230/0x230 [ 321.450395][T12542] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 321.456679][T12542] inet_sendmsg+0x99/0xe0 [ 321.461041][T12542] ? inet_send_prepare+0x4d0/0x4d0 [ 321.466179][T12542] sock_sendmsg+0xcf/0x120 [ 321.470632][T12542] ____sys_sendmsg+0x331/0x810 [ 321.475535][T12542] ? kernel_sendmsg+0x50/0x50 [ 321.480250][T12542] ? do_recvmmsg+0x6d0/0x6d0 [ 321.484886][T12542] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 321.490919][T12542] ___sys_sendmsg+0xf3/0x170 [ 321.495547][T12542] ? sendmsg_copy_msghdr+0x160/0x160 [ 321.500872][T12542] ? __fget_files+0x266/0x3d0 [ 321.505584][T12542] ? lock_downgrade+0x6d0/0x6d0 [ 321.510487][T12542] ? __fget_files+0x288/0x3d0 [ 321.515319][T12542] ? __fget_light+0xea/0x280 [ 321.519944][T12542] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 321.526318][T12542] __sys_sendmmsg+0x195/0x470 [ 321.531048][T12542] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 321.536111][T12542] ? lock_downgrade+0x6d0/0x6d0 [ 321.541155][T12542] ? __mutex_unlock_slowpath+0xe2/0x610 [ 321.546747][T12542] ? lock_is_held_type+0xd5/0x130 [ 321.551889][T12542] ? wait_for_completion_io+0x270/0x270 [ 321.557473][T12542] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 321.563757][T12542] ? vfs_write+0x18e/0xa30 [ 321.568217][T12542] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 321.574634][T12542] ? fput+0x2a/0x50 [ 321.578603][T12542] __x64_sys_sendmmsg+0x99/0x100 [ 321.583714][T12542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 321.589654][T12542] do_syscall_64+0x2d/0x70 [ 321.594107][T12542] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.600041][T12542] RIP: 0033:0x465ef9 [ 321.604082][T12542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.623761][T12542] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 321.632223][T12542] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 321.640249][T12542] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 321.648251][T12542] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 321.656256][T12542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 321.664260][T12542] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:40 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000004540)=[{0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}, {&(0x7f0000000080)="e1", 0x1}], 0x3, 0x0, 0x700}], 0x1, 0x0) 16:34:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:40 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x5409, 0x0) close(r0) 16:34:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004540)=[{0x0, 0x0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000080)='\x00', 0x1}, {&(0x7f00000003c0)="ea", 0x1}], 0x3}], 0x1, 0x0) 16:34:40 executing program 1 (fault-call:1 fault-nth:19): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 323.563170][T12556] FAULT_INJECTION: forcing a failure. [ 323.563170][T12556] name failslab, interval 1, probability 0, space 0, times 0 [ 323.617455][T12556] CPU: 0 PID: 12556 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 323.626376][T12556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.636469][T12556] Call Trace: [ 323.639907][T12556] dump_stack+0xfa/0x151 [ 323.644202][T12556] should_fail.cold+0x5/0xa [ 323.648752][T12556] ? sctp_add_bind_addr+0x90/0x390 [ 323.653910][T12556] should_failslab+0x5/0x10 [ 323.658460][T12556] kmem_cache_alloc_trace+0x55/0x3a0 [ 323.663785][T12556] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 323.669554][T12556] sctp_add_bind_addr+0x90/0x390 [ 323.674550][T12556] sctp_copy_local_addr_list+0x33e/0x4e0 [ 323.680244][T12556] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 323.685558][T12556] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 323.691980][T12556] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 323.697921][T12556] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 323.704012][T12556] sctp_bind_addr_copy+0xde/0x460 [ 323.709094][T12556] sctp_connect_new_asoc+0x1cd/0x770 [ 323.714429][T12556] ? sctp_bind+0x110/0x110 [ 323.718902][T12556] ? __local_bh_enable_ip+0xa0/0x120 [ 323.724222][T12556] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 323.730504][T12556] ? security_sctp_bind_connect+0x8f/0xc0 [ 323.736272][T12556] sctp_sendmsg+0x13bc/0x1d30 [ 323.741120][T12556] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 323.746271][T12556] ? lock_is_held_type+0xd5/0x130 [ 323.751361][T12556] ? aa_af_perm+0x230/0x230 [ 323.755908][T12556] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 323.762193][T12556] inet_sendmsg+0x99/0xe0 [ 323.766555][T12556] ? inet_send_prepare+0x4d0/0x4d0 [ 323.771719][T12556] sock_sendmsg+0xcf/0x120 [ 323.776171][T12556] ____sys_sendmsg+0x331/0x810 [ 323.780972][T12556] ? kernel_sendmsg+0x50/0x50 [ 323.785698][T12556] ? do_recvmmsg+0x6d0/0x6d0 [ 323.790353][T12556] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 323.796381][T12556] ___sys_sendmsg+0xf3/0x170 [ 323.801144][T12556] ? sendmsg_copy_msghdr+0x160/0x160 [ 323.806471][T12556] ? __fget_files+0x266/0x3d0 [ 323.811183][T12556] ? lock_downgrade+0x6d0/0x6d0 16:34:40 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', r1) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 323.816068][T12556] ? lock_release+0x3bb/0x710 [ 323.820781][T12556] ? update_curr+0x3da/0x840 [ 323.825482][T12556] ? __fget_files+0x288/0x3d0 [ 323.830197][T12556] ? __fget_light+0xea/0x280 [ 323.834815][T12556] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 323.841097][T12556] __sys_sendmmsg+0x195/0x470 [ 323.845791][T12556] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 323.850960][T12556] ? lock_downgrade+0x6d0/0x6d0 [ 323.856087][T12556] ? __mutex_unlock_slowpath+0xe2/0x610 [ 323.861639][T12556] ? preempt_schedule_thunk+0x16/0x18 [ 323.867084][T12556] ? vfs_write+0x44c/0xa30 [ 323.871505][T12556] ? wait_for_completion_io+0x270/0x270 [ 323.877066][T12556] ? vfs_write+0x18e/0xa30 [ 323.881675][T12556] __x64_sys_sendmmsg+0x99/0x100 [ 323.886815][T12556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 323.892719][T12556] do_syscall_64+0x2d/0x70 [ 323.897140][T12556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.903042][T12556] RIP: 0033:0x465ef9 [ 323.906940][T12556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.926549][T12556] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 323.934970][T12556] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 323.943121][T12556] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 323.951242][T12556] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 323.959350][T12556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:41 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:41 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x5437, 0x0) [ 323.967326][T12556] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:41 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x6e, 0x1405, 0x3571, 0x0, 0x0, "", [{{0x46}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}, {{0x8}, {0x8}}]}, 0xb0}}, 0x0) 16:34:41 executing program 1 (fault-call:1 fault-nth:20): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:41 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 324.171245][T12576] FAULT_INJECTION: forcing a failure. [ 324.171245][T12576] name failslab, interval 1, probability 0, space 0, times 0 [ 324.193702][T12579] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 324.203050][T12579] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. [ 324.232162][T12576] CPU: 0 PID: 12576 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 324.241001][T12576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.251086][T12576] Call Trace: [ 324.254526][T12576] dump_stack+0xfa/0x151 [ 324.258906][T12576] should_fail.cold+0x5/0xa [ 324.263453][T12576] ? sctp_add_bind_addr+0x90/0x390 [ 324.268609][T12576] should_failslab+0x5/0x10 [ 324.273148][T12576] kmem_cache_alloc_trace+0x55/0x3a0 [ 324.278467][T12576] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 324.284231][T12576] sctp_add_bind_addr+0x90/0x390 [ 324.289212][T12576] sctp_copy_local_addr_list+0x33e/0x4e0 [ 324.294892][T12576] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 324.300045][T12576] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 324.306410][T12576] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 324.312434][T12576] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 324.318370][T12576] sctp_bind_addr_copy+0xde/0x460 [ 324.323607][T12576] sctp_connect_new_asoc+0x1cd/0x770 [ 324.329030][T12576] ? sctp_bind+0x110/0x110 [ 324.333490][T12576] ? __local_bh_enable_ip+0xa0/0x120 [ 324.338813][T12576] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 324.345105][T12576] ? security_sctp_bind_connect+0x8f/0xc0 [ 324.350877][T12576] sctp_sendmsg+0x13bc/0x1d30 [ 324.355602][T12576] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 324.360762][T12576] ? lock_is_held_type+0xd5/0x130 [ 324.365847][T12576] ? aa_af_perm+0x230/0x230 [ 324.370400][T12576] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 324.376820][T12576] inet_sendmsg+0x99/0xe0 [ 324.381354][T12576] ? inet_send_prepare+0x4d0/0x4d0 [ 324.386511][T12576] sock_sendmsg+0xcf/0x120 [ 324.390971][T12576] ____sys_sendmsg+0x331/0x810 [ 324.395772][T12576] ? kernel_sendmsg+0x50/0x50 [ 324.400483][T12576] ? do_recvmmsg+0x6d0/0x6d0 [ 324.405110][T12576] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 324.411138][T12576] ___sys_sendmsg+0xf3/0x170 [ 324.415771][T12576] ? sendmsg_copy_msghdr+0x160/0x160 [ 324.421099][T12576] ? __fget_files+0x266/0x3d0 [ 324.425938][T12576] ? lock_downgrade+0x6d0/0x6d0 [ 324.430845][T12576] ? __fget_files+0x288/0x3d0 [ 324.435568][T12576] ? __fget_light+0xea/0x280 [ 324.440193][T12576] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 324.446476][T12576] __sys_sendmmsg+0x195/0x470 [ 324.451189][T12576] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 324.456247][T12576] ? lock_downgrade+0x6d0/0x6d0 [ 324.461152][T12576] ? __mutex_unlock_slowpath+0xe2/0x610 [ 324.466738][T12576] ? lock_is_held_type+0xd5/0x130 [ 324.471907][T12576] ? wait_for_completion_io+0x270/0x270 [ 324.477572][T12576] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 324.484020][T12576] ? vfs_write+0x18e/0xa30 [ 324.488484][T12576] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 324.494895][T12576] ? fput+0x2a/0x50 [ 324.498761][T12576] __x64_sys_sendmmsg+0x99/0x100 [ 324.503740][T12576] ? syscall_enter_from_user_mode+0x1d/0x50 [ 324.509672][T12576] do_syscall_64+0x2d/0x70 [ 324.514123][T12576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.520480][T12576] RIP: 0033:0x465ef9 [ 324.524536][T12576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 324.544175][T12576] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 324.552642][T12576] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 324.560891][T12576] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 324.569025][T12576] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 16:34:41 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) read$alg(r0, &(0x7f0000000c40)=""/4096, 0x1000) [ 324.577030][T12576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 324.585030][T12576] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:44 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x5410, 0x0) 16:34:44 executing program 2: r0 = socket(0xa, 0x3, 0x7) sendmmsg$unix(r0, &(0x7f00000040c0)=[{&(0x7f0000000180)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001240)=[@cred={{0x1c, 0x1, 0x3d, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20}], 0x1, 0x0) 16:34:44 executing program 1 (fault-call:1 fault-nth:21): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:44 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:44 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000c00)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00', r0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x11400000840, 0xe2641) [ 327.155263][T12611] FAULT_INJECTION: forcing a failure. [ 327.155263][T12611] name failslab, interval 1, probability 0, space 0, times 0 [ 327.187801][T12611] CPU: 0 PID: 12611 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 16:34:44 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 327.196626][T12611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.206710][T12611] Call Trace: [ 327.210016][T12611] dump_stack+0xfa/0x151 [ 327.214320][T12611] should_fail.cold+0x5/0xa [ 327.218861][T12611] ? sctp_add_bind_addr+0x90/0x390 [ 327.224006][T12611] should_failslab+0x5/0x10 [ 327.228546][T12611] kmem_cache_alloc_trace+0x55/0x3a0 [ 327.233863][T12611] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 327.239621][T12611] sctp_add_bind_addr+0x90/0x390 [ 327.244689][T12611] sctp_copy_local_addr_list+0x33e/0x4e0 [ 327.250370][T12611] ? sctp_v4_get_dst+0x11c0/0x11c0 16:34:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x7, &(0x7f0000000040)=[{0x5}, {}, {}, {}, {}, {}, {}]}) [ 327.255519][T12611] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 327.261800][T12611] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 327.267737][T12611] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 327.273675][T12611] sctp_bind_addr_copy+0xde/0x460 [ 327.278743][T12611] sctp_connect_new_asoc+0x1cd/0x770 [ 327.284059][T12611] ? sctp_bind+0x110/0x110 [ 327.288532][T12611] ? __local_bh_enable_ip+0xa0/0x120 [ 327.293842][T12611] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 327.300115][T12611] ? security_sctp_bind_connect+0x8f/0xc0 [ 327.305877][T12611] sctp_sendmsg+0x13bc/0x1d30 [ 327.310596][T12611] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 327.315738][T12611] ? lock_is_held_type+0xd5/0x130 [ 327.320814][T12611] ? aa_af_perm+0x230/0x230 [ 327.325355][T12611] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 327.331629][T12611] inet_sendmsg+0x99/0xe0 [ 327.335988][T12611] ? inet_send_prepare+0x4d0/0x4d0 [ 327.341132][T12611] sock_sendmsg+0xcf/0x120 [ 327.345581][T12611] ____sys_sendmsg+0x331/0x810 [ 327.350379][T12611] ? kernel_sendmsg+0x50/0x50 [ 327.355390][T12611] ? do_recvmmsg+0x6d0/0x6d0 [ 327.360133][T12611] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 327.366146][T12611] ___sys_sendmsg+0xf3/0x170 [ 327.370766][T12611] ? sendmsg_copy_msghdr+0x160/0x160 [ 327.376088][T12611] ? __fget_files+0x266/0x3d0 [ 327.380794][T12611] ? lock_downgrade+0x6d0/0x6d0 [ 327.385690][T12611] ? __fget_files+0x288/0x3d0 [ 327.390411][T12611] ? __fget_light+0xea/0x280 [ 327.395028][T12611] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 327.401306][T12611] __sys_sendmmsg+0x195/0x470 [ 327.406020][T12611] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 327.411070][T12611] ? lock_downgrade+0x6d0/0x6d0 [ 327.416044][T12611] ? __mutex_unlock_slowpath+0xe2/0x610 [ 327.421617][T12611] ? lock_is_held_type+0xd5/0x130 [ 327.426672][T12611] ? wait_for_completion_io+0x270/0x270 [ 327.432254][T12611] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 327.438523][T12611] ? vfs_write+0x18e/0xa30 [ 327.442963][T12611] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 327.449227][T12611] ? fput+0x2a/0x50 [ 327.453086][T12611] __x64_sys_sendmmsg+0x99/0x100 [ 327.458050][T12611] ? syscall_enter_from_user_mode+0x1d/0x50 [ 327.463975][T12611] do_syscall_64+0x2d/0x70 [ 327.468429][T12611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 327.474357][T12611] RIP: 0033:0x465ef9 [ 327.478270][T12611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 327.497993][T12611] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 327.506437][T12611] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 327.514429][T12611] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 327.522418][T12611] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 327.530415][T12611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 327.538410][T12611] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:44 executing program 4: socket$inet(0x2, 0x8000b, 0x0) 16:34:44 executing program 2: mknodat(0xffffffffffffffff, 0x0, 0xe807, 0x0) 16:34:44 executing program 1 (fault-call:1 fault-nth:22): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:44 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000003140)='/proc/thread-self\x00', 0x0, 0x0) [ 327.772243][T12633] FAULT_INJECTION: forcing a failure. [ 327.772243][T12633] name failslab, interval 1, probability 0, space 0, times 0 [ 327.813415][T12633] CPU: 1 PID: 12633 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 327.822237][T12633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.832315][T12633] Call Trace: [ 327.835610][T12633] dump_stack+0xfa/0x151 [ 327.839887][T12633] should_fail.cold+0x5/0xa [ 327.844419][T12633] ? sctp_add_bind_addr+0x90/0x390 [ 327.849558][T12633] should_failslab+0x5/0x10 [ 327.854093][T12633] kmem_cache_alloc_trace+0x55/0x3a0 [ 327.859403][T12633] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 327.865154][T12633] sctp_add_bind_addr+0x90/0x390 [ 327.870124][T12633] sctp_copy_local_addr_list+0x33e/0x4e0 [ 327.875872][T12633] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 327.881021][T12633] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 327.887295][T12633] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 327.893220][T12633] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 327.899149][T12633] sctp_bind_addr_copy+0xde/0x460 [ 327.904215][T12633] sctp_connect_new_asoc+0x1cd/0x770 [ 327.909532][T12633] ? sctp_bind+0x110/0x110 [ 327.913977][T12633] ? __local_bh_enable_ip+0xa0/0x120 [ 327.919288][T12633] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 327.925562][T12633] ? security_sctp_bind_connect+0x8f/0xc0 [ 327.931317][T12633] sctp_sendmsg+0x13bc/0x1d30 [ 327.936033][T12633] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 327.941162][T12633] ? lock_is_held_type+0xd5/0x130 [ 327.946230][T12633] ? aa_af_perm+0x230/0x230 [ 327.950763][T12633] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 327.957041][T12633] inet_sendmsg+0x99/0xe0 [ 327.961416][T12633] ? inet_send_prepare+0x4d0/0x4d0 [ 327.966578][T12633] sock_sendmsg+0xcf/0x120 [ 327.971050][T12633] ____sys_sendmsg+0x331/0x810 [ 327.975893][T12633] ? kernel_sendmsg+0x50/0x50 [ 327.980593][T12633] ? do_recvmmsg+0x6d0/0x6d0 [ 327.985235][T12633] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 327.991264][T12633] ___sys_sendmsg+0xf3/0x170 [ 327.995881][T12633] ? sendmsg_copy_msghdr+0x160/0x160 [ 328.001457][T12633] ? __fget_files+0x266/0x3d0 [ 328.006157][T12633] ? lock_downgrade+0x6d0/0x6d0 [ 328.011052][T12633] ? __fget_files+0x288/0x3d0 [ 328.015767][T12633] ? __fget_light+0xea/0x280 [ 328.020380][T12633] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 328.026654][T12633] __sys_sendmmsg+0x195/0x470 [ 328.031366][T12633] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 328.036417][T12633] ? lock_downgrade+0x6d0/0x6d0 [ 328.041302][T12633] ? __mutex_unlock_slowpath+0xe2/0x610 [ 328.046874][T12633] ? lock_is_held_type+0xd5/0x130 [ 328.051922][T12633] ? wait_for_completion_io+0x270/0x270 [ 328.057489][T12633] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 328.063771][T12633] ? vfs_write+0x18e/0xa30 [ 328.068213][T12633] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 328.074479][T12633] ? fput+0x2a/0x50 [ 328.078326][T12633] __x64_sys_sendmmsg+0x99/0x100 [ 328.083290][T12633] ? syscall_enter_from_user_mode+0x1d/0x50 [ 328.089212][T12633] do_syscall_64+0x2d/0x70 [ 328.093655][T12633] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 328.099620][T12633] RIP: 0033:0x465ef9 [ 328.103527][T12633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 328.123154][T12633] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 328.131599][T12633] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 328.139593][T12633] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 328.147585][T12633] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 328.155584][T12633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 328.163584][T12633] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:47 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)=0x1) 16:34:47 executing program 5: sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x20018861) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x800, 0x4, 0xfff, 0x8, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x40) 16:34:47 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:47 executing program 1 (fault-call:1 fault-nth:23): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x6, 0x0, 0x0, 0x0) 16:34:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fork() [ 330.723867][T12655] FAULT_INJECTION: forcing a failure. [ 330.723867][T12655] name failslab, interval 1, probability 0, space 0, times 0 16:34:47 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 330.770495][T12655] CPU: 1 PID: 12655 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 330.779322][T12655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.789407][T12655] Call Trace: [ 330.792707][T12655] dump_stack+0xfa/0x151 [ 330.796983][T12655] should_fail.cold+0x5/0xa [ 330.801517][T12655] ? sctp_add_bind_addr+0x90/0x390 [ 330.806653][T12655] should_failslab+0x5/0x10 [ 330.811173][T12655] kmem_cache_alloc_trace+0x55/0x3a0 [ 330.816451][T12655] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 330.822172][T12655] sctp_add_bind_addr+0x90/0x390 [ 330.827113][T12655] sctp_copy_local_addr_list+0x33e/0x4e0 [ 330.832749][T12655] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 330.837861][T12655] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 330.844098][T12655] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 330.849989][T12655] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 330.855886][T12655] sctp_bind_addr_copy+0xde/0x460 [ 330.860948][T12655] sctp_connect_new_asoc+0x1cd/0x770 [ 330.866231][T12655] ? sctp_bind+0x110/0x110 [ 330.870642][T12655] ? __local_bh_enable_ip+0xa0/0x120 [ 330.875917][T12655] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 330.882154][T12655] ? security_sctp_bind_connect+0x8f/0xc0 [ 330.887868][T12655] sctp_sendmsg+0x13bc/0x1d30 [ 330.892546][T12655] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 330.897655][T12655] ? lock_is_held_type+0xd5/0x130 [ 330.902697][T12655] ? aa_af_perm+0x230/0x230 [ 330.907199][T12655] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 330.913441][T12655] inet_sendmsg+0x99/0xe0 [ 330.917766][T12655] ? inet_send_prepare+0x4d0/0x4d0 [ 330.922869][T12655] sock_sendmsg+0xcf/0x120 [ 330.927284][T12655] ____sys_sendmsg+0x331/0x810 [ 330.932048][T12655] ? kernel_sendmsg+0x50/0x50 [ 330.936720][T12655] ? do_recvmmsg+0x6d0/0x6d0 [ 330.941309][T12655] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 330.947294][T12655] ___sys_sendmsg+0xf3/0x170 [ 330.951973][T12655] ? sendmsg_copy_msghdr+0x160/0x160 [ 330.957256][T12655] ? __fget_files+0x266/0x3d0 [ 330.961929][T12655] ? lock_downgrade+0x6d0/0x6d0 [ 330.966786][T12655] ? __fget_files+0x288/0x3d0 [ 330.971462][T12655] ? __fget_light+0xea/0x280 [ 330.976048][T12655] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 330.982292][T12655] __sys_sendmmsg+0x195/0x470 [ 330.986976][T12655] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 330.991996][T12655] ? lock_downgrade+0x6d0/0x6d0 [ 330.996849][T12655] ? __mutex_unlock_slowpath+0xe2/0x610 [ 331.002391][T12655] ? lock_is_held_type+0xd5/0x130 [ 331.007409][T12655] ? wait_for_completion_io+0x270/0x270 [ 331.012948][T12655] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 331.019182][T12655] ? vfs_write+0x18e/0xa30 [ 331.023596][T12655] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 331.029831][T12655] ? fput+0x2a/0x50 [ 331.033641][T12655] __x64_sys_sendmmsg+0x99/0x100 [ 331.038572][T12655] ? syscall_enter_from_user_mode+0x1d/0x50 [ 331.044465][T12655] do_syscall_64+0x2d/0x70 [ 331.048875][T12655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 331.054765][T12655] RIP: 0033:0x465ef9 [ 331.058655][T12655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 331.078259][T12655] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 331.086669][T12655] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 331.094634][T12655] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 331.102597][T12655] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 331.110560][T12655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 331.118522][T12655] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:48 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)=0x1) 16:34:48 executing program 1 (fault-call:1 fault-nth:24): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, 0x0, 0x0, 0x0) [ 331.411672][T12670] FAULT_INJECTION: forcing a failure. [ 331.411672][T12670] name failslab, interval 1, probability 0, space 0, times 0 [ 331.460434][T12670] CPU: 1 PID: 12670 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 331.469262][T12670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.479342][T12670] Call Trace: [ 331.482643][T12670] dump_stack+0xfa/0x151 [ 331.486927][T12670] should_fail.cold+0x5/0xa [ 331.491467][T12670] ? sctp_add_bind_addr+0x90/0x390 [ 331.496607][T12670] should_failslab+0x5/0x10 [ 331.501137][T12670] kmem_cache_alloc_trace+0x55/0x3a0 [ 331.506450][T12670] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 331.512209][T12670] sctp_add_bind_addr+0x90/0x390 [ 331.517183][T12670] sctp_copy_local_addr_list+0x33e/0x4e0 [ 331.522855][T12670] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 331.528001][T12670] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 331.534275][T12670] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 331.540204][T12670] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 331.546136][T12670] sctp_bind_addr_copy+0xde/0x460 [ 331.551209][T12670] sctp_connect_new_asoc+0x1cd/0x770 [ 331.556529][T12670] ? sctp_bind+0x110/0x110 [ 331.560978][T12670] ? __local_bh_enable_ip+0xa0/0x120 [ 331.566287][T12670] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 331.572553][T12670] ? security_sctp_bind_connect+0x8f/0xc0 [ 331.578307][T12670] sctp_sendmsg+0x13bc/0x1d30 [ 331.583023][T12670] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 331.588170][T12670] ? lock_is_held_type+0xd5/0x130 [ 331.593241][T12670] ? aa_af_perm+0x230/0x230 [ 331.597770][T12670] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 331.604048][T12670] inet_sendmsg+0x99/0xe0 [ 331.608401][T12670] ? inet_send_prepare+0x4d0/0x4d0 [ 331.613544][T12670] sock_sendmsg+0xcf/0x120 [ 331.617991][T12670] ____sys_sendmsg+0x331/0x810 [ 331.622785][T12670] ? kernel_sendmsg+0x50/0x50 [ 331.627483][T12670] ? do_recvmmsg+0x6d0/0x6d0 [ 331.632111][T12670] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 331.638132][T12670] ___sys_sendmsg+0xf3/0x170 [ 331.642753][T12670] ? sendmsg_copy_msghdr+0x160/0x160 [ 331.648071][T12670] ? __fget_files+0x266/0x3d0 [ 331.652777][T12670] ? lock_downgrade+0x6d0/0x6d0 [ 331.657681][T12670] ? __fget_files+0x288/0x3d0 [ 331.662400][T12670] ? __fget_light+0xea/0x280 [ 331.667025][T12670] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 331.673305][T12670] __sys_sendmmsg+0x195/0x470 [ 331.678017][T12670] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 331.683070][T12670] ? lock_downgrade+0x6d0/0x6d0 [ 331.687966][T12670] ? __mutex_unlock_slowpath+0xe2/0x610 [ 331.693552][T12670] ? lock_is_held_type+0xd5/0x130 [ 331.698609][T12670] ? wait_for_completion_io+0x270/0x270 [ 331.704189][T12670] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 331.710460][T12670] ? vfs_write+0x18e/0xa30 [ 331.714908][T12670] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 331.721176][T12670] ? fput+0x2a/0x50 [ 331.725021][T12670] __x64_sys_sendmmsg+0x99/0x100 [ 331.729987][T12670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 331.735904][T12670] do_syscall_64+0x2d/0x70 [ 331.740341][T12670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 331.746263][T12670] RIP: 0033:0x465ef9 [ 331.750176][T12670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 331.769807][T12670] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 331.778252][T12670] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 331.786247][T12670] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 331.794241][T12670] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 331.802234][T12670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 331.810224][T12670] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:50 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x3c, 0x0, &(0x7f0000000140)) 16:34:50 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x5452, &(0x7f0000000040)=0x5aa01330) 16:34:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="c4c691019919da078a0098d1e0a593b04009f09100087f0000000022addee07beef063040002000000000000002f00602022511253507db56f598e5878d27a953ad4419cc6ead9065e291e7e4e77c45200b4b778989e18e2786dc5eb38812a62a7de3a5071accef427530023a2c05369e4cf55cbd87a4ca9d5088f0d5cccd0e27d784382cbe835708198bc15dfdf61bd7ddab475ab309ea62385f022891c7deb59b5d7c1388d5674205dcb3cd99a4a088899f68e3574069b2e434dcfb1014dd8739acf5d135bb8331db0180abbd53cd68cacae4f5e8e74c876d6dd651d3fc8bd9696e402f5a3226b51d4f70b767da6b9b47426fa517347a605473a627a025bdf052bd211f738f2dee159214a116a00557159122eeec438d2dce85a51b2c8a4c37fc153d9fba17d488d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:50 executing program 1 (fault-call:1 fault-nth:25): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:50 executing program 4: socket(0x26, 0x5, 0x101) 16:34:50 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x22, 0x0, &(0x7f0000000140)) [ 333.739257][T12693] FAULT_INJECTION: forcing a failure. [ 333.739257][T12693] name failslab, interval 1, probability 0, space 0, times 0 16:34:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:50 executing program 4: socketpair(0x48, 0x0, 0x0, &(0x7f0000005f80)) [ 333.801137][T12693] CPU: 0 PID: 12693 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 333.809974][T12693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.820057][T12693] Call Trace: [ 333.823360][T12693] dump_stack+0xfa/0x151 [ 333.827655][T12693] should_fail.cold+0x5/0xa [ 333.832200][T12693] ? sctp_add_bind_addr+0x90/0x390 [ 333.837350][T12693] should_failslab+0x5/0x10 [ 333.841901][T12693] kmem_cache_alloc_trace+0x55/0x3a0 [ 333.847226][T12693] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 333.852987][T12693] sctp_add_bind_addr+0x90/0x390 [ 333.857965][T12693] sctp_copy_local_addr_list+0x33e/0x4e0 [ 333.863640][T12693] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 333.868789][T12693] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 333.875066][T12693] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 333.881003][T12693] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 333.886940][T12693] sctp_bind_addr_copy+0xde/0x460 [ 333.892015][T12693] sctp_connect_new_asoc+0x1cd/0x770 [ 333.897339][T12693] ? sctp_bind+0x110/0x110 [ 333.901802][T12693] ? __local_bh_enable_ip+0xa0/0x120 [ 333.907124][T12693] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 333.913408][T12693] ? security_sctp_bind_connect+0x8f/0xc0 [ 333.919175][T12693] sctp_sendmsg+0x13bc/0x1d30 [ 333.923901][T12693] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 333.929046][T12693] ? lock_is_held_type+0xd5/0x130 [ 333.934129][T12693] ? aa_af_perm+0x230/0x230 [ 333.938666][T12693] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 333.944951][T12693] inet_sendmsg+0x99/0xe0 [ 333.949314][T12693] ? inet_send_prepare+0x4d0/0x4d0 [ 333.954455][T12693] sock_sendmsg+0xcf/0x120 [ 333.958911][T12693] ____sys_sendmsg+0x331/0x810 [ 333.963721][T12693] ? kernel_sendmsg+0x50/0x50 [ 333.968427][T12693] ? do_recvmmsg+0x6d0/0x6d0 [ 333.973055][T12693] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 333.979082][T12693] ___sys_sendmsg+0xf3/0x170 [ 333.983714][T12693] ? sendmsg_copy_msghdr+0x160/0x160 [ 333.989040][T12693] ? __fget_files+0x266/0x3d0 [ 333.993749][T12693] ? lock_downgrade+0x6d0/0x6d0 [ 333.998652][T12693] ? __fget_files+0x288/0x3d0 [ 334.003365][T12693] ? __fget_light+0xea/0x280 [ 334.007990][T12693] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 334.014288][T12693] __sys_sendmmsg+0x195/0x470 [ 334.019006][T12693] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 334.024063][T12693] ? lock_downgrade+0x6d0/0x6d0 [ 334.028956][T12693] ? __mutex_unlock_slowpath+0xe2/0x610 [ 334.034535][T12693] ? lock_is_held_type+0xd5/0x130 [ 334.039590][T12693] ? wait_for_completion_io+0x270/0x270 [ 334.045172][T12693] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 334.051446][T12693] ? vfs_write+0x18e/0xa30 [ 334.055911][T12693] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 334.062185][T12693] ? fput+0x2a/0x50 [ 334.066037][T12693] __x64_sys_sendmmsg+0x99/0x100 [ 334.071005][T12693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 334.076938][T12693] do_syscall_64+0x2d/0x70 [ 334.081386][T12693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 334.087316][T12693] RIP: 0033:0x465ef9 [ 334.091229][T12693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 334.110860][T12693] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 334.119307][T12693] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 334.127322][T12693] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 334.135321][T12693] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 334.143319][T12693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:51 executing program 5: socketpair(0x11, 0xa, 0x6, &(0x7f0000000040)) [ 334.151320][T12693] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:51 executing program 1 (fault-call:1 fault-nth:26): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:51 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x5d) 16:34:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:51 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {0x0}, {&(0x7f0000000180)="a3", 0x1}], 0x3}, 0x0) [ 334.384534][T12717] FAULT_INJECTION: forcing a failure. [ 334.384534][T12717] name failslab, interval 1, probability 0, space 0, times 0 [ 334.421393][T12717] CPU: 1 PID: 12717 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 334.430228][T12717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.440309][T12717] Call Trace: [ 334.443614][T12717] dump_stack+0xfa/0x151 [ 334.447895][T12717] should_fail.cold+0x5/0xa [ 334.452432][T12717] ? sctp_add_bind_addr+0x90/0x390 [ 334.457577][T12717] should_failslab+0x5/0x10 [ 334.462112][T12717] kmem_cache_alloc_trace+0x55/0x3a0 [ 334.467426][T12717] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 334.473466][T12717] sctp_add_bind_addr+0x90/0x390 [ 334.478442][T12717] sctp_copy_local_addr_list+0x33e/0x4e0 [ 334.484125][T12717] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 334.489282][T12717] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 334.495564][T12717] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 334.501502][T12717] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 334.507434][T12717] sctp_bind_addr_copy+0xde/0x460 [ 334.512505][T12717] sctp_connect_new_asoc+0x1cd/0x770 [ 334.517825][T12717] ? sctp_bind+0x110/0x110 [ 334.522277][T12717] ? __local_bh_enable_ip+0xa0/0x120 [ 334.527593][T12717] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 334.533872][T12717] ? security_sctp_bind_connect+0x8f/0xc0 [ 334.539629][T12717] sctp_sendmsg+0x13bc/0x1d30 [ 334.544350][T12717] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 334.549493][T12717] ? lock_is_held_type+0xd5/0x130 [ 334.554571][T12717] ? aa_af_perm+0x230/0x230 [ 334.559113][T12717] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 334.565607][T12717] inet_sendmsg+0x99/0xe0 [ 334.570062][T12717] ? inet_send_prepare+0x4d0/0x4d0 [ 334.575211][T12717] sock_sendmsg+0xcf/0x120 [ 334.579665][T12717] ____sys_sendmsg+0x331/0x810 [ 334.584470][T12717] ? kernel_sendmsg+0x50/0x50 [ 334.589198][T12717] ? do_recvmmsg+0x6d0/0x6d0 [ 334.593830][T12717] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 334.599857][T12717] ___sys_sendmsg+0xf3/0x170 [ 334.604485][T12717] ? sendmsg_copy_msghdr+0x160/0x160 [ 334.609813][T12717] ? __fget_files+0x266/0x3d0 [ 334.614521][T12717] ? lock_downgrade+0x6d0/0x6d0 [ 334.619419][T12717] ? __fget_files+0x288/0x3d0 [ 334.624136][T12717] ? __fget_light+0xea/0x280 [ 334.628764][T12717] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 334.635045][T12717] __sys_sendmmsg+0x195/0x470 [ 334.639793][T12717] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 334.644852][T12717] ? lock_downgrade+0x6d0/0x6d0 [ 334.649751][T12717] ? __mutex_unlock_slowpath+0xe2/0x610 [ 334.655330][T12717] ? lock_is_held_type+0xd5/0x130 [ 334.660387][T12717] ? wait_for_completion_io+0x270/0x270 [ 334.665965][T12717] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 334.672246][T12717] ? vfs_write+0x18e/0xa30 [ 334.676701][T12717] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 334.682976][T12717] ? fput+0x2a/0x50 [ 334.686835][T12717] __x64_sys_sendmmsg+0x99/0x100 [ 334.691810][T12717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 334.697770][T12717] do_syscall_64+0x2d/0x70 [ 334.702222][T12717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 334.708155][T12717] RIP: 0033:0x465ef9 [ 334.712079][T12717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 334.731726][T12717] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 334.740181][T12717] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 334.748184][T12717] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 334.756186][T12717] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 334.764192][T12717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 334.772191][T12717] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:53 executing program 5: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x12f0, 0x1148, 0x1d0, 0x0, 0x1148, 0x1d0, 0x1220, 0x2a0, 0x2a0, 0x1220, 0x2a0, 0x3, 0x0, {[{{@ipv6={@remote, @remote, [], [], 'batadv_slave_0\x00', 'lo\x00'}, 0x0, 0x1120, 0x1148, 0x0, {}, [@common=@unspec=@helper={{0x48, 'helper\x00'}, {0x0, 'Q.931\x00'}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1350) ftruncate(0xffffffffffffffff, 0x0) 16:34:53 executing program 4: socketpair(0x10, 0x0, 0x0, &(0x7f0000005f80)) 16:34:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f0000000400)={'gre0\x00', 0x0}) 16:34:53 executing program 1 (fault-call:1 fault-nth:27): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 336.780330][T12743] FAULT_INJECTION: forcing a failure. [ 336.780330][T12743] name failslab, interval 1, probability 0, space 0, times 0 [ 336.825900][T12743] CPU: 1 PID: 12743 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 336.834720][T12743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.844804][T12743] Call Trace: [ 336.848107][T12743] dump_stack+0xfa/0x151 [ 336.852391][T12743] should_fail.cold+0x5/0xa [ 336.856927][T12743] ? sctp_add_bind_addr+0x90/0x390 [ 336.862058][T12743] should_failslab+0x5/0x10 [ 336.866582][T12743] kmem_cache_alloc_trace+0x55/0x3a0 [ 336.871884][T12743] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 336.877632][T12743] sctp_add_bind_addr+0x90/0x390 [ 336.882601][T12743] sctp_copy_local_addr_list+0x33e/0x4e0 [ 336.888270][T12743] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 336.893408][T12743] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 336.899671][T12743] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 336.905596][T12743] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 336.911515][T12743] sctp_bind_addr_copy+0xde/0x460 [ 336.916574][T12743] sctp_connect_new_asoc+0x1cd/0x770 [ 336.921882][T12743] ? sctp_bind+0x110/0x110 [ 336.926320][T12743] ? __local_bh_enable_ip+0xa0/0x120 [ 336.931628][T12743] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 336.937896][T12743] ? security_sctp_bind_connect+0x8f/0xc0 [ 336.943651][T12743] sctp_sendmsg+0x13bc/0x1d30 [ 336.948366][T12743] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 336.953503][T12743] ? lock_is_held_type+0xd5/0x130 [ 336.958569][T12743] ? aa_af_perm+0x230/0x230 [ 336.963099][T12743] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 336.969370][T12743] inet_sendmsg+0x99/0xe0 [ 336.973725][T12743] ? inet_send_prepare+0x4d0/0x4d0 [ 336.978858][T12743] sock_sendmsg+0xcf/0x120 [ 336.983296][T12743] ____sys_sendmsg+0x331/0x810 [ 336.988079][T12743] ? kernel_sendmsg+0x50/0x50 [ 336.992767][T12743] ? do_recvmmsg+0x6d0/0x6d0 [ 336.997384][T12743] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 337.003392][T12743] ___sys_sendmsg+0xf3/0x170 [ 337.008006][T12743] ? sendmsg_copy_msghdr+0x160/0x160 [ 337.013320][T12743] ? __fget_files+0x266/0x3d0 [ 337.018014][T12743] ? lock_downgrade+0x6d0/0x6d0 [ 337.022900][T12743] ? __fget_files+0x288/0x3d0 [ 337.027602][T12743] ? __fget_light+0xea/0x280 [ 337.032215][T12743] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 337.038493][T12743] __sys_sendmmsg+0x195/0x470 [ 337.043199][T12743] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 337.048277][T12743] ? lock_downgrade+0x6d0/0x6d0 [ 337.053172][T12743] ? __mutex_unlock_slowpath+0xe2/0x610 [ 337.058750][T12743] ? lock_is_held_type+0xd5/0x130 [ 337.063802][T12743] ? wait_for_completion_io+0x270/0x270 [ 337.069375][T12743] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 337.076429][T12743] ? vfs_write+0x18e/0xa30 [ 337.080881][T12743] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 337.087146][T12743] ? fput+0x2a/0x50 [ 337.090996][T12743] __x64_sys_sendmmsg+0x99/0x100 [ 337.095961][T12743] ? syscall_enter_from_user_mode+0x1d/0x50 [ 337.101882][T12743] do_syscall_64+0x2d/0x70 [ 337.106323][T12743] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 337.112255][T12743] RIP: 0033:0x465ef9 [ 337.116167][T12743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 337.135803][T12743] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 337.144249][T12743] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 337.152251][T12743] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 337.160252][T12743] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 337.168252][T12743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:54 executing program 4: r0 = socket(0x2, 0x3, 0xb8) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000240)=""/72, 0x48}, {&(0x7f0000000340)=""/225, 0xe1}, {&(0x7f0000000440)=""/104, 0x68}], 0x3, &(0x7f0000000680)=[@cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}, @fadd={0x58, 0x114, 0x6, {{}, 0x0, 0x0}}], 0xb0}, 0x8002) 16:34:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x25, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, 0x9c) [ 337.176251][T12743] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:54 executing program 1 (fault-call:1 fault-nth:28): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 337.239047][T12745] xt_cgroup: xt_cgroup: no path or classid specified 16:34:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000003e00)=[{&(0x7f00000003c0)=@in={0x2, 0x0, @rand_addr=0x64010101}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000400)="ff", 0x1}], 0x1, &(0x7f0000000840)=[@dstaddrv6={0x20, 0x84, 0x8, @local}, @init={0x18, 0x84, 0x0, {0xe7, 0x81, 0x7, 0xbc}}], 0x38}], 0x1, 0x0) 16:34:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) [ 337.390445][T12763] FAULT_INJECTION: forcing a failure. [ 337.390445][T12763] name failslab, interval 1, probability 0, space 0, times 0 [ 337.426970][T12763] CPU: 1 PID: 12763 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 337.435798][T12763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.445879][T12763] Call Trace: [ 337.449179][T12763] dump_stack+0xfa/0x151 [ 337.453457][T12763] should_fail.cold+0x5/0xa [ 337.457995][T12763] ? sctp_add_bind_addr+0x90/0x390 [ 337.463144][T12763] should_failslab+0x5/0x10 [ 337.467705][T12763] kmem_cache_alloc_trace+0x55/0x3a0 [ 337.473021][T12763] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 337.478785][T12763] sctp_add_bind_addr+0x90/0x390 [ 337.483768][T12763] sctp_copy_local_addr_list+0x33e/0x4e0 [ 337.489449][T12763] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 337.494595][T12763] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 337.500919][T12763] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 337.506847][T12763] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 337.512776][T12763] sctp_bind_addr_copy+0xde/0x460 [ 337.517844][T12763] sctp_connect_new_asoc+0x1cd/0x770 [ 337.523160][T12763] ? sctp_bind+0x110/0x110 [ 337.527626][T12763] ? __local_bh_enable_ip+0xa0/0x120 [ 337.532945][T12763] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 337.539216][T12763] ? security_sctp_bind_connect+0x8f/0xc0 [ 337.544970][T12763] sctp_sendmsg+0x13bc/0x1d30 [ 337.549680][T12763] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 337.554821][T12763] ? lock_is_held_type+0xd5/0x130 [ 337.559894][T12763] ? aa_af_perm+0x230/0x230 [ 337.564428][T12763] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 337.570708][T12763] inet_sendmsg+0x99/0xe0 [ 337.575063][T12763] ? inet_send_prepare+0x4d0/0x4d0 [ 337.580194][T12763] sock_sendmsg+0xcf/0x120 [ 337.584668][T12763] ____sys_sendmsg+0x331/0x810 [ 337.589469][T12763] ? kernel_sendmsg+0x50/0x50 [ 337.594169][T12763] ? do_recvmmsg+0x6d0/0x6d0 [ 337.598793][T12763] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 337.604814][T12763] ___sys_sendmsg+0xf3/0x170 [ 337.609438][T12763] ? sendmsg_copy_msghdr+0x160/0x160 [ 337.614760][T12763] ? __fget_files+0x266/0x3d0 [ 337.619468][T12763] ? lock_downgrade+0x6d0/0x6d0 [ 337.624366][T12763] ? __fget_files+0x288/0x3d0 [ 337.629077][T12763] ? __fget_light+0xea/0x280 [ 337.633697][T12763] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 337.639973][T12763] __sys_sendmmsg+0x195/0x470 [ 337.644690][T12763] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 337.649747][T12763] ? lock_downgrade+0x6d0/0x6d0 [ 337.654697][T12763] ? __mutex_unlock_slowpath+0xe2/0x610 [ 337.660280][T12763] ? lock_is_held_type+0xd5/0x130 [ 337.665333][T12763] ? wait_for_completion_io+0x270/0x270 [ 337.670913][T12763] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 337.677189][T12763] ? vfs_write+0x18e/0xa30 [ 337.681636][T12763] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 337.687915][T12763] ? fput+0x2a/0x50 [ 337.691769][T12763] __x64_sys_sendmmsg+0x99/0x100 [ 337.696742][T12763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 337.702687][T12763] do_syscall_64+0x2d/0x70 [ 337.707137][T12763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 337.713067][T12763] RIP: 0033:0x465ef9 [ 337.716983][T12763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 337.736622][T12763] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 337.745072][T12763] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 337.753076][T12763] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 337.761071][T12763] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 337.769064][T12763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 337.777061][T12763] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:34:57 executing program 4: r0 = socket(0x2, 0x3, 0xb8) setsockopt$inet_opts(r0, 0x0, 0x10, &(0x7f0000000000)='5', 0x1) 16:34:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:57 executing program 5: socket(0x11, 0x2, 0x2) 16:34:57 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000029c0)={0xa, 0x0, 0x0, @remote}, 0x1c) 16:34:57 executing program 1 (fault-call:1 fault-nth:29): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:57 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, 0x0, &(0x7f0000000100)) [ 340.353670][T12788] FAULT_INJECTION: forcing a failure. [ 340.353670][T12788] name failslab, interval 1, probability 0, space 0, times 0 [ 340.399578][T12788] CPU: 0 PID: 12788 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 340.408404][T12788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.418483][T12788] Call Trace: [ 340.421780][T12788] dump_stack+0xfa/0x151 [ 340.426051][T12788] should_fail.cold+0x5/0xa [ 340.430590][T12788] ? sctp_add_bind_addr+0x90/0x390 [ 340.435734][T12788] should_failslab+0x5/0x10 [ 340.440267][T12788] kmem_cache_alloc_trace+0x55/0x3a0 [ 340.445577][T12788] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 340.451326][T12788] sctp_add_bind_addr+0x90/0x390 [ 340.456399][T12788] sctp_copy_local_addr_list+0x33e/0x4e0 [ 340.462079][T12788] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 340.467229][T12788] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 340.473499][T12788] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 340.479422][T12788] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 340.485347][T12788] sctp_bind_addr_copy+0xde/0x460 [ 340.490410][T12788] sctp_connect_new_asoc+0x1cd/0x770 [ 340.495722][T12788] ? sctp_bind+0x110/0x110 [ 340.500173][T12788] ? __local_bh_enable_ip+0xa0/0x120 [ 340.505486][T12788] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 340.511753][T12788] ? security_sctp_bind_connect+0x8f/0xc0 [ 340.517500][T12788] sctp_sendmsg+0x13bc/0x1d30 [ 340.522216][T12788] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 340.527352][T12788] ? lock_is_held_type+0xd5/0x130 [ 340.532423][T12788] ? aa_af_perm+0x230/0x230 [ 340.536960][T12788] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 340.543229][T12788] inet_sendmsg+0x99/0xe0 [ 340.547587][T12788] ? inet_send_prepare+0x4d0/0x4d0 [ 340.552758][T12788] sock_sendmsg+0xcf/0x120 [ 340.557203][T12788] ____sys_sendmsg+0x331/0x810 [ 340.561995][T12788] ? kernel_sendmsg+0x50/0x50 [ 340.566701][T12788] ? do_recvmmsg+0x6d0/0x6d0 [ 340.571324][T12788] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 340.577350][T12788] ___sys_sendmsg+0xf3/0x170 [ 340.581969][T12788] ? sendmsg_copy_msghdr+0x160/0x160 [ 340.587279][T12788] ? __fget_files+0x266/0x3d0 [ 340.591969][T12788] ? lock_downgrade+0x6d0/0x6d0 [ 340.596849][T12788] ? __fget_files+0x288/0x3d0 [ 340.601551][T12788] ? __fget_light+0xea/0x280 [ 340.606162][T12788] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 340.612434][T12788] __sys_sendmmsg+0x195/0x470 [ 340.617163][T12788] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 340.622215][T12788] ? lock_downgrade+0x6d0/0x6d0 [ 340.627200][T12788] ? __mutex_unlock_slowpath+0xe2/0x610 [ 340.632767][T12788] ? lock_is_held_type+0xd5/0x130 [ 340.637822][T12788] ? wait_for_completion_io+0x270/0x270 [ 340.643394][T12788] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 340.649748][T12788] ? vfs_write+0x18e/0xa30 [ 340.654190][T12788] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 340.660461][T12788] ? fput+0x2a/0x50 [ 340.664320][T12788] __x64_sys_sendmmsg+0x99/0x100 [ 340.669278][T12788] ? syscall_enter_from_user_mode+0x1d/0x50 [ 340.675199][T12788] do_syscall_64+0x2d/0x70 [ 340.679635][T12788] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 340.685562][T12788] RIP: 0033:0x465ef9 [ 340.689486][T12788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 340.709131][T12788] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 340.717576][T12788] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 340.725567][T12788] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 340.733555][T12788] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 340.741547][T12788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:34:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:34:57 executing program 2: memfd_create(&(0x7f00000002c0)='\x00\x00\x00\x00\x93\x950\xb4\xee\x14\x9dM\x95\x16\x8eIaDi\xce@\xc2>\x0f\x00\xaf\xcc\xf8i\x12g\x10\xce\ng\x0eQ\xe2\xd5U~\x02N\x01W\v\xcf\xd2\x04\"&\xb1\x88\x83\x9b\x83e\\\xa4\x95&\x16\xb8\xe4\x94\xd6\x12\x84\xaf\xcc\xfbY\x8c\x86\x80u\xb6\a4?\xbb)Cy\'v&O\xabP\x92\f', 0x2) 16:34:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) [ 340.749530][T12788] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:34:57 executing program 1 (fault-call:1 fault-nth:30): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:34:57 executing program 2: mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) [ 340.963647][T12806] FAULT_INJECTION: forcing a failure. [ 340.963647][T12806] name failslab, interval 1, probability 0, space 0, times 0 [ 341.002747][T12806] CPU: 0 PID: 12806 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 341.011572][T12806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.021652][T12806] Call Trace: [ 341.024952][T12806] dump_stack+0xfa/0x151 [ 341.029239][T12806] should_fail.cold+0x5/0xa [ 341.033777][T12806] ? sctp_add_bind_addr+0x90/0x390 [ 341.038923][T12806] should_failslab+0x5/0x10 [ 341.043453][T12806] kmem_cache_alloc_trace+0x55/0x3a0 [ 341.048770][T12806] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 341.054531][T12806] sctp_add_bind_addr+0x90/0x390 [ 341.059510][T12806] sctp_copy_local_addr_list+0x33e/0x4e0 [ 341.065180][T12806] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 341.070328][T12806] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 341.076601][T12806] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 341.082527][T12806] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 341.088456][T12806] sctp_bind_addr_copy+0xde/0x460 [ 341.093520][T12806] sctp_connect_new_asoc+0x1cd/0x770 [ 341.098836][T12806] ? sctp_bind+0x110/0x110 [ 341.103284][T12806] ? __local_bh_enable_ip+0xa0/0x120 [ 341.108592][T12806] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 341.114862][T12806] ? security_sctp_bind_connect+0x8f/0xc0 [ 341.120620][T12806] sctp_sendmsg+0x13bc/0x1d30 [ 341.125327][T12806] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 341.130456][T12806] ? lock_is_held_type+0xd5/0x130 [ 341.135526][T12806] ? aa_af_perm+0x230/0x230 [ 341.140058][T12806] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 341.146332][T12806] inet_sendmsg+0x99/0xe0 [ 341.150692][T12806] ? inet_send_prepare+0x4d0/0x4d0 [ 341.155826][T12806] sock_sendmsg+0xcf/0x120 [ 341.160272][T12806] ____sys_sendmsg+0x331/0x810 [ 341.165068][T12806] ? kernel_sendmsg+0x50/0x50 [ 341.169767][T12806] ? do_recvmmsg+0x6d0/0x6d0 [ 341.174389][T12806] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 341.180407][T12806] ___sys_sendmsg+0xf3/0x170 [ 341.185029][T12806] ? sendmsg_copy_msghdr+0x160/0x160 [ 341.190348][T12806] ? __fget_files+0x266/0x3d0 [ 341.195050][T12806] ? lock_downgrade+0x6d0/0x6d0 [ 341.199946][T12806] ? __fget_files+0x288/0x3d0 [ 341.204660][T12806] ? __fget_light+0xea/0x280 [ 341.209280][T12806] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 341.215554][T12806] __sys_sendmmsg+0x195/0x470 [ 341.220272][T12806] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 341.225327][T12806] ? lock_downgrade+0x6d0/0x6d0 [ 341.230226][T12806] ? __mutex_unlock_slowpath+0xe2/0x610 [ 341.235804][T12806] ? lock_is_held_type+0xd5/0x130 [ 341.240863][T12806] ? wait_for_completion_io+0x270/0x270 [ 341.246447][T12806] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 341.252722][T12806] ? vfs_write+0x18e/0xa30 [ 341.257170][T12806] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 341.263446][T12806] ? fput+0x2a/0x50 [ 341.267300][T12806] __x64_sys_sendmmsg+0x99/0x100 [ 341.272272][T12806] ? syscall_enter_from_user_mode+0x1d/0x50 [ 341.278200][T12806] do_syscall_64+0x2d/0x70 [ 341.282646][T12806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 341.288578][T12806] RIP: 0033:0x465ef9 [ 341.292497][T12806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 341.312130][T12806] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 341.320587][T12806] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 341.328584][T12806] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 341.336580][T12806] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 341.344600][T12806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 341.352593][T12806] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:00 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:35:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe1, 0xe1, 0x3, [@datasec={0x0, 0x5, 0x0, 0xf, 0x3, [{}, {}, {}, {}, {}], "e1a17f"}, @datasec={0x0, 0x7, 0x0, 0xf, 0x2, [{}, {}, {}, {}, {}, {}, {}], "d3f5"}, @fwd, @var, @typedef, @fwd]}, {0x0, [0x0]}}, 0x0, 0xff}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 16:35:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:00 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x7040, 0x0) 16:35:00 executing program 1 (fault-call:1 fault-nth:31): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 343.450496][T12826] FAULT_INJECTION: forcing a failure. [ 343.450496][T12826] name failslab, interval 1, probability 0, space 0, times 0 [ 343.501387][T12826] CPU: 0 PID: 12826 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 343.510200][T12826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.520281][T12826] Call Trace: [ 343.523585][T12826] dump_stack+0xfa/0x151 [ 343.527865][T12826] should_fail.cold+0x5/0xa [ 343.532397][T12826] ? sctp_add_bind_addr+0x90/0x390 [ 343.537535][T12826] should_failslab+0x5/0x10 [ 343.542065][T12826] kmem_cache_alloc_trace+0x55/0x3a0 [ 343.547373][T12826] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 343.553125][T12826] sctp_add_bind_addr+0x90/0x390 [ 343.558098][T12826] sctp_copy_local_addr_list+0x33e/0x4e0 [ 343.563765][T12826] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 343.568911][T12826] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 343.575183][T12826] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 343.581110][T12826] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 343.587037][T12826] sctp_bind_addr_copy+0xde/0x460 [ 343.592103][T12826] sctp_connect_new_asoc+0x1cd/0x770 [ 343.597418][T12826] ? sctp_bind+0x110/0x110 [ 343.601867][T12826] ? __local_bh_enable_ip+0xa0/0x120 [ 343.607175][T12826] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 343.613450][T12826] ? security_sctp_bind_connect+0x8f/0xc0 [ 343.619202][T12826] sctp_sendmsg+0x13bc/0x1d30 [ 343.623917][T12826] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 343.629059][T12826] ? lock_is_held_type+0xd5/0x130 [ 343.634133][T12826] ? aa_af_perm+0x230/0x230 [ 343.638669][T12826] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 343.644955][T12826] inet_sendmsg+0x99/0xe0 [ 343.649315][T12826] ? inet_send_prepare+0x4d0/0x4d0 [ 343.654447][T12826] sock_sendmsg+0xcf/0x120 [ 343.658894][T12826] ____sys_sendmsg+0x331/0x810 [ 343.663691][T12826] ? kernel_sendmsg+0x50/0x50 [ 343.668394][T12826] ? do_recvmmsg+0x6d0/0x6d0 [ 343.673016][T12826] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 343.679036][T12826] ___sys_sendmsg+0xf3/0x170 [ 343.683663][T12826] ? sendmsg_copy_msghdr+0x160/0x160 [ 343.688984][T12826] ? __fget_files+0x266/0x3d0 [ 343.693689][T12826] ? lock_downgrade+0x6d0/0x6d0 [ 343.698585][T12826] ? __fget_files+0x288/0x3d0 [ 343.703300][T12826] ? __fget_light+0xea/0x280 [ 343.707919][T12826] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 343.714196][T12826] __sys_sendmmsg+0x195/0x470 [ 343.718913][T12826] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 343.723967][T12826] ? lock_downgrade+0x6d0/0x6d0 [ 343.728874][T12826] ? __mutex_unlock_slowpath+0xe2/0x610 [ 343.734454][T12826] ? lock_is_held_type+0xd5/0x130 [ 343.739511][T12826] ? wait_for_completion_io+0x270/0x270 [ 343.745092][T12826] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 343.751362][T12826] ? vfs_write+0x18e/0xa30 [ 343.755816][T12826] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 343.762099][T12826] ? fput+0x2a/0x50 [ 343.765955][T12826] __x64_sys_sendmmsg+0x99/0x100 [ 343.770926][T12826] ? syscall_enter_from_user_mode+0x1d/0x50 [ 343.776881][T12826] do_syscall_64+0x2d/0x70 [ 343.781327][T12826] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 343.787257][T12826] RIP: 0033:0x465ef9 [ 343.791180][T12826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 343.810814][T12826] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 343.819267][T12826] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 343.827257][T12826] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 343.835253][T12826] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 343.843250][T12826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:00 executing program 4: r0 = socket(0x2, 0x3, 0x4) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0xd, 0x0, 0x0) 16:35:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:00 executing program 5: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000700)=ANY=[@ANYBLOB="140000001600010000000000000000000400008086fd25044baa5b8038a1aa7805a1eb1280b6e1c05173b4a94c19e0c35c1154f4627fb691eb9d0e4d02548515607fa6dc8bca85ad21d6b59e678176c679cd53de15dda8e085f460232d5f8b5920d46567958d38ee7f49db7c19d6131d5605917639c50a1182d6978699a5677abdfd7dfa4f8a6629bd"], 0x14}], 0x1, 0x0, 0x0, 0x24044004}, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00', r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00', 0xffffffffffffffff) [ 343.851245][T12826] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:00 executing program 2: r0 = socket(0x2, 0x3, 0x4) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x22, 0x0, 0x0) 16:35:01 executing program 1 (fault-call:1 fault-nth:32): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:01 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5437, 0x0) [ 344.105730][T12855] FAULT_INJECTION: forcing a failure. [ 344.105730][T12855] name failslab, interval 1, probability 0, space 0, times 0 [ 344.131657][T12855] CPU: 0 PID: 12855 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 344.140486][T12855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.150693][T12855] Call Trace: [ 344.153995][T12855] dump_stack+0xfa/0x151 [ 344.158283][T12855] should_fail.cold+0x5/0xa [ 344.162830][T12855] ? sctp_add_bind_addr+0x90/0x390 [ 344.167977][T12855] should_failslab+0x5/0x10 [ 344.172517][T12855] kmem_cache_alloc_trace+0x55/0x3a0 [ 344.177833][T12855] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 344.183602][T12855] sctp_add_bind_addr+0x90/0x390 [ 344.188586][T12855] sctp_copy_local_addr_list+0x33e/0x4e0 [ 344.194265][T12855] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 344.199419][T12855] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 344.205699][T12855] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 344.211637][T12855] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 344.217581][T12855] sctp_bind_addr_copy+0xde/0x460 [ 344.222657][T12855] sctp_connect_new_asoc+0x1cd/0x770 [ 344.227994][T12855] ? sctp_bind+0x110/0x110 [ 344.232450][T12855] ? __local_bh_enable_ip+0xa0/0x120 [ 344.237764][T12855] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 344.244039][T12855] ? security_sctp_bind_connect+0x8f/0xc0 [ 344.249803][T12855] sctp_sendmsg+0x13bc/0x1d30 [ 344.254522][T12855] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 344.259666][T12855] ? lock_is_held_type+0xd5/0x130 [ 344.264755][T12855] ? aa_af_perm+0x230/0x230 [ 344.269296][T12855] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 344.275576][T12855] inet_sendmsg+0x99/0xe0 [ 344.279936][T12855] ? inet_send_prepare+0x4d0/0x4d0 [ 344.285074][T12855] sock_sendmsg+0xcf/0x120 [ 344.289519][T12855] ____sys_sendmsg+0x331/0x810 [ 344.294314][T12855] ? kernel_sendmsg+0x50/0x50 [ 344.299012][T12855] ? do_recvmmsg+0x6d0/0x6d0 [ 344.303635][T12855] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 344.309659][T12855] ___sys_sendmsg+0xf3/0x170 [ 344.314285][T12855] ? sendmsg_copy_msghdr+0x160/0x160 [ 344.319601][T12855] ? __fget_files+0x266/0x3d0 [ 344.324310][T12855] ? lock_downgrade+0x6d0/0x6d0 [ 344.329203][T12855] ? __fget_files+0x288/0x3d0 [ 344.333913][T12855] ? __fget_light+0xea/0x280 [ 344.338533][T12855] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 344.344812][T12855] __sys_sendmmsg+0x195/0x470 [ 344.349527][T12855] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 344.354603][T12855] ? lock_downgrade+0x6d0/0x6d0 [ 344.359505][T12855] ? __mutex_unlock_slowpath+0xe2/0x610 [ 344.365079][T12855] ? lock_is_held_type+0xd5/0x130 [ 344.370248][T12855] ? wait_for_completion_io+0x270/0x270 [ 344.375832][T12855] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 344.382105][T12855] ? vfs_write+0x18e/0xa30 [ 344.386563][T12855] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 344.392844][T12855] ? fput+0x2a/0x50 [ 344.396701][T12855] __x64_sys_sendmmsg+0x99/0x100 [ 344.401668][T12855] ? syscall_enter_from_user_mode+0x1d/0x50 [ 344.407591][T12855] do_syscall_64+0x2d/0x70 [ 344.412038][T12855] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 344.417963][T12855] RIP: 0033:0x465ef9 [ 344.421880][T12855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 344.441515][T12855] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 344.449963][T12855] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 344.457960][T12855] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 344.465954][T12855] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 344.473946][T12855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 344.481942][T12855] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 16:35:04 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue0\x00'}) 16:35:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:04 executing program 5: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)) r0 = gettid() capset(&(0x7f0000000300)={0x20080522, r0}, &(0x7f0000000340)) 16:35:04 executing program 1 (fault-call:1 fault-nth:33): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 347.037689][T12875] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) [ 347.053649][T12876] FAULT_INJECTION: forcing a failure. [ 347.053649][T12876] name failslab, interval 1, probability 0, space 0, times 0 [ 347.106574][T12876] CPU: 0 PID: 12876 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 347.115397][T12876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.125478][T12876] Call Trace: [ 347.128778][T12876] dump_stack+0xfa/0x151 [ 347.133053][T12876] should_fail.cold+0x5/0xa [ 347.137590][T12876] ? sctp_add_bind_addr+0x90/0x390 [ 347.142752][T12876] should_failslab+0x5/0x10 [ 347.147287][T12876] kmem_cache_alloc_trace+0x55/0x3a0 [ 347.152608][T12876] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 347.158372][T12876] sctp_add_bind_addr+0x90/0x390 [ 347.163347][T12876] sctp_copy_local_addr_list+0x33e/0x4e0 [ 347.169014][T12876] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 347.174159][T12876] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 347.180433][T12876] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 347.186359][T12876] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 347.192290][T12876] sctp_bind_addr_copy+0xde/0x460 [ 347.197435][T12876] sctp_connect_new_asoc+0x1cd/0x770 [ 347.202764][T12876] ? sctp_bind+0x110/0x110 [ 347.207217][T12876] ? __local_bh_enable_ip+0xa0/0x120 [ 347.212526][T12876] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 347.218796][T12876] ? security_sctp_bind_connect+0x8f/0xc0 [ 347.224554][T12876] sctp_sendmsg+0x13bc/0x1d30 [ 347.229269][T12876] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 347.234408][T12876] ? lock_is_held_type+0xd5/0x130 [ 347.239484][T12876] ? aa_af_perm+0x230/0x230 [ 347.244015][T12876] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 347.250291][T12876] inet_sendmsg+0x99/0xe0 [ 347.254737][T12876] ? inet_send_prepare+0x4d0/0x4d0 [ 347.259875][T12876] sock_sendmsg+0xcf/0x120 [ 347.264345][T12876] ____sys_sendmsg+0x331/0x810 [ 347.269131][T12876] ? kernel_sendmsg+0x50/0x50 [ 347.273820][T12876] ? do_recvmmsg+0x6d0/0x6d0 [ 347.278434][T12876] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 347.284482][T12876] ___sys_sendmsg+0xf3/0x170 [ 347.289104][T12876] ? sendmsg_copy_msghdr+0x160/0x160 [ 347.294420][T12876] ? __fget_files+0x266/0x3d0 [ 347.299121][T12876] ? lock_downgrade+0x6d0/0x6d0 [ 347.304012][T12876] ? __fget_files+0x288/0x3d0 [ 347.308721][T12876] ? __fget_light+0xea/0x280 [ 347.313341][T12876] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 347.319615][T12876] __sys_sendmmsg+0x195/0x470 [ 347.324326][T12876] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 347.329382][T12876] ? lock_downgrade+0x6d0/0x6d0 [ 347.334280][T12876] ? __mutex_unlock_slowpath+0xe2/0x610 [ 347.339875][T12876] ? lock_is_held_type+0xd5/0x130 [ 347.344933][T12876] ? wait_for_completion_io+0x270/0x270 [ 347.350505][T12876] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 16:35:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fchdir(r0) exit(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 16:35:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 347.356905][T12876] ? vfs_write+0x18e/0xa30 [ 347.361354][T12876] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 347.367627][T12876] ? fput+0x2a/0x50 [ 347.371577][T12876] __x64_sys_sendmmsg+0x99/0x100 [ 347.376551][T12876] ? syscall_enter_from_user_mode+0x1d/0x50 [ 347.382485][T12876] do_syscall_64+0x2d/0x70 [ 347.386926][T12876] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 347.392852][T12876] RIP: 0033:0x465ef9 [ 347.396772][T12876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 347.416409][T12876] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 347.424854][T12876] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 347.432847][T12876] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 347.440848][T12876] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 347.448843][T12876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 16:35:04 executing program 2: r0 = openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x400) [ 347.456842][T12876] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:04 executing program 1 (fault-call:1 fault-nth:34): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x2040, 0x0) 16:35:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 16:35:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000f00)) [ 347.824462][T12908] FAULT_INJECTION: forcing a failure. [ 347.824462][T12908] name failslab, interval 1, probability 0, space 0, times 0 [ 347.895689][T12908] CPU: 0 PID: 12908 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 347.904512][T12908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.914595][T12908] Call Trace: [ 347.917899][T12908] dump_stack+0xfa/0x151 [ 347.922178][T12908] should_fail.cold+0x5/0xa [ 347.926729][T12908] ? sctp_add_bind_addr+0x90/0x390 [ 347.931865][T12908] should_failslab+0x5/0x10 [ 347.936402][T12908] kmem_cache_alloc_trace+0x55/0x3a0 [ 347.941815][T12908] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 347.947578][T12908] sctp_add_bind_addr+0x90/0x390 [ 347.952576][T12908] sctp_copy_local_addr_list+0x33e/0x4e0 [ 347.958281][T12908] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 347.963429][T12908] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 347.966081][T12920] ptrace attach of "/root/syz-executor.0"[12919] was attempted by "/root/syz-executor.0"[12920] [ 347.969702][T12908] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 347.969779][T12908] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 347.991961][T12908] sctp_bind_addr_copy+0xde/0x460 [ 347.997033][T12908] sctp_connect_new_asoc+0x1cd/0x770 [ 348.002355][T12908] ? sctp_bind+0x110/0x110 [ 348.006805][T12908] ? __local_bh_enable_ip+0xa0/0x120 [ 348.012121][T12908] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 348.018430][T12908] ? security_sctp_bind_connect+0x8f/0xc0 [ 348.024193][T12908] sctp_sendmsg+0x13bc/0x1d30 [ 348.028915][T12908] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 348.034072][T12908] ? lock_is_held_type+0xd5/0x130 [ 348.039145][T12908] ? aa_af_perm+0x230/0x230 [ 348.043680][T12908] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 348.049961][T12908] inet_sendmsg+0x99/0xe0 [ 348.054408][T12908] ? inet_send_prepare+0x4d0/0x4d0 [ 348.059552][T12908] sock_sendmsg+0xcf/0x120 [ 348.064005][T12908] ____sys_sendmsg+0x331/0x810 [ 348.068804][T12908] ? kernel_sendmsg+0x50/0x50 [ 348.073512][T12908] ? do_recvmmsg+0x6d0/0x6d0 [ 348.078137][T12908] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 348.084156][T12908] ___sys_sendmsg+0xf3/0x170 [ 348.088781][T12908] ? sendmsg_copy_msghdr+0x160/0x160 [ 348.094106][T12908] ? __fget_files+0x266/0x3d0 [ 348.098815][T12908] ? lock_downgrade+0x6d0/0x6d0 [ 348.103735][T12908] ? __fget_files+0x288/0x3d0 [ 348.108486][T12908] ? __fget_light+0xea/0x280 [ 348.113106][T12908] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 348.119381][T12908] __sys_sendmmsg+0x195/0x470 [ 348.124094][T12908] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 348.129202][T12908] ? lock_downgrade+0x6d0/0x6d0 [ 348.134122][T12908] ? __mutex_unlock_slowpath+0xe2/0x610 [ 348.139702][T12908] ? lock_is_held_type+0xd5/0x130 [ 348.144749][T12908] ? wait_for_completion_io+0x270/0x270 [ 348.150321][T12908] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 348.156597][T12908] ? vfs_write+0x18e/0xa30 [ 348.161047][T12908] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 348.167360][T12908] ? fput+0x2a/0x50 [ 348.171229][T12908] __x64_sys_sendmmsg+0x99/0x100 [ 348.176202][T12908] ? syscall_enter_from_user_mode+0x1d/0x50 [ 348.182135][T12908] do_syscall_64+0x2d/0x70 [ 348.186580][T12908] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 348.192517][T12908] RIP: 0033:0x465ef9 [ 348.196474][T12908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 348.216108][T12908] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 348.224562][T12908] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 348.232582][T12908] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 348.240581][T12908] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 348.248577][T12908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 348.256573][T12908] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000340)={0x14, r1, 0xd21}, 0x14}}, 0x0) 16:35:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00', 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={&(0x7f0000000140)={0x48, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x48}}, 0x0) 16:35:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0xfffffffa}, 0x40) 16:35:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="c4c691019919da078a0098d1e0a593b04009f09100087f0000000022addee07beef063040002000000000000002f00602022511253507db56f598e5878d27a953ad4419cc6ead9065e291e7e4e77c45200b4b778989e18e2786dc5eb38812a62a7de3a5071accef427530023a2c05369e4cf55cbd87a4ca9d5088f0d5cccd0e27d784382cbe835708198bc15dfdf61bd7ddab475ab309ea62385f022891c7deb59b5d7c1388d5674205dcb3cd99a4a088899f68e3574069b2e434dcfb1014dd8739acf5d135bb8331db0180abbd53cd68cacae4f5e8e74c876d6dd651d3fc8bd9696e402f5a3226b51d4f70b767da6b9b47426fa517347a605473a627a025bdf052bd211f738f2dee159214a116a00557159122eeec438d2dce85a51b2c8a4c37fc153d9fba17d488d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:05 executing program 1 (fault-call:1 fault-nth:35): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 348.639059][T12940] FAULT_INJECTION: forcing a failure. [ 348.639059][T12940] name failslab, interval 1, probability 0, space 0, times 0 [ 348.706307][T12940] CPU: 1 PID: 12940 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 348.715231][T12940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.725312][T12940] Call Trace: [ 348.728612][T12940] dump_stack+0xfa/0x151 [ 348.732889][T12940] should_fail.cold+0x5/0xa [ 348.737427][T12940] ? sctp_add_bind_addr+0x90/0x390 [ 348.742575][T12940] should_failslab+0x5/0x10 [ 348.747113][T12940] kmem_cache_alloc_trace+0x55/0x3a0 [ 348.752425][T12940] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 348.758194][T12940] sctp_add_bind_addr+0x90/0x390 [ 348.763176][T12940] sctp_copy_local_addr_list+0x33e/0x4e0 [ 348.768886][T12940] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 348.774031][T12940] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 348.780305][T12940] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 348.786250][T12940] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 348.792183][T12940] sctp_bind_addr_copy+0xde/0x460 [ 348.797265][T12940] sctp_connect_new_asoc+0x1cd/0x770 [ 348.802584][T12940] ? sctp_bind+0x110/0x110 [ 348.807039][T12940] ? __local_bh_enable_ip+0xa0/0x120 [ 348.812355][T12940] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 348.818632][T12940] ? security_sctp_bind_connect+0x8f/0xc0 [ 348.824502][T12940] sctp_sendmsg+0x13bc/0x1d30 [ 348.829231][T12940] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 348.834374][T12940] ? lock_is_held_type+0xd5/0x130 [ 348.839452][T12940] ? aa_af_perm+0x230/0x230 [ 348.843988][T12940] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 348.850267][T12940] inet_sendmsg+0x99/0xe0 16:35:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x380e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 348.854629][T12940] ? inet_send_prepare+0x4d0/0x4d0 [ 348.859769][T12940] sock_sendmsg+0xcf/0x120 [ 348.864221][T12940] ____sys_sendmsg+0x331/0x810 [ 348.869018][T12940] ? kernel_sendmsg+0x50/0x50 [ 348.873724][T12940] ? do_recvmmsg+0x6d0/0x6d0 [ 348.878362][T12940] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 348.884383][T12940] ___sys_sendmsg+0xf3/0x170 [ 348.889113][T12940] ? sendmsg_copy_msghdr+0x160/0x160 [ 348.894439][T12940] ? __fget_files+0x266/0x3d0 [ 348.899144][T12940] ? lock_downgrade+0x6d0/0x6d0 [ 348.904043][T12940] ? __fget_files+0x288/0x3d0 [ 348.908752][T12940] ? __fget_light+0xea/0x280 [ 348.913370][T12940] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 348.919648][T12940] __sys_sendmmsg+0x195/0x470 [ 348.924361][T12940] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 348.929477][T12940] ? lock_downgrade+0x6d0/0x6d0 [ 348.934333][T12940] ? __mutex_unlock_slowpath+0xe2/0x610 [ 348.939869][T12940] ? lock_is_held_type+0xd5/0x130 [ 348.944884][T12940] ? wait_for_completion_io+0x270/0x270 [ 348.950420][T12940] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 348.956776][T12940] ? vfs_write+0x18e/0xa30 [ 348.961197][T12940] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 348.967433][T12940] ? fput+0x2a/0x50 [ 348.971242][T12940] __x64_sys_sendmmsg+0x99/0x100 [ 348.976172][T12940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 348.982075][T12940] do_syscall_64+0x2d/0x70 [ 348.986497][T12940] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 348.992388][T12940] RIP: 0033:0x465ef9 [ 348.996275][T12940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 349.015872][T12940] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 349.024296][T12940] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 349.032274][T12940] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 349.040232][T12940] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 349.048187][T12940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, 0x0) 16:35:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:06 executing program 2: add_key$keyring(&(0x7f0000003640)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 349.056166][T12940] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:06 executing program 1 (fault-call:1 fault-nth:36): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:06 executing program 5: ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, @sco, @in, @phonet={0x23, 0x0, 0x3f, 0x5}}) fork() 16:35:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x0, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:06 executing program 2: memfd_create(&(0x7f0000000040)='}\x00', 0x0) 16:35:06 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00$\x00;\r\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008002b7edb126500040002"], 0x30}}, 0x0) [ 349.247525][T12957] FAULT_INJECTION: forcing a failure. [ 349.247525][T12957] name failslab, interval 1, probability 0, space 0, times 0 [ 349.322507][T12957] CPU: 0 PID: 12957 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 349.331329][T12957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.341410][T12957] Call Trace: [ 349.344710][T12957] dump_stack+0xfa/0x151 [ 349.348990][T12957] should_fail.cold+0x5/0xa [ 349.353527][T12957] ? sctp_add_bind_addr+0x90/0x390 [ 349.358666][T12957] should_failslab+0x5/0x10 [ 349.363200][T12957] kmem_cache_alloc_trace+0x55/0x3a0 [ 349.368507][T12957] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 349.374266][T12957] sctp_add_bind_addr+0x90/0x390 [ 349.379243][T12957] sctp_copy_local_addr_list+0x33e/0x4e0 [ 349.384915][T12957] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 349.390065][T12957] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 349.396350][T12957] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 349.402284][T12957] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 349.408219][T12957] sctp_bind_addr_copy+0xde/0x460 [ 349.413297][T12957] sctp_connect_new_asoc+0x1cd/0x770 [ 349.418620][T12957] ? sctp_bind+0x110/0x110 [ 349.423077][T12957] ? __local_bh_enable_ip+0xa0/0x120 [ 349.428389][T12957] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 349.434664][T12957] ? security_sctp_bind_connect+0x8f/0xc0 [ 349.440419][T12957] sctp_sendmsg+0x13bc/0x1d30 [ 349.445134][T12957] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 349.450279][T12957] ? lock_is_held_type+0xd5/0x130 [ 349.455346][T12957] ? aa_af_perm+0x230/0x230 [ 349.459872][T12957] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 349.466152][T12957] inet_sendmsg+0x99/0xe0 [ 349.470512][T12957] ? inet_send_prepare+0x4d0/0x4d0 [ 349.475655][T12957] sock_sendmsg+0xcf/0x120 [ 349.480103][T12957] ____sys_sendmsg+0x331/0x810 [ 349.484899][T12957] ? kernel_sendmsg+0x50/0x50 [ 349.489602][T12957] ? do_recvmmsg+0x6d0/0x6d0 [ 349.494236][T12957] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 349.500258][T12957] ___sys_sendmsg+0xf3/0x170 [ 349.504882][T12957] ? sendmsg_copy_msghdr+0x160/0x160 [ 349.510217][T12957] ? __fget_files+0x266/0x3d0 [ 349.514936][T12957] ? lock_downgrade+0x6d0/0x6d0 [ 349.519832][T12957] ? __fget_files+0x288/0x3d0 [ 349.524546][T12957] ? __fget_light+0xea/0x280 [ 349.529164][T12957] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 349.535495][T12957] __sys_sendmmsg+0x195/0x470 [ 349.540209][T12957] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 349.545261][T12957] ? lock_downgrade+0x6d0/0x6d0 [ 349.550155][T12957] ? __mutex_unlock_slowpath+0xe2/0x610 [ 349.555730][T12957] ? lock_is_held_type+0xd5/0x130 [ 349.560784][T12957] ? wait_for_completion_io+0x270/0x270 [ 349.566373][T12957] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 349.572649][T12957] ? vfs_write+0x18e/0xa30 [ 349.577103][T12957] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 349.583382][T12957] ? fput+0x2a/0x50 [ 349.587237][T12957] __x64_sys_sendmmsg+0x99/0x100 [ 349.592204][T12957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 349.598132][T12957] do_syscall_64+0x2d/0x70 [ 349.602578][T12957] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 349.608510][T12957] RIP: 0033:0x465ef9 [ 349.612426][T12957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 349.632063][T12957] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 349.640508][T12957] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 349.648503][T12957] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 349.656505][T12957] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 349.664506][T12957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 349.672506][T12957] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a2a76e252922cb18f6e2e2aba000000092e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000000000000001012b2bbfeaeb647b875027ecce66fd792bbf0e5bf3f6db1c00010000000000deff000000c0060000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xf}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x14, 0x2, [@TCA_U32_FLAGS={0x8}, @TCA_U32_DIVISOR={0x8, 0x4, 0x46}]}}]}, 0x40}}, 0x0) 16:35:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f00000004c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x4008800) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYRES16=0x0], 0x14}}, 0xc000) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 16:35:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x0, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:08 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00$\x00;\r\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008002b7edb126500040002"], 0x30}}, 0x0) 16:35:08 executing program 1 (fault-call:1 fault-nth:37): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 351.644907][T12986] FAULT_INJECTION: forcing a failure. [ 351.644907][T12986] name failslab, interval 1, probability 0, space 0, times 0 [ 351.669997][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.690997][T12986] CPU: 0 PID: 12986 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 351.699818][T12986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.709899][T12986] Call Trace: [ 351.713198][T12986] dump_stack+0xfa/0x151 [ 351.717479][T12986] should_fail.cold+0x5/0xa [ 351.722023][T12986] ? sctp_add_bind_addr+0x90/0x390 [ 351.727169][T12986] should_failslab+0x5/0x10 [ 351.731702][T12986] kmem_cache_alloc_trace+0x55/0x3a0 [ 351.737011][T12986] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 351.742768][T12986] sctp_add_bind_addr+0x90/0x390 [ 351.747743][T12986] sctp_copy_local_addr_list+0x33e/0x4e0 [ 351.753415][T12986] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 351.758562][T12986] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 351.764838][T12986] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 351.770769][T12986] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 351.776701][T12986] sctp_bind_addr_copy+0xde/0x460 [ 351.781769][T12986] sctp_connect_new_asoc+0x1cd/0x770 [ 351.787087][T12986] ? sctp_bind+0x110/0x110 [ 351.791541][T12986] ? __local_bh_enable_ip+0xa0/0x120 [ 351.796851][T12986] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 351.803127][T12986] ? security_sctp_bind_connect+0x8f/0xc0 [ 351.808884][T12986] sctp_sendmsg+0x13bc/0x1d30 [ 351.813605][T12986] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 351.818746][T12986] ? lock_is_held_type+0xd5/0x130 [ 351.823823][T12986] ? aa_af_perm+0x230/0x230 [ 351.828360][T12986] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 351.834639][T12986] inet_sendmsg+0x99/0xe0 [ 351.838997][T12986] ? inet_send_prepare+0x4d0/0x4d0 16:35:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x0, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 351.844133][T12986] sock_sendmsg+0xcf/0x120 [ 351.848581][T12986] ____sys_sendmsg+0x331/0x810 [ 351.853375][T12986] ? kernel_sendmsg+0x50/0x50 [ 351.858076][T12986] ? do_recvmmsg+0x6d0/0x6d0 [ 351.862715][T12986] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 351.868742][T12986] ___sys_sendmsg+0xf3/0x170 [ 351.873370][T12986] ? sendmsg_copy_msghdr+0x160/0x160 [ 351.878704][T12986] ? __fget_files+0x266/0x3d0 [ 351.883417][T12986] ? lock_downgrade+0x6d0/0x6d0 [ 351.888329][T12986] ? __fget_files+0x288/0x3d0 [ 351.893046][T12986] ? __fget_light+0xea/0x280 [ 351.897667][T12986] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 351.903957][T12986] __sys_sendmmsg+0x195/0x470 [ 351.908670][T12986] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 351.913797][T12986] ? lock_downgrade+0x6d0/0x6d0 [ 351.918671][T12986] ? __mutex_unlock_slowpath+0xe2/0x610 [ 351.924225][T12986] ? lock_is_held_type+0xd5/0x130 [ 351.929272][T12986] ? wait_for_completion_io+0x270/0x270 [ 351.934814][T12986] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 351.941102][T12986] ? vfs_write+0x18e/0xa30 [ 351.945552][T12986] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 351.951808][T12986] ? fput+0x2a/0x50 [ 351.955627][T12986] __x64_sys_sendmmsg+0x99/0x100 [ 351.960564][T12986] ? syscall_enter_from_user_mode+0x1d/0x50 [ 351.966454][T12986] do_syscall_64+0x2d/0x70 [ 351.970863][T12986] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 351.976759][T12986] RIP: 0033:0x465ef9 [ 351.980667][T12986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 352.000271][T12986] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 352.008680][T12986] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 352.016664][T12986] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 352.024634][T12986] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 352.032608][T12986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 352.040572][T12986] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:09 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00$\x00;\r\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008002b7edb126500040002"], 0x30}}, 0x0) 16:35:09 executing program 5: setuid(0xee00) clock_adjtime(0x0, &(0x7f0000000000)={0x7}) 16:35:09 executing program 1 (fault-call:1 fault-nth:38): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x0, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 352.251751][T13009] FAULT_INJECTION: forcing a failure. [ 352.251751][T13009] name failslab, interval 1, probability 0, space 0, times 0 [ 352.274362][T13009] CPU: 0 PID: 13009 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 352.283168][T13009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.293337][T13009] Call Trace: [ 352.296637][T13009] dump_stack+0xfa/0x151 16:35:09 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00$\x00;\r\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000000008002b7edb126500040002"], 0x30}}, 0x0) [ 352.300915][T13009] should_fail.cold+0x5/0xa [ 352.305454][T13009] ? sctp_add_bind_addr+0x90/0x390 [ 352.310604][T13009] should_failslab+0x5/0x10 [ 352.315135][T13009] kmem_cache_alloc_trace+0x55/0x3a0 [ 352.320445][T13009] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 352.326381][T13009] sctp_add_bind_addr+0x90/0x390 [ 352.331360][T13009] sctp_copy_local_addr_list+0x33e/0x4e0 [ 352.337039][T13009] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 352.342294][T13009] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 352.348573][T13009] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 352.354500][T13009] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 352.360436][T13009] sctp_bind_addr_copy+0xde/0x460 [ 352.365612][T13009] sctp_connect_new_asoc+0x1cd/0x770 [ 352.370942][T13009] ? sctp_bind+0x110/0x110 [ 352.375401][T13009] ? __local_bh_enable_ip+0xa0/0x120 [ 352.380710][T13009] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 352.386983][T13009] ? security_sctp_bind_connect+0x8f/0xc0 [ 352.392738][T13009] sctp_sendmsg+0x13bc/0x1d30 [ 352.397454][T13009] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 352.402585][T13009] ? lock_is_held_type+0xd5/0x130 [ 352.407657][T13009] ? aa_af_perm+0x230/0x230 [ 352.412203][T13009] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 352.418475][T13009] inet_sendmsg+0x99/0xe0 [ 352.422832][T13009] ? inet_send_prepare+0x4d0/0x4d0 [ 352.427965][T13009] sock_sendmsg+0xcf/0x120 [ 352.432408][T13009] ____sys_sendmsg+0x331/0x810 [ 352.437204][T13009] ? kernel_sendmsg+0x50/0x50 [ 352.441905][T13009] ? do_recvmmsg+0x6d0/0x6d0 [ 352.446538][T13009] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 352.452556][T13009] ___sys_sendmsg+0xf3/0x170 [ 352.457175][T13009] ? sendmsg_copy_msghdr+0x160/0x160 [ 352.462491][T13009] ? __fget_files+0x266/0x3d0 [ 352.467198][T13009] ? lock_downgrade+0x6d0/0x6d0 [ 352.472090][T13009] ? __fget_files+0x288/0x3d0 [ 352.476800][T13009] ? __fget_light+0xea/0x280 [ 352.481413][T13009] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 352.487696][T13009] __sys_sendmmsg+0x195/0x470 [ 352.492414][T13009] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 352.497468][T13009] ? lock_downgrade+0x6d0/0x6d0 [ 352.502362][T13009] ? __mutex_unlock_slowpath+0xe2/0x610 [ 352.507938][T13009] ? lock_is_held_type+0xd5/0x130 [ 352.512991][T13009] ? wait_for_completion_io+0x270/0x270 [ 352.518564][T13009] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 352.524833][T13009] ? vfs_write+0x18e/0xa30 [ 352.529276][T13009] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 352.535543][T13009] ? fput+0x2a/0x50 [ 352.539397][T13009] __x64_sys_sendmmsg+0x99/0x100 [ 352.544360][T13009] ? syscall_enter_from_user_mode+0x1d/0x50 [ 352.550284][T13009] do_syscall_64+0x2d/0x70 [ 352.554726][T13009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 352.560644][T13009] RIP: 0033:0x465ef9 [ 352.564558][T13009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 352.584189][T13009] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 352.592634][T13009] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 352.600634][T13009] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 352.608629][T13009] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 352.616631][T13009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 352.624628][T13009] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:12 executing program 5: getresgid(&(0x7f0000000000), &(0x7f0000000fc0), &(0x7f0000001000)) 16:35:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mlockall(0x3) 16:35:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x0, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:35:12 executing program 1 (fault-call:1 fault-nth:39): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 355.188141][T13035] FAULT_INJECTION: forcing a failure. [ 355.188141][T13035] name failslab, interval 1, probability 0, space 0, times 0 16:35:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) getpeername$unix(r2, 0x0, 0x0) 16:35:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x0, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 355.263824][T13035] CPU: 1 PID: 13035 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 355.272652][T13035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.282739][T13035] Call Trace: [ 355.286036][T13035] dump_stack+0xfa/0x151 [ 355.290322][T13035] should_fail.cold+0x5/0xa [ 355.294855][T13035] ? sctp_add_bind_addr+0x90/0x390 [ 355.300006][T13035] should_failslab+0x5/0x10 [ 355.304535][T13035] kmem_cache_alloc_trace+0x55/0x3a0 [ 355.309843][T13035] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 355.315598][T13035] sctp_add_bind_addr+0x90/0x390 [ 355.320576][T13035] sctp_copy_local_addr_list+0x33e/0x4e0 [ 355.326259][T13035] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 355.331410][T13035] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 355.337688][T13035] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 355.343621][T13035] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 355.349553][T13035] sctp_bind_addr_copy+0xde/0x460 [ 355.354624][T13035] sctp_connect_new_asoc+0x1cd/0x770 [ 355.359940][T13035] ? sctp_bind+0x110/0x110 [ 355.364385][T13035] ? __local_bh_enable_ip+0xa0/0x120 [ 355.369702][T13035] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 355.375975][T13035] ? security_sctp_bind_connect+0x8f/0xc0 [ 355.381727][T13035] sctp_sendmsg+0x13bc/0x1d30 [ 355.386435][T13035] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 355.391569][T13035] ? lock_is_held_type+0xd5/0x130 [ 355.396641][T13035] ? aa_af_perm+0x230/0x230 [ 355.401186][T13035] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 355.407459][T13035] inet_sendmsg+0x99/0xe0 [ 355.411811][T13035] ? inet_send_prepare+0x4d0/0x4d0 [ 355.416938][T13035] sock_sendmsg+0xcf/0x120 [ 355.421377][T13035] ____sys_sendmsg+0x331/0x810 [ 355.426165][T13035] ? kernel_sendmsg+0x50/0x50 [ 355.430858][T13035] ? do_recvmmsg+0x6d0/0x6d0 [ 355.435475][T13035] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 355.441490][T13035] ___sys_sendmsg+0xf3/0x170 [ 355.446106][T13035] ? sendmsg_copy_msghdr+0x160/0x160 [ 355.451430][T13035] ? __fget_files+0x266/0x3d0 [ 355.456130][T13035] ? lock_downgrade+0x6d0/0x6d0 [ 355.461026][T13035] ? __fget_files+0x288/0x3d0 [ 355.465733][T13035] ? __fget_light+0xea/0x280 [ 355.470343][T13035] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 355.476616][T13035] __sys_sendmmsg+0x195/0x470 [ 355.481324][T13035] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 355.486372][T13035] ? lock_downgrade+0x6d0/0x6d0 [ 355.491263][T13035] ? __mutex_unlock_slowpath+0xe2/0x610 [ 355.496835][T13035] ? lock_is_held_type+0xd5/0x130 [ 355.501887][T13035] ? wait_for_completion_io+0x270/0x270 [ 355.507455][T13035] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 355.513718][T13035] ? vfs_write+0x18e/0xa30 [ 355.518163][T13035] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 355.524433][T13035] ? fput+0x2a/0x50 [ 355.528284][T13035] __x64_sys_sendmmsg+0x99/0x100 [ 355.533248][T13035] ? syscall_enter_from_user_mode+0x1d/0x50 [ 355.539168][T13035] do_syscall_64+0x2d/0x70 [ 355.543605][T13035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 355.549527][T13035] RIP: 0033:0x465ef9 [ 355.553441][T13035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 355.573083][T13035] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 355.581532][T13035] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 355.589543][T13035] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 355.597533][T13035] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 355.605518][T13035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0) 16:35:12 executing program 4: symlink(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)='./file0\x00') link(&(0x7f0000000000)='./file0/../file0\x00', 0x0) [ 355.613481][T13035] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:12 executing program 1 (fault-call:1 fault-nth:40): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:12 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:35:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) socket(0x15, 0x5, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r0, 0xb45bf4aceaf4bfa9}], 0x1, 0x2) [ 355.795380][T13062] FAULT_INJECTION: forcing a failure. [ 355.795380][T13062] name failslab, interval 1, probability 0, space 0, times 0 16:35:12 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3f, 0xb000) close(r0) [ 355.867528][T13062] CPU: 0 PID: 13062 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 355.876352][T13062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.886432][T13062] Call Trace: [ 355.889736][T13062] dump_stack+0xfa/0x151 [ 355.894008][T13062] should_fail.cold+0x5/0xa [ 355.898537][T13062] ? sctp_add_bind_addr+0x90/0x390 [ 355.903680][T13062] should_failslab+0x5/0x10 [ 355.908218][T13062] kmem_cache_alloc_trace+0x55/0x3a0 [ 355.913532][T13062] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 355.919294][T13062] sctp_add_bind_addr+0x90/0x390 [ 355.924276][T13062] sctp_copy_local_addr_list+0x33e/0x4e0 [ 355.929947][T13062] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 355.935097][T13062] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 355.941367][T13062] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 355.947295][T13062] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 355.953229][T13062] sctp_bind_addr_copy+0xde/0x460 [ 355.958301][T13062] sctp_connect_new_asoc+0x1cd/0x770 [ 355.963626][T13062] ? sctp_bind+0x110/0x110 [ 355.968081][T13062] ? __local_bh_enable_ip+0xa0/0x120 [ 355.973395][T13062] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 355.979660][T13062] ? security_sctp_bind_connect+0x8f/0xc0 [ 355.985415][T13062] sctp_sendmsg+0x13bc/0x1d30 [ 355.990132][T13062] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 355.995271][T13062] ? lock_is_held_type+0xd5/0x130 [ 356.000342][T13062] ? aa_af_perm+0x230/0x230 [ 356.004878][T13062] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.011160][T13062] inet_sendmsg+0x99/0xe0 [ 356.015519][T13062] ? inet_send_prepare+0x4d0/0x4d0 [ 356.020655][T13062] sock_sendmsg+0xcf/0x120 [ 356.025097][T13062] ____sys_sendmsg+0x331/0x810 [ 356.029888][T13062] ? kernel_sendmsg+0x50/0x50 [ 356.034587][T13062] ? do_recvmmsg+0x6d0/0x6d0 [ 356.039211][T13062] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 356.045232][T13062] ___sys_sendmsg+0xf3/0x170 [ 356.049855][T13062] ? sendmsg_copy_msghdr+0x160/0x160 [ 356.055173][T13062] ? __fget_files+0x266/0x3d0 [ 356.059873][T13062] ? lock_downgrade+0x6d0/0x6d0 [ 356.064767][T13062] ? __fget_files+0x288/0x3d0 [ 356.069473][T13062] ? __fget_light+0xea/0x280 [ 356.074121][T13062] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 356.080392][T13062] __sys_sendmmsg+0x195/0x470 [ 356.085106][T13062] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 356.090164][T13062] ? lock_downgrade+0x6d0/0x6d0 [ 356.095055][T13062] ? __mutex_unlock_slowpath+0xe2/0x610 [ 356.100627][T13062] ? lock_is_held_type+0xd5/0x130 [ 356.105675][T13062] ? wait_for_completion_io+0x270/0x270 [ 356.111248][T13062] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 356.117516][T13062] ? vfs_write+0x18e/0xa30 [ 356.121964][T13062] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.128232][T13062] ? fput+0x2a/0x50 [ 356.132082][T13062] __x64_sys_sendmmsg+0x99/0x100 [ 356.137048][T13062] ? syscall_enter_from_user_mode+0x1d/0x50 [ 356.142989][T13062] do_syscall_64+0x2d/0x70 [ 356.147428][T13062] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 356.153354][T13062] RIP: 0033:0x465ef9 [ 356.157266][T13062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.176906][T13062] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 356.185351][T13062] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 356.193349][T13062] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 356.201496][T13062] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.209748][T13062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 356.217746][T13062] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:13 executing program 1 (fault-call:1 fault-nth:41): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x13, 0x0, 0x300) 16:35:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x5, 0x5, 0xffc, 0x5}, 0x40) 16:35:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) socket(0x15, 0x5, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) 16:35:13 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3, 0x0) read$alg(r0, &(0x7f0000000280)=""/167, 0xa7) [ 356.471565][T13085] FAULT_INJECTION: forcing a failure. [ 356.471565][T13085] name failslab, interval 1, probability 0, space 0, times 0 16:35:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 356.512705][T13085] CPU: 1 PID: 13085 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 356.521534][T13085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.532626][T13085] Call Trace: [ 356.532641][T13085] dump_stack+0xfa/0x151 [ 356.532679][T13085] should_fail.cold+0x5/0xa [ 356.532720][T13085] ? sctp_add_bind_addr+0x90/0x390 [ 356.532751][T13085] should_failslab+0x5/0x10 [ 356.532779][T13085] kmem_cache_alloc_trace+0x55/0x3a0 [ 356.532804][T13085] ? __sanitizer_cov_trace_cmp2+0x22/0x80 16:35:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x3, 0x0, 0x0) 16:35:13 executing program 1 (fault-call:1 fault-nth:42): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) socket(0x15, 0x5, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2713, 0x0, &(0x7f0000000100)) [ 356.532841][T13085] sctp_add_bind_addr+0x90/0x390 [ 356.532875][T13085] sctp_copy_local_addr_list+0x33e/0x4e0 16:35:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, 0x2, 0x1, 0x201}, 0x14}}, 0x0) [ 356.532912][T13085] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 356.532946][T13085] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.532974][T13085] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 356.533003][T13085] ? __sanitizer_cov_trace_switch+0x63/0xf0 16:35:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x7}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="40439101dde1"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) [ 356.533036][T13085] sctp_bind_addr_copy+0xde/0x460 [ 356.533074][T13085] sctp_connect_new_asoc+0x1cd/0x770 [ 356.533101][T13085] ? sctp_bind+0x110/0x110 [ 356.533130][T13085] ? __local_bh_enable_ip+0xa0/0x120 [ 356.533154][T13085] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 356.533182][T13085] ? security_sctp_bind_connect+0x8f/0xc0 [ 356.533216][T13085] sctp_sendmsg+0x13bc/0x1d30 [ 356.533251][T13085] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 356.533275][T13085] ? lock_is_held_type+0xd5/0x130 [ 356.533322][T13085] ? aa_af_perm+0x230/0x230 [ 356.533355][T13085] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.533389][T13085] inet_sendmsg+0x99/0xe0 [ 356.533415][T13085] ? inet_send_prepare+0x4d0/0x4d0 [ 356.533440][T13085] sock_sendmsg+0xcf/0x120 [ 356.533468][T13085] ____sys_sendmsg+0x331/0x810 [ 356.533504][T13085] ? kernel_sendmsg+0x50/0x50 [ 356.533529][T13085] ? do_recvmmsg+0x6d0/0x6d0 [ 356.533562][T13085] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 356.533600][T13085] ___sys_sendmsg+0xf3/0x170 [ 356.533629][T13085] ? sendmsg_copy_msghdr+0x160/0x160 [ 356.533663][T13085] ? __fget_files+0x266/0x3d0 [ 356.533688][T13085] ? lock_downgrade+0x6d0/0x6d0 [ 356.533729][T13085] ? __fget_files+0x288/0x3d0 [ 356.533763][T13085] ? __fget_light+0xea/0x280 [ 356.533790][T13085] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 356.533826][T13085] __sys_sendmmsg+0x195/0x470 [ 356.533860][T13085] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 356.533888][T13085] ? lock_downgrade+0x6d0/0x6d0 [ 356.533930][T13085] ? __mutex_unlock_slowpath+0xe2/0x610 [ 356.533958][T13085] ? lock_is_held_type+0xd5/0x130 [ 356.533986][T13085] ? wait_for_completion_io+0x270/0x270 [ 356.534015][T13085] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 356.534044][T13085] ? vfs_write+0x18e/0xa30 [ 356.534072][T13085] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.534100][T13085] ? fput+0x2a/0x50 [ 356.534138][T13085] __x64_sys_sendmmsg+0x99/0x100 [ 356.534165][T13085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 356.534193][T13085] do_syscall_64+0x2d/0x70 [ 356.534216][T13085] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 356.534246][T13085] RIP: 0033:0x465ef9 [ 356.534267][T13085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.534292][T13085] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 356.534319][T13085] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 356.534336][T13085] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 356.534352][T13085] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.534367][T13085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 356.534382][T13085] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 [ 356.816169][T13104] FAULT_INJECTION: forcing a failure. [ 356.816169][T13104] name failslab, interval 1, probability 0, space 0, times 0 [ 356.816208][T13104] CPU: 1 PID: 13104 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 356.816233][T13104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.816247][T13104] Call Trace: [ 356.816257][T13104] dump_stack+0xfa/0x151 [ 356.816296][T13104] should_fail.cold+0x5/0xa [ 356.816324][T13104] ? sctp_add_bind_addr+0x90/0x390 [ 356.816350][T13104] should_failslab+0x5/0x10 [ 356.816377][T13104] kmem_cache_alloc_trace+0x55/0x3a0 [ 356.816402][T13104] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 356.816434][T13104] sctp_add_bind_addr+0x90/0x390 [ 356.816464][T13104] sctp_copy_local_addr_list+0x33e/0x4e0 [ 356.816511][T13104] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 356.816543][T13104] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.816572][T13104] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 356.816602][T13104] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 356.816637][T13104] sctp_bind_addr_copy+0xde/0x460 [ 356.816676][T13104] sctp_connect_new_asoc+0x1cd/0x770 [ 356.816703][T13104] ? sctp_bind+0x110/0x110 [ 356.816730][T13104] ? __local_bh_enable_ip+0xa0/0x120 [ 356.816753][T13104] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 356.816782][T13104] ? security_sctp_bind_connect+0x8f/0xc0 [ 356.816813][T13104] sctp_sendmsg+0x13bc/0x1d30 [ 356.816845][T13104] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 356.816869][T13104] ? lock_is_held_type+0xd5/0x130 [ 356.816915][T13104] ? aa_af_perm+0x230/0x230 [ 356.816948][T13104] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.816985][T13104] inet_sendmsg+0x99/0xe0 [ 356.817012][T13104] ? inet_send_prepare+0x4d0/0x4d0 [ 356.817038][T13104] sock_sendmsg+0xcf/0x120 [ 356.817067][T13104] ____sys_sendmsg+0x331/0x810 [ 356.817098][T13104] ? kernel_sendmsg+0x50/0x50 [ 356.817122][T13104] ? do_recvmmsg+0x6d0/0x6d0 [ 356.817156][T13104] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 356.817195][T13104] ___sys_sendmsg+0xf3/0x170 [ 356.817224][T13104] ? sendmsg_copy_msghdr+0x160/0x160 [ 356.817259][T13104] ? __fget_files+0x266/0x3d0 [ 356.817286][T13104] ? lock_downgrade+0x6d0/0x6d0 [ 356.817328][T13104] ? __fget_files+0x288/0x3d0 [ 356.817362][T13104] ? __fget_light+0xea/0x280 [ 356.817388][T13104] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 356.817424][T13104] __sys_sendmmsg+0x195/0x470 [ 356.817457][T13104] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 356.817493][T13104] ? lock_downgrade+0x6d0/0x6d0 [ 356.817539][T13104] ? __mutex_unlock_slowpath+0xe2/0x610 [ 356.817568][T13104] ? lock_is_held_type+0xd5/0x130 [ 356.817598][T13104] ? wait_for_completion_io+0x270/0x270 [ 356.817630][T13104] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 356.817658][T13104] ? vfs_write+0x18e/0xa30 [ 356.817687][T13104] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.817725][T13104] ? fput+0x2a/0x50 [ 356.817765][T13104] __x64_sys_sendmmsg+0x99/0x100 [ 356.817791][T13104] ? syscall_enter_from_user_mode+0x1d/0x50 [ 356.817823][T13104] do_syscall_64+0x2d/0x70 [ 356.817848][T13104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 356.817878][T13104] RIP: 0033:0x465ef9 [ 356.817899][T13104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.817924][T13104] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 356.817952][T13104] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 356.817969][T13104] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 356.817986][T13104] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.818001][T13104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 356.818017][T13104] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:16 executing program 1 (fault-call:1 fault-nth:43): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x7}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="40439101dde1"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) 16:35:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x0, 0x2713, 0x0, &(0x7f0000000100)) 16:35:16 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$packet(r0, 0xffffffffffffffff, 0x0) 16:35:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x4, 0x0, 0x0) [ 359.345936][T13127] FAULT_INJECTION: forcing a failure. [ 359.345936][T13127] name failslab, interval 1, probability 0, space 0, times 0 [ 359.408162][T13127] CPU: 1 PID: 13127 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 359.416988][T13127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.427066][T13127] Call Trace: [ 359.430365][T13127] dump_stack+0xfa/0x151 [ 359.434643][T13127] should_fail.cold+0x5/0xa [ 359.439177][T13127] ? sctp_add_bind_addr+0x90/0x390 [ 359.444316][T13127] should_failslab+0x5/0x10 [ 359.448850][T13127] kmem_cache_alloc_trace+0x55/0x3a0 [ 359.454162][T13127] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 359.459918][T13127] sctp_add_bind_addr+0x90/0x390 [ 359.464898][T13127] sctp_copy_local_addr_list+0x33e/0x4e0 [ 359.470570][T13127] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 359.475725][T13127] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 359.482011][T13127] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 359.487949][T13127] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 359.493890][T13127] sctp_bind_addr_copy+0xde/0x460 [ 359.498967][T13127] sctp_connect_new_asoc+0x1cd/0x770 [ 359.504295][T13127] ? sctp_bind+0x110/0x110 [ 359.508749][T13127] ? __local_bh_enable_ip+0xa0/0x120 [ 359.514066][T13127] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 359.520338][T13127] ? security_sctp_bind_connect+0x8f/0xc0 [ 359.526095][T13127] sctp_sendmsg+0x13bc/0x1d30 [ 359.530814][T13127] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 359.535954][T13127] ? lock_is_held_type+0xd5/0x130 [ 359.541027][T13127] ? aa_af_perm+0x230/0x230 [ 359.545563][T13127] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 359.551844][T13127] inet_sendmsg+0x99/0xe0 [ 359.556201][T13127] ? inet_send_prepare+0x4d0/0x4d0 [ 359.561345][T13127] sock_sendmsg+0xcf/0x120 [ 359.565791][T13127] ____sys_sendmsg+0x331/0x810 [ 359.570580][T13127] ? kernel_sendmsg+0x50/0x50 [ 359.575282][T13127] ? do_recvmmsg+0x6d0/0x6d0 [ 359.579907][T13127] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 359.585932][T13127] ___sys_sendmsg+0xf3/0x170 [ 359.590555][T13127] ? sendmsg_copy_msghdr+0x160/0x160 [ 359.595872][T13127] ? __fget_files+0x266/0x3d0 [ 359.600575][T13127] ? lock_downgrade+0x6d0/0x6d0 [ 359.605470][T13127] ? __fget_files+0x288/0x3d0 [ 359.610183][T13127] ? __fget_light+0xea/0x280 [ 359.614796][T13127] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 359.621072][T13127] __sys_sendmmsg+0x195/0x470 [ 359.625791][T13127] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 359.630849][T13127] ? lock_downgrade+0x6d0/0x6d0 [ 359.635752][T13127] ? __mutex_unlock_slowpath+0xe2/0x610 [ 359.641327][T13127] ? lock_is_held_type+0xd5/0x130 [ 359.646378][T13127] ? wait_for_completion_io+0x270/0x270 [ 359.651951][T13127] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 359.658221][T13127] ? vfs_write+0x18e/0xa30 [ 359.662670][T13127] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 359.668952][T13127] ? fput+0x2a/0x50 [ 359.672810][T13127] __x64_sys_sendmmsg+0x99/0x100 [ 359.677781][T13127] ? syscall_enter_from_user_mode+0x1d/0x50 [ 359.683709][T13127] do_syscall_64+0x2d/0x70 [ 359.688166][T13127] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 359.694095][T13127] RIP: 0033:0x465ef9 [ 359.698017][T13127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 359.717654][T13127] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 359.726105][T13127] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 359.734098][T13127] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 359.742091][T13127] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 359.750086][T13127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x7}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="40439101dde1"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) 16:35:16 executing program 5: ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000380)={0x0, "1179813eebf528a21c72577d5788265b"}) set_mempolicy(0x0, &(0x7f0000000000), 0x8000) 16:35:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x0, 0x2713, 0x0, &(0x7f0000000100)) 16:35:16 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={0x0, 0xffffff7f}}, 0x0) [ 359.758080][T13127] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:16 executing program 1 (fault-call:1 fault-nth:44): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x7}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="40439101dde1"}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) [ 360.017927][T13157] FAULT_INJECTION: forcing a failure. [ 360.017927][T13157] name failslab, interval 1, probability 0, space 0, times 0 [ 360.043339][T13157] CPU: 1 PID: 13157 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 360.052156][T13157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.062242][T13157] Call Trace: [ 360.065543][T13157] dump_stack+0xfa/0x151 [ 360.069809][T13157] should_fail.cold+0x5/0xa [ 360.074323][T13157] ? sctp_add_bind_addr+0x90/0x390 [ 360.079457][T13157] should_failslab+0x5/0x10 [ 360.083996][T13157] kmem_cache_alloc_trace+0x55/0x3a0 [ 360.089312][T13157] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 360.095073][T13157] sctp_add_bind_addr+0x90/0x390 [ 360.100054][T13157] sctp_copy_local_addr_list+0x33e/0x4e0 [ 360.105737][T13157] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 360.110892][T13157] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 360.117167][T13157] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 360.123133][T13157] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 360.129067][T13157] sctp_bind_addr_copy+0xde/0x460 [ 360.134142][T13157] sctp_connect_new_asoc+0x1cd/0x770 [ 360.139462][T13157] ? sctp_bind+0x110/0x110 [ 360.143914][T13157] ? __local_bh_enable_ip+0xa0/0x120 [ 360.149226][T13157] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 360.155503][T13157] ? security_sctp_bind_connect+0x8f/0xc0 [ 360.161259][T13157] sctp_sendmsg+0x13bc/0x1d30 [ 360.165979][T13157] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 360.171119][T13157] ? lock_is_held_type+0xd5/0x130 [ 360.176193][T13157] ? aa_af_perm+0x230/0x230 [ 360.180739][T13157] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 360.187024][T13157] inet_sendmsg+0x99/0xe0 [ 360.191387][T13157] ? inet_send_prepare+0x4d0/0x4d0 [ 360.196530][T13157] sock_sendmsg+0xcf/0x120 [ 360.200978][T13157] ____sys_sendmsg+0x331/0x810 [ 360.205779][T13157] ? kernel_sendmsg+0x50/0x50 [ 360.210488][T13157] ? do_recvmmsg+0x6d0/0x6d0 [ 360.215240][T13157] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 360.221263][T13157] ___sys_sendmsg+0xf3/0x170 [ 360.225888][T13157] ? sendmsg_copy_msghdr+0x160/0x160 [ 360.231212][T13157] ? __fget_files+0x266/0x3d0 [ 360.235920][T13157] ? lock_downgrade+0x6d0/0x6d0 [ 360.240819][T13157] ? __fget_files+0x288/0x3d0 [ 360.245532][T13157] ? __fget_light+0xea/0x280 [ 360.250153][T13157] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 360.256468][T13157] __sys_sendmmsg+0x195/0x470 [ 360.261195][T13157] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 360.266255][T13157] ? lock_downgrade+0x6d0/0x6d0 [ 360.271155][T13157] ? __mutex_unlock_slowpath+0xe2/0x610 [ 360.276737][T13157] ? lock_is_held_type+0xd5/0x130 [ 360.281801][T13157] ? wait_for_completion_io+0x270/0x270 [ 360.287383][T13157] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 360.293661][T13157] ? vfs_write+0x18e/0xa30 [ 360.298117][T13157] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 360.304393][T13157] ? fput+0x2a/0x50 [ 360.308246][T13157] __x64_sys_sendmmsg+0x99/0x100 [ 360.313215][T13157] ? syscall_enter_from_user_mode+0x1d/0x50 [ 360.319140][T13157] do_syscall_64+0x2d/0x70 [ 360.323583][T13157] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 360.329505][T13157] RIP: 0033:0x465ef9 [ 360.333420][T13157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 360.353056][T13157] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 360.361505][T13157] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 360.369501][T13157] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 360.377612][T13157] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 360.385612][T13157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 360.393609][T13157] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x0, 0x2713, 0x0, &(0x7f0000000100)) 16:35:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xf}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}}, 0x0) 16:35:19 executing program 2: syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x8680) 16:35:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0)='devlink\x00', 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x54, r1, 0x1, 0x0, 0x0, {0x24}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x10}}, {0x8}, {0x6}, {0x5}}]}, 0x54}}, 0x0) 16:35:19 executing program 1 (fault-call:1 fault-nth:45): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x40) [ 362.437429][T13176] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 362.455726][T13178] FAULT_INJECTION: forcing a failure. [ 362.455726][T13178] name failslab, interval 1, probability 0, space 0, times 0 [ 362.501011][T13182] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 362.510451][T13178] CPU: 1 PID: 13178 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 362.519249][T13178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.529330][T13178] Call Trace: [ 362.532629][T13178] dump_stack+0xfa/0x151 [ 362.536904][T13178] should_fail.cold+0x5/0xa [ 362.541473][T13178] ? sctp_add_bind_addr+0x90/0x390 [ 362.546613][T13178] should_failslab+0x5/0x10 [ 362.551159][T13178] kmem_cache_alloc_trace+0x55/0x3a0 [ 362.556473][T13178] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 362.562234][T13178] sctp_add_bind_addr+0x90/0x390 [ 362.567215][T13178] sctp_copy_local_addr_list+0x33e/0x4e0 [ 362.572893][T13178] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 362.578046][T13178] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 362.584325][T13178] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 362.590256][T13178] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 362.596189][T13178] sctp_bind_addr_copy+0xde/0x460 [ 362.601255][T13178] sctp_connect_new_asoc+0x1cd/0x770 [ 362.606567][T13178] ? sctp_bind+0x110/0x110 [ 362.611012][T13178] ? __local_bh_enable_ip+0xa0/0x120 [ 362.616318][T13178] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 362.622589][T13178] ? security_sctp_bind_connect+0x8f/0xc0 [ 362.628347][T13178] sctp_sendmsg+0x13bc/0x1d30 [ 362.633061][T13178] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 362.638198][T13178] ? lock_is_held_type+0xd5/0x130 [ 362.643267][T13178] ? aa_af_perm+0x230/0x230 [ 362.647796][T13178] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 362.654076][T13178] inet_sendmsg+0x99/0xe0 [ 362.658430][T13178] ? inet_send_prepare+0x4d0/0x4d0 [ 362.663568][T13178] sock_sendmsg+0xcf/0x120 [ 362.668131][T13178] ____sys_sendmsg+0x331/0x810 [ 362.672933][T13178] ? kernel_sendmsg+0x50/0x50 [ 362.677640][T13178] ? do_recvmmsg+0x6d0/0x6d0 [ 362.682271][T13178] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 362.688296][T13178] ___sys_sendmsg+0xf3/0x170 [ 362.692919][T13178] ? sendmsg_copy_msghdr+0x160/0x160 [ 362.698237][T13178] ? __fget_files+0x266/0x3d0 [ 362.702937][T13178] ? lock_downgrade+0x6d0/0x6d0 [ 362.707828][T13178] ? __fget_files+0x288/0x3d0 [ 362.712538][T13178] ? __fget_light+0xea/0x280 [ 362.717152][T13178] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 362.723431][T13178] __sys_sendmmsg+0x195/0x470 [ 362.728155][T13178] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 362.733210][T13178] ? lock_downgrade+0x6d0/0x6d0 [ 362.738111][T13178] ? __mutex_unlock_slowpath+0xe2/0x610 [ 362.743689][T13178] ? lock_is_held_type+0xd5/0x130 [ 362.748743][T13178] ? wait_for_completion_io+0x270/0x270 [ 362.754319][T13178] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 362.760591][T13178] ? vfs_write+0x18e/0xa30 [ 362.765043][T13178] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 362.771316][T13178] ? fput+0x2a/0x50 [ 362.775165][T13178] __x64_sys_sendmmsg+0x99/0x100 [ 362.780137][T13178] ? syscall_enter_from_user_mode+0x1d/0x50 [ 362.786063][T13178] do_syscall_64+0x2d/0x70 [ 362.790505][T13178] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 362.796422][T13178] RIP: 0033:0x465ef9 [ 362.800360][T13178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 362.819994][T13178] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 362.828469][T13178] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 362.836469][T13178] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 362.844469][T13178] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 16:35:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x30, 0x0, &(0x7f0000000140)) 16:35:19 executing program 4: fsopen(&(0x7f0000009140)='nfs4\x00', 0x0) [ 362.852462][T13178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 362.860488][T13178] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x0, 0x0, &(0x7f0000000100)) 16:35:20 executing program 5: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002180)='/dev/nvme-fabrics\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {0x10}}, 0x24, 0x0) 16:35:20 executing program 1 (fault-call:1 fault-nth:46): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 363.106129][T13202] FAULT_INJECTION: forcing a failure. [ 363.106129][T13202] name failslab, interval 1, probability 0, space 0, times 0 [ 363.152140][T13202] CPU: 1 PID: 13202 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 363.160960][T13202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.171047][T13202] Call Trace: [ 363.174350][T13202] dump_stack+0xfa/0x151 [ 363.178648][T13202] should_fail.cold+0x5/0xa [ 363.183189][T13202] ? sctp_add_bind_addr+0x90/0x390 [ 363.188334][T13202] should_failslab+0x5/0x10 [ 363.192867][T13202] kmem_cache_alloc_trace+0x55/0x3a0 [ 363.198183][T13202] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 363.203941][T13202] sctp_add_bind_addr+0x90/0x390 [ 363.208928][T13202] sctp_copy_local_addr_list+0x33e/0x4e0 [ 363.214608][T13202] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 363.219758][T13202] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 363.226037][T13202] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 363.231966][T13202] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 363.237898][T13202] sctp_bind_addr_copy+0xde/0x460 [ 363.242965][T13202] sctp_connect_new_asoc+0x1cd/0x770 [ 363.248282][T13202] ? sctp_bind+0x110/0x110 [ 363.252734][T13202] ? __local_bh_enable_ip+0xa0/0x120 [ 363.258045][T13202] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 363.264316][T13202] ? security_sctp_bind_connect+0x8f/0xc0 [ 363.270071][T13202] sctp_sendmsg+0x13bc/0x1d30 [ 363.274820][T13202] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 363.279959][T13202] ? lock_is_held_type+0xd5/0x130 [ 363.285033][T13202] ? aa_af_perm+0x230/0x230 [ 363.289574][T13202] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 363.295853][T13202] inet_sendmsg+0x99/0xe0 [ 363.300210][T13202] ? inet_send_prepare+0x4d0/0x4d0 [ 363.305346][T13202] sock_sendmsg+0xcf/0x120 [ 363.309793][T13202] ____sys_sendmsg+0x331/0x810 [ 363.314589][T13202] ? kernel_sendmsg+0x50/0x50 [ 363.319294][T13202] ? do_recvmmsg+0x6d0/0x6d0 [ 363.323920][T13202] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 363.329942][T13202] ___sys_sendmsg+0xf3/0x170 [ 363.334562][T13202] ? sendmsg_copy_msghdr+0x160/0x160 [ 363.339880][T13202] ? __fget_files+0x266/0x3d0 [ 363.344582][T13202] ? lock_downgrade+0x6d0/0x6d0 [ 363.349575][T13202] ? __fget_files+0x288/0x3d0 [ 363.354295][T13202] ? __fget_light+0xea/0x280 [ 363.358925][T13202] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 363.365204][T13202] __sys_sendmmsg+0x195/0x470 [ 363.369924][T13202] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 363.374983][T13202] ? lock_downgrade+0x6d0/0x6d0 [ 363.379881][T13202] ? __mutex_unlock_slowpath+0xe2/0x610 [ 363.385462][T13202] ? lock_is_held_type+0xd5/0x130 [ 363.390518][T13202] ? wait_for_completion_io+0x270/0x270 [ 363.396092][T13202] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 363.402364][T13202] ? vfs_write+0x18e/0xa30 [ 363.406817][T13202] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 363.413085][T13202] ? fput+0x2a/0x50 [ 363.416934][T13202] __x64_sys_sendmmsg+0x99/0x100 [ 363.421904][T13202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 363.427828][T13202] do_syscall_64+0x2d/0x70 [ 363.432273][T13202] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 363.438197][T13202] RIP: 0033:0x465ef9 [ 363.442110][T13202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 363.461745][T13202] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 363.470194][T13202] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 363.478194][T13202] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 363.486190][T13202] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 363.494287][T13202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 363.502255][T13202] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 16:35:22 executing program 4: epoll_pwait(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0, &(0x7f0000000080), 0xff35) 16:35:22 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) 16:35:22 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) 16:35:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x0, 0x0, &(0x7f0000000100)) 16:35:22 executing program 1 (fault-call:1 fault-nth:47): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 365.485487][T13219] FAULT_INJECTION: forcing a failure. [ 365.485487][T13219] name failslab, interval 1, probability 0, space 0, times 0 16:35:22 executing program 5: r0 = syz_io_uring_setup(0x2e1, &(0x7f00000010c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000001140), &(0x7f0000001180)) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x2, 0x0, 0x0) [ 365.546149][ T36] audit: type=1326 audit(1614616522.584:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13214 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465ef9 code=0x0 [ 365.568097][T13219] CPU: 0 PID: 13219 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 365.576896][T13219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.586981][T13219] Call Trace: [ 365.590282][T13219] dump_stack+0xfa/0x151 16:35:22 executing program 4: socketpair(0xa, 0x6, 0x0, &(0x7f00000001c0)) [ 365.594560][T13219] should_fail.cold+0x5/0xa [ 365.599095][T13219] ? sctp_add_bind_addr+0x90/0x390 [ 365.604238][T13219] should_failslab+0x5/0x10 [ 365.608766][T13219] kmem_cache_alloc_trace+0x55/0x3a0 [ 365.614074][T13219] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 365.619828][T13219] sctp_add_bind_addr+0x90/0x390 [ 365.624809][T13219] sctp_copy_local_addr_list+0x33e/0x4e0 [ 365.630485][T13219] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 365.635632][T13219] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 365.641909][T13219] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 365.647831][T13219] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 365.653775][T13219] sctp_bind_addr_copy+0xde/0x460 [ 365.658842][T13219] sctp_connect_new_asoc+0x1cd/0x770 [ 365.664172][T13219] ? sctp_bind+0x110/0x110 [ 365.668621][T13219] ? __local_bh_enable_ip+0xa0/0x120 [ 365.673929][T13219] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 365.680201][T13219] ? security_sctp_bind_connect+0x8f/0xc0 [ 365.685956][T13219] sctp_sendmsg+0x13bc/0x1d30 [ 365.690670][T13219] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 365.695808][T13219] ? lock_is_held_type+0xd5/0x130 [ 365.700891][T13219] ? aa_af_perm+0x230/0x230 [ 365.705430][T13219] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 365.711704][T13219] inet_sendmsg+0x99/0xe0 [ 365.716058][T13219] ? inet_send_prepare+0x4d0/0x4d0 [ 365.721195][T13219] sock_sendmsg+0xcf/0x120 [ 365.725642][T13219] ____sys_sendmsg+0x331/0x810 [ 365.730434][T13219] ? kernel_sendmsg+0x50/0x50 [ 365.735131][T13219] ? do_recvmmsg+0x6d0/0x6d0 [ 365.739756][T13219] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 365.745775][T13219] ___sys_sendmsg+0xf3/0x170 [ 365.750399][T13219] ? sendmsg_copy_msghdr+0x160/0x160 [ 365.755717][T13219] ? __fget_files+0x266/0x3d0 [ 365.760419][T13219] ? lock_downgrade+0x6d0/0x6d0 [ 365.765311][T13219] ? __fget_files+0x288/0x3d0 [ 365.770032][T13219] ? __fget_light+0xea/0x280 [ 365.774654][T13219] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 365.780934][T13219] __sys_sendmmsg+0x195/0x470 [ 365.785649][T13219] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 365.790703][T13219] ? lock_downgrade+0x6d0/0x6d0 [ 365.795598][T13219] ? __mutex_unlock_slowpath+0xe2/0x610 [ 365.801171][T13219] ? lock_is_held_type+0xd5/0x130 [ 365.806220][T13219] ? wait_for_completion_io+0x270/0x270 [ 365.811794][T13219] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 365.818066][T13219] ? vfs_write+0x18e/0xa30 [ 365.822510][T13219] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 365.828776][T13219] ? fput+0x2a/0x50 [ 365.832619][T13219] __x64_sys_sendmmsg+0x99/0x100 [ 365.837583][T13219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 365.843507][T13219] do_syscall_64+0x2d/0x70 [ 365.847947][T13219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 365.853896][T13219] RIP: 0033:0x465ef9 [ 365.857805][T13219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 365.877441][T13219] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 365.885891][T13219] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 16:35:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 16:35:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x0, 0x0, &(0x7f0000000100)) [ 365.893888][T13219] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 365.901887][T13219] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 365.909882][T13219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 365.917878][T13219] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:23 executing program 1 (fault-call:1 fault-nth:48): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000160, 0x0) 16:35:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="c4c691019919da078a0098d1e0a593b04009f09100087f0000000022addee07beef063040002000000000000002f00602022511253507db56f598e5878d27a953ad4419cc6ead9065e291e7e4e77c45200b4b778989e18e2786dc5eb38812a62a7de3a5071accef427530023a2c05369e4cf55cbd87a4ca9d5088f0d5cccd0e27d784382cbe835708198bc15dfdf61bd7ddab475ab309ea62385f022891c7deb59b5d7c1388d5674205dcb3cd99a4a088899f68e3574069b2e434dcfb1014dd8739acf5d135bb8331db0180abbd53cd68cacae4f5e8e74c876d6dd651d3fc8bd9696e402f5a3226b51d4f70b767da6b9b47426fa517347a605473a627a025bdf052bd211f738f2dee159214a116a00557159122eeec438d2dce85a51b2c8a4c37fc153d9fba17d488d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x17) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 16:35:23 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x8, 0x2c, 0x0, @local, @mcast2, {[], "e087428aac61885a"}}}}}, 0x0) 16:35:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, 0x0) 16:35:23 executing program 2: syz_emit_ethernet(0x14, &(0x7f0000000080)={@remote, @multicast, @val={@void}, {@generic={0x0, "a4d1"}}}, 0x0) 16:35:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="c4c691019919da078a0098d1e0a593b04009f09100087f0000000022addee07beef063040002000000000000002f00602022511253507db56f598e5878d27a953ad4419cc6ead9065e291e7e4e77c45200b4b778989e18e2786dc5eb38812a62a7de3a5071accef427530023a2c05369e4cf55cbd87a4ca9d5088f0d5cccd0e27d784382cbe835708198bc15dfdf61bd7ddab475ab309ea62385f022891c7deb59b5d7c1388d5674205dcb3cd99a4a088899f68e3574069b2e434dcfb1014dd8739acf5d135bb8331db0180abbd53cd68cacae4f5e8e74c876d6dd651d3fc8bd9696e402f5a3226b51d4f70b767da6b9b47426fa517347a605473a627a025bdf052bd211f738f2dee159214a116a00557159122eeec438d2dce85a51b2c8a4c37fc153d9fba17d488d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 366.158838][T13246] FAULT_INJECTION: forcing a failure. [ 366.158838][T13246] name failslab, interval 1, probability 0, space 0, times 0 [ 366.220060][T13246] CPU: 1 PID: 13246 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 366.228892][T13246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.238967][T13246] Call Trace: [ 366.242268][T13246] dump_stack+0xfa/0x151 [ 366.246555][T13246] should_fail.cold+0x5/0xa [ 366.251095][T13246] ? sctp_add_bind_addr+0x90/0x390 [ 366.256242][T13246] should_failslab+0x5/0x10 [ 366.260777][T13246] kmem_cache_alloc_trace+0x55/0x3a0 [ 366.266088][T13246] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 366.271848][T13246] sctp_add_bind_addr+0x90/0x390 [ 366.276834][T13246] sctp_copy_local_addr_list+0x33e/0x4e0 [ 366.282508][T13246] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 366.287656][T13246] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 366.293935][T13246] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 366.299873][T13246] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 366.305799][T13246] sctp_bind_addr_copy+0xde/0x460 [ 366.310864][T13246] sctp_connect_new_asoc+0x1cd/0x770 [ 366.316174][T13246] ? sctp_bind+0x110/0x110 [ 366.320634][T13246] ? __local_bh_enable_ip+0xa0/0x120 [ 366.325952][T13246] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 366.332223][T13246] ? security_sctp_bind_connect+0x8f/0xc0 [ 366.337976][T13246] sctp_sendmsg+0x13bc/0x1d30 [ 366.342700][T13246] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 366.347938][T13246] ? lock_is_held_type+0xd5/0x130 [ 366.353018][T13246] ? aa_af_perm+0x230/0x230 [ 366.357558][T13246] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 366.363839][T13246] inet_sendmsg+0x99/0xe0 [ 366.368198][T13246] ? inet_send_prepare+0x4d0/0x4d0 [ 366.373336][T13246] sock_sendmsg+0xcf/0x120 [ 366.377791][T13246] ____sys_sendmsg+0x331/0x810 [ 366.382585][T13246] ? kernel_sendmsg+0x50/0x50 [ 366.387286][T13246] ? do_recvmmsg+0x6d0/0x6d0 [ 366.391923][T13246] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 366.397940][T13246] ___sys_sendmsg+0xf3/0x170 [ 366.402559][T13246] ? sendmsg_copy_msghdr+0x160/0x160 [ 366.407884][T13246] ? __fget_files+0x266/0x3d0 [ 366.412588][T13246] ? lock_downgrade+0x6d0/0x6d0 [ 366.417486][T13246] ? __fget_files+0x288/0x3d0 [ 366.422287][T13246] ? __fget_light+0xea/0x280 [ 366.426908][T13246] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 366.433184][T13246] __sys_sendmmsg+0x195/0x470 [ 366.437897][T13246] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 366.442953][T13246] ? lock_downgrade+0x6d0/0x6d0 [ 366.447854][T13246] ? __mutex_unlock_slowpath+0xe2/0x610 [ 366.453429][T13246] ? lock_is_held_type+0xd5/0x130 [ 366.458480][T13246] ? wait_for_completion_io+0x270/0x270 [ 366.464058][T13246] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 366.470327][T13246] ? vfs_write+0x18e/0xa30 [ 366.474773][T13246] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 366.481046][T13246] ? fput+0x2a/0x50 [ 366.484895][T13246] __x64_sys_sendmmsg+0x99/0x100 [ 366.489860][T13246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 366.495786][T13246] do_syscall_64+0x2d/0x70 [ 366.500233][T13246] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 366.506154][T13246] RIP: 0033:0x465ef9 [ 366.510073][T13246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 366.529707][T13246] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 366.538153][T13246] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 366.546149][T13246] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 366.554144][T13246] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 366.562134][T13246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, 0x0) [ 366.570130][T13246] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x1f, 0x7fff, 0x2}) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:35:23 executing program 2: mknodat$null(0xffffffffffffffff, 0x0, 0xbc4edc82651bd4b5, 0x103) 16:35:23 executing program 4: io_setup(0x101, &(0x7f0000000300)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000003000000183a000005000000000000000000004001000100000080bfa94eb684ec99219f6882e67dc7c02260e414f65603569afb976c20102cbd138c03c5e22a576ee25aba79e8e18536ed74cd96e8f33933df08b6141a426c697de4173b7083bfeeec63f3e1bed06a7d08deb5ccedcb2969c8f6d1ae01ca2ff3cd87ff082d566a968d9d54f57c941c16a974e0c016bce7cd88812230786f6a9cb19e736f6015d496f6dd1127db4ff3a39dbd91aedd7c592ee24aa95d82c41869cef3d29e09991fbc380ec0fad905fa03b08636b2b4565e0d47b99f"], &(0x7f0000000040)='syzkaller\x00', 0x10000, 0x5, &(0x7f0000000080)=""/5, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x10000, 0x4}, 0x10, 0x1bd8f}, 0x78) io_setup(0xc5, &(0x7f0000000180)=0x0) io_destroy(0x0) io_getevents(r0, 0x101, 0x4, &(0x7f0000000440)=[{}, {}, {}, {}], 0x0) io_destroy(0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x301000, 0x0) io_setup(0xdc8a, &(0x7f00000001c0)) 16:35:23 executing program 1 (fault-call:1 fault-nth:49): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket(0x15, 0x5, 0x0) getsockopt(r1, 0x200000000114, 0x2713, 0x0, 0x0) 16:35:23 executing program 2: socketpair(0x26, 0x5, 0x6, 0x0) [ 366.887145][T13276] FAULT_INJECTION: forcing a failure. [ 366.887145][T13276] name failslab, interval 1, probability 0, space 0, times 0 [ 366.915950][T13273] blktrace: Concurrent blktraces are not allowed on loop0 [ 366.948632][T13276] CPU: 1 PID: 13276 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 366.957455][T13276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.967538][T13276] Call Trace: [ 366.970843][T13276] dump_stack+0xfa/0x151 [ 366.975122][T13276] should_fail.cold+0x5/0xa [ 366.979667][T13276] ? sctp_add_bind_addr+0x90/0x390 [ 366.984814][T13276] should_failslab+0x5/0x10 [ 366.989350][T13276] kmem_cache_alloc_trace+0x55/0x3a0 [ 366.994664][T13276] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 367.000418][T13276] sctp_add_bind_addr+0x90/0x390 [ 367.005396][T13276] sctp_copy_local_addr_list+0x33e/0x4e0 [ 367.011115][T13276] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 367.016253][T13276] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.022529][T13276] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 367.028455][T13276] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 367.034388][T13276] sctp_bind_addr_copy+0xde/0x460 [ 367.039456][T13276] sctp_connect_new_asoc+0x1cd/0x770 [ 367.044775][T13276] ? sctp_bind+0x110/0x110 [ 367.049268][T13276] ? __local_bh_enable_ip+0xa0/0x120 [ 367.054604][T13276] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.060906][T13276] ? security_sctp_bind_connect+0x8f/0xc0 [ 367.066669][T13276] sctp_sendmsg+0x13bc/0x1d30 [ 367.071388][T13276] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 367.076530][T13276] ? lock_is_held_type+0xd5/0x130 [ 367.081607][T13276] ? aa_af_perm+0x230/0x230 [ 367.086147][T13276] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.092442][T13276] inet_sendmsg+0x99/0xe0 [ 367.096897][T13276] ? inet_send_prepare+0x4d0/0x4d0 [ 367.102034][T13276] sock_sendmsg+0xcf/0x120 [ 367.106479][T13276] ____sys_sendmsg+0x331/0x810 [ 367.111276][T13276] ? kernel_sendmsg+0x50/0x50 [ 367.115977][T13276] ? do_recvmmsg+0x6d0/0x6d0 [ 367.120603][T13276] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 367.126626][T13276] ___sys_sendmsg+0xf3/0x170 [ 367.131255][T13276] ? sendmsg_copy_msghdr+0x160/0x160 [ 367.136664][T13276] ? __fget_files+0x266/0x3d0 [ 367.141367][T13276] ? lock_downgrade+0x6d0/0x6d0 [ 367.146265][T13276] ? __fget_files+0x288/0x3d0 [ 367.150976][T13276] ? __fget_light+0xea/0x280 [ 367.155594][T13276] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.161880][T13276] __sys_sendmmsg+0x195/0x470 [ 367.166597][T13276] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 367.171671][T13276] ? lock_downgrade+0x6d0/0x6d0 [ 367.176575][T13276] ? __mutex_unlock_slowpath+0xe2/0x610 [ 367.182214][T13276] ? lock_is_held_type+0xd5/0x130 [ 367.187278][T13276] ? wait_for_completion_io+0x270/0x270 [ 367.192862][T13276] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.199144][T13276] ? vfs_write+0x18e/0xa30 [ 367.203596][T13276] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.209873][T13276] ? fput+0x2a/0x50 [ 367.213728][T13276] __x64_sys_sendmmsg+0x99/0x100 [ 367.218707][T13276] ? syscall_enter_from_user_mode+0x1d/0x50 [ 367.224651][T13276] do_syscall_64+0x2d/0x70 [ 367.229103][T13276] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 367.235035][T13276] RIP: 0033:0x465ef9 [ 367.238950][T13276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 367.258609][T13276] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 367.267070][T13276] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 367.275068][T13276] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 367.283064][T13276] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 367.291067][T13276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:24 executing program 3: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x37ee7e0cb9710475) [ 367.299062][T13276] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f00000020c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x58, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010100}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x94}, 0x40) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f00000020c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:35:24 executing program 1 (fault-call:1 fault-nth:50): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:24 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11, 0x4, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:35:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x4028832, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f", 0x1}], 0x1) close(r2) 16:35:24 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000001880)='/proc/self\x00', 0x2240, 0x0) 16:35:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 367.625110][T13299] FAULT_INJECTION: forcing a failure. [ 367.625110][T13299] name failslab, interval 1, probability 0, space 0, times 0 [ 367.707537][T13299] CPU: 1 PID: 13299 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 367.716380][T13299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.726459][T13299] Call Trace: [ 367.729763][T13299] dump_stack+0xfa/0x151 [ 367.734040][T13299] should_fail.cold+0x5/0xa [ 367.738580][T13299] ? sctp_add_bind_addr+0x90/0x390 [ 367.743724][T13299] should_failslab+0x5/0x10 [ 367.748255][T13299] kmem_cache_alloc_trace+0x55/0x3a0 [ 367.753576][T13299] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 367.759335][T13299] sctp_add_bind_addr+0x90/0x390 [ 367.764309][T13299] sctp_copy_local_addr_list+0x33e/0x4e0 [ 367.769979][T13299] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 367.775126][T13299] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.781403][T13299] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 367.787332][T13299] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 367.793268][T13299] sctp_bind_addr_copy+0xde/0x460 [ 367.798340][T13299] sctp_connect_new_asoc+0x1cd/0x770 [ 367.803658][T13299] ? sctp_bind+0x110/0x110 [ 367.808117][T13299] ? __local_bh_enable_ip+0xa0/0x120 [ 367.809921][T13315] ptrace attach of "/root/syz-executor.0"[13313] was attempted by "/root/syz-executor.0"[13315] [ 367.813422][T13299] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.813459][T13299] ? security_sctp_bind_connect+0x8f/0xc0 [ 367.813493][T13299] sctp_sendmsg+0x13bc/0x1d30 [ 367.840529][T13299] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 367.845680][T13299] ? lock_is_held_type+0xd5/0x130 [ 367.850756][T13299] ? aa_af_perm+0x230/0x230 [ 367.855292][T13299] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.861575][T13299] inet_sendmsg+0x99/0xe0 [ 367.865930][T13299] ? inet_send_prepare+0x4d0/0x4d0 [ 367.870815][T13318] ptrace attach of "/root/syz-executor.0"[13317] was attempted by "/root/syz-executor.0"[13318] [ 367.871069][T13299] sock_sendmsg+0xcf/0x120 [ 367.885879][T13299] ____sys_sendmsg+0x331/0x810 [ 367.890676][T13299] ? kernel_sendmsg+0x50/0x50 [ 367.895382][T13299] ? do_recvmmsg+0x6d0/0x6d0 [ 367.900006][T13299] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 367.906028][T13299] ___sys_sendmsg+0xf3/0x170 [ 367.910653][T13299] ? sendmsg_copy_msghdr+0x160/0x160 [ 367.915971][T13299] ? __fget_files+0x266/0x3d0 [ 367.920673][T13299] ? lock_downgrade+0x6d0/0x6d0 [ 367.925575][T13299] ? __fget_files+0x288/0x3d0 [ 367.930290][T13299] ? __fget_light+0xea/0x280 [ 367.934908][T13299] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 367.942132][T13299] __sys_sendmmsg+0x195/0x470 [ 367.946851][T13299] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 367.951952][T13299] ? lock_downgrade+0x6d0/0x6d0 [ 367.956847][T13299] ? __mutex_unlock_slowpath+0xe2/0x610 [ 367.962427][T13299] ? lock_is_held_type+0xd5/0x130 [ 367.967490][T13299] ? wait_for_completion_io+0x270/0x270 [ 367.973079][T13299] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 367.979353][T13299] ? vfs_write+0x18e/0xa30 [ 367.983800][T13299] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 367.990073][T13299] ? fput+0x2a/0x50 [ 367.993925][T13299] __x64_sys_sendmmsg+0x99/0x100 [ 367.998891][T13299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 368.004816][T13299] do_syscall_64+0x2d/0x70 [ 368.009256][T13299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 368.015181][T13299] RIP: 0033:0x465ef9 [ 368.019091][T13299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 368.038725][T13299] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 368.047170][T13299] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 16:35:24 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 16:35:24 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = dup(r0) write$cgroup_freezer_state(r1, &(0x7f00000001c0)='THAWED\x00', 0x7) 16:35:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 368.055170][T13299] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 368.063164][T13299] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 368.071159][T13299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 368.079155][T13299] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:25 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) r1 = eventfd2(0x0, 0x0) dup3(r0, r1, 0x80000) 16:35:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) 16:35:25 executing program 1 (fault-call:1 fault-nth:51): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x4028832, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f", 0x1}], 0x1) close(r2) 16:35:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @local, @mcast2}}}}, 0x0) 16:35:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@security={'security\x00', 0xe, 0x4, 0x4f0, 0xffffffff, 0x0, 0x0, 0xe8, 0xffffffff, 0xffffffff, 0x470, 0x470, 0x470, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@mcast1, @private2, [], [], 'batadv0\x00', 'lo\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@loopback, @mcast1, [], [], 'macvtap0\x00', 'veth0_vlan\x00'}, 0x0, 0x228, 0x268, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@local, @private1, @mcast1, @loopback, @dev, @dev, @ipv4={[], [], @multicast2}, @local, @private1, @loopback, @dev, @empty, @private2, @private0, @ipv4={[], [], @dev}, @dev]}}, @common=@unspec=@nfacct={{0x48, 'nfacct\x00'}, {'syz0\x00'}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "d3f60a5e2bf90f2fdbbb3fe24badd9fa30280014b6db0048e8d9fe94d91a"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x550) 16:35:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = fanotify_init(0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = fcntl$dupfd(r4, 0x0, r5) syz_kvm_setup_cpu$x86(r6, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 368.421570][T13341] FAULT_INJECTION: forcing a failure. [ 368.421570][T13341] name failslab, interval 1, probability 0, space 0, times 0 [ 368.478898][T13341] CPU: 1 PID: 13341 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 368.487717][T13341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.497808][T13341] Call Trace: [ 368.501109][T13341] dump_stack+0xfa/0x151 [ 368.505390][T13341] should_fail.cold+0x5/0xa [ 368.509928][T13341] ? sctp_add_bind_addr+0x90/0x390 [ 368.515071][T13341] should_failslab+0x5/0x10 [ 368.519611][T13341] kmem_cache_alloc_trace+0x55/0x3a0 [ 368.524929][T13341] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 368.530697][T13341] sctp_add_bind_addr+0x90/0x390 [ 368.535676][T13341] sctp_copy_local_addr_list+0x33e/0x4e0 [ 368.541358][T13341] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 368.546507][T13341] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 368.552796][T13341] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 368.558729][T13341] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 368.564665][T13341] sctp_bind_addr_copy+0xde/0x460 [ 368.569746][T13341] sctp_connect_new_asoc+0x1cd/0x770 [ 368.575068][T13341] ? sctp_bind+0x110/0x110 [ 368.579521][T13341] ? __local_bh_enable_ip+0xa0/0x120 [ 368.584832][T13341] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 368.591105][T13341] ? security_sctp_bind_connect+0x8f/0xc0 [ 368.596857][T13341] sctp_sendmsg+0x13bc/0x1d30 [ 368.601573][T13341] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 368.606711][T13341] ? lock_is_held_type+0xd5/0x130 [ 368.611785][T13341] ? aa_af_perm+0x230/0x230 [ 368.616324][T13341] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 368.622600][T13341] inet_sendmsg+0x99/0xe0 [ 368.626955][T13341] ? inet_send_prepare+0x4d0/0x4d0 [ 368.632095][T13341] sock_sendmsg+0xcf/0x120 [ 368.636539][T13341] ____sys_sendmsg+0x331/0x810 [ 368.641328][T13341] ? kernel_sendmsg+0x50/0x50 [ 368.646045][T13341] ? do_recvmmsg+0x6d0/0x6d0 [ 368.650670][T13341] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 368.656690][T13341] ___sys_sendmsg+0xf3/0x170 [ 368.661312][T13341] ? sendmsg_copy_msghdr+0x160/0x160 [ 368.666635][T13341] ? __fget_files+0x266/0x3d0 [ 368.671341][T13341] ? lock_downgrade+0x6d0/0x6d0 [ 368.676239][T13341] ? __fget_files+0x288/0x3d0 [ 368.680952][T13341] ? __fget_light+0xea/0x280 [ 368.685577][T13341] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 368.691853][T13341] __sys_sendmmsg+0x195/0x470 [ 368.696565][T13341] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 368.701630][T13341] ? lock_downgrade+0x6d0/0x6d0 [ 368.706524][T13341] ? __mutex_unlock_slowpath+0xe2/0x610 [ 368.712100][T13341] ? lock_is_held_type+0xd5/0x130 [ 368.717154][T13341] ? wait_for_completion_io+0x270/0x270 [ 368.722738][T13341] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 368.729016][T13341] ? vfs_write+0x18e/0xa30 [ 368.733466][T13341] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 368.739740][T13341] ? fput+0x2a/0x50 [ 368.743591][T13341] __x64_sys_sendmmsg+0x99/0x100 [ 368.748558][T13341] ? syscall_enter_from_user_mode+0x1d/0x50 [ 368.754478][T13341] do_syscall_64+0x2d/0x70 [ 368.758919][T13341] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 368.764846][T13341] RIP: 0033:0x465ef9 [ 368.768756][T13341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 368.788389][T13341] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 368.796835][T13341] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 368.804830][T13341] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 368.812823][T13341] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 368.820821][T13341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:35:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x4028832, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f", 0x1}], 0x1) close(r2) 16:35:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:25 executing program 3: prctl$PR_GET_PDEATHSIG(0x59616d61, &(0x7f00000000c0)) [ 368.828819][T13341] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:26 executing program 1 (fault-call:1 fault-nth:52): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/225, 0x32, 0xe1, 0x1}, 0x20) 16:35:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_opts(r0, 0x29, 0x1a, 0x0, &(0x7f0000000480)) [ 369.189424][T13364] FAULT_INJECTION: forcing a failure. [ 369.189424][T13364] name failslab, interval 1, probability 0, space 0, times 0 [ 369.214059][T13364] CPU: 0 PID: 13364 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 369.222882][T13364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.232963][T13364] Call Trace: 16:35:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x4028832, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f", 0x1}], 0x1) close(r2) 16:35:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x7}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@rthdrdstopts={{0x18}}], 0x18}, 0x8000) [ 369.236265][T13364] dump_stack+0xfa/0x151 [ 369.240546][T13364] should_fail.cold+0x5/0xa [ 369.245081][T13364] ? sctp_add_bind_addr+0x90/0x390 [ 369.250221][T13364] should_failslab+0x5/0x10 [ 369.254754][T13364] kmem_cache_alloc_trace+0x55/0x3a0 [ 369.260063][T13364] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 369.265817][T13364] sctp_add_bind_addr+0x90/0x390 [ 369.270791][T13364] sctp_copy_local_addr_list+0x33e/0x4e0 [ 369.276462][T13364] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 369.281611][T13364] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 369.287884][T13364] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 369.293809][T13364] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 369.299741][T13364] sctp_bind_addr_copy+0xde/0x460 [ 369.304808][T13364] sctp_connect_new_asoc+0x1cd/0x770 [ 369.310127][T13364] ? sctp_bind+0x110/0x110 [ 369.314573][T13364] ? __local_bh_enable_ip+0xa0/0x120 [ 369.319882][T13364] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 369.326206][T13364] ? security_sctp_bind_connect+0x8f/0xc0 [ 369.331961][T13364] sctp_sendmsg+0x13bc/0x1d30 [ 369.336673][T13364] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 369.341810][T13364] ? lock_is_held_type+0xd5/0x130 [ 369.346880][T13364] ? aa_af_perm+0x230/0x230 [ 369.351419][T13364] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 369.357698][T13364] inet_sendmsg+0x99/0xe0 [ 369.362063][T13364] ? inet_send_prepare+0x4d0/0x4d0 [ 369.367203][T13364] sock_sendmsg+0xcf/0x120 [ 369.371652][T13364] ____sys_sendmsg+0x331/0x810 [ 369.376451][T13364] ? kernel_sendmsg+0x50/0x50 [ 369.381144][T13364] ? do_recvmmsg+0x6d0/0x6d0 [ 369.385792][T13364] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 369.391809][T13364] ___sys_sendmsg+0xf3/0x170 [ 369.396438][T13364] ? sendmsg_copy_msghdr+0x160/0x160 [ 369.401760][T13364] ? __fget_files+0x266/0x3d0 [ 369.406466][T13364] ? lock_downgrade+0x6d0/0x6d0 [ 369.411363][T13364] ? __fget_files+0x288/0x3d0 [ 369.416082][T13364] ? __fget_light+0xea/0x280 [ 369.420698][T13364] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 369.426967][T13364] __sys_sendmmsg+0x195/0x470 [ 369.431682][T13364] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 369.436737][T13364] ? lock_downgrade+0x6d0/0x6d0 [ 369.441629][T13364] ? __mutex_unlock_slowpath+0xe2/0x610 [ 369.447203][T13364] ? lock_is_held_type+0xd5/0x130 [ 369.452259][T13364] ? wait_for_completion_io+0x270/0x270 [ 369.457840][T13364] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 369.464114][T13364] ? vfs_write+0x18e/0xa30 [ 369.468567][T13364] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 369.474843][T13364] ? fput+0x2a/0x50 [ 369.478695][T13364] __x64_sys_sendmmsg+0x99/0x100 [ 369.483661][T13364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 369.489590][T13364] do_syscall_64+0x2d/0x70 [ 369.494038][T13364] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 369.499971][T13364] RIP: 0033:0x465ef9 [ 369.503882][T13364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.523519][T13364] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 369.531964][T13364] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 369.539964][T13364] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 369.547961][T13364] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 369.555950][T13364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 369.563927][T13364] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:26 executing program 1 (fault-call:1 fault-nth:53): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x8000000, 0x4) 16:35:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f0000000240)) 16:35:26 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) 16:35:26 executing program 2: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000180)) [ 369.844858][T13385] FAULT_INJECTION: forcing a failure. [ 369.844858][T13385] name failslab, interval 1, probability 0, space 0, times 0 [ 369.886360][T13385] CPU: 1 PID: 13385 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 369.895187][T13385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.905267][T13385] Call Trace: [ 369.908568][T13385] dump_stack+0xfa/0x151 [ 369.912849][T13385] should_fail.cold+0x5/0xa [ 369.917389][T13385] ? sctp_add_bind_addr+0x90/0x390 [ 369.922531][T13385] should_failslab+0x5/0x10 [ 369.927063][T13385] kmem_cache_alloc_trace+0x55/0x3a0 [ 369.932411][T13385] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 369.938170][T13385] sctp_add_bind_addr+0x90/0x390 [ 369.943146][T13385] sctp_copy_local_addr_list+0x33e/0x4e0 [ 369.948820][T13385] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 369.953968][T13385] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 369.960244][T13385] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 369.966190][T13385] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 369.972151][T13385] sctp_bind_addr_copy+0xde/0x460 [ 369.977220][T13385] sctp_connect_new_asoc+0x1cd/0x770 [ 369.982537][T13385] ? sctp_bind+0x110/0x110 [ 369.986984][T13385] ? __local_bh_enable_ip+0xa0/0x120 [ 369.992293][T13385] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 369.998566][T13385] ? security_sctp_bind_connect+0x8f/0xc0 [ 370.004318][T13385] sctp_sendmsg+0x13bc/0x1d30 [ 370.009034][T13385] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 370.014170][T13385] ? lock_is_held_type+0xd5/0x130 [ 370.019243][T13385] ? aa_af_perm+0x230/0x230 [ 370.023772][T13385] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.030047][T13385] inet_sendmsg+0x99/0xe0 [ 370.034402][T13385] ? inet_send_prepare+0x4d0/0x4d0 [ 370.039535][T13385] sock_sendmsg+0xcf/0x120 [ 370.043980][T13385] ____sys_sendmsg+0x331/0x810 [ 370.048788][T13385] ? kernel_sendmsg+0x50/0x50 [ 370.053485][T13385] ? do_recvmmsg+0x6d0/0x6d0 [ 370.058108][T13385] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 370.064127][T13385] ___sys_sendmsg+0xf3/0x170 [ 370.068748][T13385] ? sendmsg_copy_msghdr+0x160/0x160 [ 370.074068][T13385] ? __fget_files+0x266/0x3d0 [ 370.078767][T13385] ? lock_downgrade+0x6d0/0x6d0 [ 370.083657][T13385] ? __fget_files+0x288/0x3d0 [ 370.088367][T13385] ? __fget_light+0xea/0x280 [ 370.092979][T13385] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.099256][T13385] __sys_sendmmsg+0x195/0x470 [ 370.103969][T13385] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 370.109025][T13385] ? lock_downgrade+0x6d0/0x6d0 [ 370.113918][T13385] ? __mutex_unlock_slowpath+0xe2/0x610 [ 370.119501][T13385] ? lock_is_held_type+0xd5/0x130 [ 370.124559][T13385] ? wait_for_completion_io+0x270/0x270 [ 370.130312][T13385] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 370.136586][T13385] ? vfs_write+0x18e/0xa30 [ 370.141036][T13385] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.147316][T13385] ? fput+0x2a/0x50 [ 370.151175][T13385] __x64_sys_sendmmsg+0x99/0x100 [ 370.156151][T13385] ? syscall_enter_from_user_mode+0x1d/0x50 [ 370.162084][T13385] do_syscall_64+0x2d/0x70 [ 370.166533][T13385] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 370.172460][T13385] RIP: 0033:0x465ef9 [ 370.176376][T13385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 370.196013][T13385] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 370.204461][T13385] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 370.212466][T13385] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 370.220466][T13385] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 370.228464][T13385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 370.236461][T13385] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:27 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x400031, 0x4) 16:35:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x129, &(0x7f00000003c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000380)=""/225, 0x2a, 0xe1, 0x1}, 0x20) 16:35:27 executing program 1 (fault-call:1 fault-nth:54): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @private}}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000380)='h', 0x1}], 0x1}, 0x0) 16:35:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000001280), 0x4) 16:35:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00', 0xffffffffffffffff) 16:35:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @private1}}) [ 370.536527][T13408] FAULT_INJECTION: forcing a failure. [ 370.536527][T13408] name failslab, interval 1, probability 0, space 0, times 0 [ 370.563665][T13408] CPU: 0 PID: 13408 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 370.572497][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.582576][T13408] Call Trace: [ 370.585873][T13408] dump_stack+0xfa/0x151 [ 370.590151][T13408] should_fail.cold+0x5/0xa [ 370.594687][T13408] ? sctp_add_bind_addr+0x90/0x390 [ 370.599834][T13408] should_failslab+0x5/0x10 [ 370.604368][T13408] kmem_cache_alloc_trace+0x55/0x3a0 [ 370.609682][T13408] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 370.615439][T13408] sctp_add_bind_addr+0x90/0x390 [ 370.620418][T13408] sctp_copy_local_addr_list+0x33e/0x4e0 [ 370.626089][T13408] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 370.631234][T13408] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.637507][T13408] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 370.643430][T13408] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 370.649361][T13408] sctp_bind_addr_copy+0xde/0x460 [ 370.654432][T13408] sctp_connect_new_asoc+0x1cd/0x770 [ 370.659748][T13408] ? sctp_bind+0x110/0x110 [ 370.664200][T13408] ? __local_bh_enable_ip+0xa0/0x120 [ 370.669510][T13408] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 370.675783][T13408] ? security_sctp_bind_connect+0x8f/0xc0 [ 370.681534][T13408] sctp_sendmsg+0x13bc/0x1d30 [ 370.686247][T13408] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 370.691380][T13408] ? lock_is_held_type+0xd5/0x130 [ 370.696451][T13408] ? aa_af_perm+0x230/0x230 [ 370.700984][T13408] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.707256][T13408] inet_sendmsg+0x99/0xe0 [ 370.711609][T13408] ? inet_send_prepare+0x4d0/0x4d0 [ 370.716739][T13408] sock_sendmsg+0xcf/0x120 [ 370.721192][T13408] ____sys_sendmsg+0x331/0x810 [ 370.725985][T13408] ? kernel_sendmsg+0x50/0x50 [ 370.730687][T13408] ? do_recvmmsg+0x6d0/0x6d0 [ 370.735311][T13408] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 370.741326][T13408] ___sys_sendmsg+0xf3/0x170 [ 370.745944][T13408] ? sendmsg_copy_msghdr+0x160/0x160 [ 370.751257][T13408] ? __fget_files+0x266/0x3d0 [ 370.756039][T13408] ? lock_downgrade+0x6d0/0x6d0 [ 370.760929][T13408] ? __fget_files+0x288/0x3d0 [ 370.765638][T13408] ? __fget_light+0xea/0x280 [ 370.770249][T13408] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 370.776524][T13408] __sys_sendmmsg+0x195/0x470 [ 370.781270][T13408] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 370.786323][T13408] ? lock_downgrade+0x6d0/0x6d0 [ 370.791214][T13408] ? __mutex_unlock_slowpath+0xe2/0x610 [ 370.796788][T13408] ? lock_is_held_type+0xd5/0x130 [ 370.801840][T13408] ? wait_for_completion_io+0x270/0x270 [ 370.807412][T13408] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 370.813682][T13408] ? vfs_write+0x18e/0xa30 [ 370.818133][T13408] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 370.824407][T13408] ? fput+0x2a/0x50 [ 370.828253][T13408] __x64_sys_sendmmsg+0x99/0x100 [ 370.833218][T13408] ? syscall_enter_from_user_mode+0x1d/0x50 [ 370.839143][T13408] do_syscall_64+0x2d/0x70 [ 370.843586][T13408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 370.849505][T13408] RIP: 0033:0x465ef9 [ 370.853417][T13408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 370.873049][T13408] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 370.881498][T13408] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 370.889577][T13408] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 370.897563][T13408] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 370.905550][T13408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 370.913578][T13408] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:28 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0xfffffffffffffd51) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) 16:35:28 executing program 1 (fault-call:1 fault-nth:55): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, 0x0, 0x800) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000640)={&(0x7f00000005c0), 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x24008041}, 0x4000) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x5, 0xff, 0x4, 0x9, 0x0, 0x1, 0xb0040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40, 0xd94f, 0xc8, 0x0, 0x75, 0x8c61}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x1, 0x0) 16:35:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@empty, @mcast2, @private0, 0x0, 0x0, 0x8001}) 16:35:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 371.211246][T13427] FAULT_INJECTION: forcing a failure. [ 371.211246][T13427] name failslab, interval 1, probability 0, space 0, times 0 [ 371.244990][T13427] CPU: 0 PID: 13427 Comm: syz-executor.1 Not tainted 5.12.0-rc1-syzkaller #0 [ 371.253916][T13427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.263994][T13427] Call Trace: [ 371.267299][T13427] dump_stack+0xfa/0x151 [ 371.271579][T13427] should_fail.cold+0x5/0xa [ 371.276116][T13427] ? sctp_add_bind_addr+0x90/0x390 [ 371.281256][T13427] should_failslab+0x5/0x10 [ 371.285786][T13427] kmem_cache_alloc_trace+0x55/0x3a0 [ 371.291097][T13427] ? __sanitizer_cov_trace_cmp2+0x22/0x80 [ 371.296862][T13427] sctp_add_bind_addr+0x90/0x390 [ 371.301842][T13427] sctp_copy_local_addr_list+0x33e/0x4e0 [ 371.307512][T13427] ? sctp_v4_get_dst+0x11c0/0x11c0 [ 371.312664][T13427] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 371.318943][T13427] ? sctp_auth_asoc_copy_shkeys+0x29d/0x350 [ 371.324874][T13427] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 371.330801][T13427] sctp_bind_addr_copy+0xde/0x460 [ 371.335871][T13427] sctp_connect_new_asoc+0x1cd/0x770 [ 371.341192][T13427] ? sctp_bind+0x110/0x110 [ 371.345644][T13427] ? __local_bh_enable_ip+0xa0/0x120 [ 371.350965][T13427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 371.357236][T13427] ? security_sctp_bind_connect+0x8f/0xc0 [ 371.362995][T13427] sctp_sendmsg+0x13bc/0x1d30 [ 371.367715][T13427] ? sctp_setsockopt+0x9bf0/0x9bf0 [ 371.372858][T13427] ? lock_is_held_type+0xd5/0x130 [ 371.377932][T13427] ? aa_af_perm+0x230/0x230 [ 371.382492][T13427] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 371.388770][T13427] inet_sendmsg+0x99/0xe0 [ 371.393128][T13427] ? inet_send_prepare+0x4d0/0x4d0 [ 371.398266][T13427] sock_sendmsg+0xcf/0x120 [ 371.402711][T13427] ____sys_sendmsg+0x331/0x810 [ 371.407507][T13427] ? kernel_sendmsg+0x50/0x50 [ 371.412202][T13427] ? do_recvmmsg+0x6d0/0x6d0 [ 371.416821][T13427] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 371.422834][T13427] ___sys_sendmsg+0xf3/0x170 [ 371.427447][T13427] ? sendmsg_copy_msghdr+0x160/0x160 [ 371.432767][T13427] ? __fget_files+0x266/0x3d0 [ 371.437470][T13427] ? lock_downgrade+0x6d0/0x6d0 [ 371.442381][T13427] ? __fget_files+0x288/0x3d0 [ 371.447091][T13427] ? __fget_light+0xea/0x280 [ 371.451715][T13427] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 371.457992][T13427] __sys_sendmmsg+0x195/0x470 [ 371.462698][T13427] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 371.467766][T13427] ? lock_downgrade+0x6d0/0x6d0 [ 371.472693][T13427] ? __mutex_unlock_slowpath+0xe2/0x610 [ 371.478277][T13427] ? lock_is_held_type+0xd5/0x130 [ 371.483338][T13427] ? wait_for_completion_io+0x270/0x270 [ 371.488915][T13427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 371.495179][T13427] ? vfs_write+0x18e/0xa30 [ 371.499618][T13427] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 371.505887][T13427] ? fput+0x2a/0x50 [ 371.509741][T13427] __x64_sys_sendmmsg+0x99/0x100 [ 371.514701][T13427] ? syscall_enter_from_user_mode+0x1d/0x50 [ 371.520620][T13427] do_syscall_64+0x2d/0x70 [ 371.525087][T13427] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 371.531010][T13427] RIP: 0033:0x465ef9 [ 371.534920][T13427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 371.554547][T13427] RSP: 002b:00007fc181dfd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 16:35:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) dup(0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) syz_emit_ethernet(0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x418, 0x220, 0x110, 0x0, 0x330, 0x330, 0x330, 0x4, &(0x7f0000000180), {[{{@arp={@remote, @local, 0x0, 0x0, 0x0, 0x7, {@mac=@multicast}, {@empty, {[0x0, 0x0, 0x0, 0xff, 0xff]}}, 0x800, 0x0, 0x8, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'nr0\x00', {}, {}, 0x0, 0x2}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x42}, @remote, 0x1, 0x7ffffffe}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@broadcast, @broadcast, @dev, 0x8}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="301ae60686b5", @rand_addr, @broadcast, 0xf}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x468) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) [ 371.562994][T13427] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 371.570986][T13427] RDX: 0000000000000001 RSI: 0000000020005640 RDI: 0000000000000003 [ 371.578978][T13427] RBP: 00007fc181dfd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 371.586975][T13427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 371.594970][T13427] R13: 0000000000a9fb1f R14: 00007fc181dfd300 R15: 0000000000022000 16:35:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 372.129956][ T133] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 16:35:29 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, &(0x7f0000000200)=""/4096, 0x1000) [ 372.182897][ T133] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 372.194322][T13445] x_tables: duplicate underflow at hook 1 16:35:29 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r0, 0x0, 0x0) 16:35:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x3, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, 0x0, 0x800) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000640)={&(0x7f00000005c0), 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x24008041}, 0x4000) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x5, 0xff, 0x4, 0x9, 0x0, 0x1, 0xb0040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40, 0xd94f, 0xc8, 0x0, 0x75, 0x8c61}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x1, 0x0) 16:35:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) 16:35:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, 0x0, 0x800) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000640)={&(0x7f00000005c0), 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x24008041}, 0x4000) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x5, 0xff, 0x4, 0x9, 0x0, 0x1, 0xb0040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40, 0xd94f, 0xc8, 0x0, 0x75, 0x8c61}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x1, 0x0) 16:35:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, 0x0, 0x800) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00', 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000640)={&(0x7f00000005c0), 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x24008041}, 0x4000) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$batadv(0x0, r0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x5, 0xff, 0x4, 0x9, 0x0, 0x1, 0xb0040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x40, 0xd94f, 0xc8, 0x0, 0x75, 0x8c61}, 0x0, 0x4, 0xffffffffffffffff, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, 0x0) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid=[0x4], 0x1, 0x0) 16:35:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x4, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 372.528041][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 16:35:29 executing program 2: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300), 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, 0x0) clone(0x20000, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)="d009b60a401f37abff025db753cad6962a56c4ff1bafcb5bc869bcd5aa0669e770dd3b25fe3fcf5e0da172c34ac9342383bdc5421122eb8259983b699b56e96ecce16580a39eddf90216d4d1324a7ce325ab609c14e1ab7d87ce3827402757d5ccda0eb116c220c9e1070445d1c903091aea28e5fdbca120dff58a69e3b20905d7faa31a5367283c780f6d96b202ad98ba7c9ce756064e6ac8daaff456c2dda2ba55c1ad98cedc6b83cc") [ 372.574979][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 372.649288][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 372.670662][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 372.694029][ T276] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 372.711299][ T276] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 16:35:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:32 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 16:35:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x5, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x84, @multicast2, 0x0, 0x0, 'wlc\x00', 0x0, 0x8, 0x69}, 0x2c) 16:35:32 executing program 5: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000500)) 16:35:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)={0x4c, r2, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_UDP_DPORT={0x6}]}, 0x4c}}, 0x0) 16:35:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f8020000140001002cbd7000cbae00000a010102000000000000000000000000ffffffff0000000000000000000000004e2100004e23032f0a00a0"], 0x2f8}}, 0x0) 16:35:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x6, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:35:32 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000002ac0)="c2", 0x1) [ 375.253644][ T8101] Bluetooth: hci0: command 0x0406 tx timeout [ 375.261153][ T8101] Bluetooth: hci1: command 0x0406 tx timeout [ 375.292479][ T8101] Bluetooth: hci3: command 0x0406 tx timeout 16:35:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x6f696292}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000083c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x1c, 0x0}}, {{&(0x7f0000000180)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c, 0x0}}], 0x2, 0x0) [ 375.322695][T13496] netlink: 680 bytes leftover after parsing attributes in process `syz-executor.3'. [ 375.337463][ T8101] Bluetooth: hci2: command 0x0406 tx timeout 16:35:32 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080)=0x9, 0x4) 16:35:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:35:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x7, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x79}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x4, 0x0, 0x0, @sint}]}) 16:35:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1f) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8902, &(0x7f0000000180)={0x2, 'vlan0\x00'}) 16:35:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1f) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) 16:35:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x79}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x2, 0x0, @sint}]}) [ 378.303727][ T3267] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.310086][ T3267] ieee802154 phy1 wpan1: encryption failed: -22 16:35:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000083c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2}, 0x1b, 0x0}}, {{&(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0}}], 0x2, 0x0) 16:35:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x79}) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)={0x1, 0x0, [{0x0, 0x0, 0x2, 0x0, @sint}]}) [ 378.456047][T13535] general protection fault, probably for non-canonical address 0xdffffc0000000028: 0000 [#1] PREEMPT SMP KASAN [ 378.467808][T13535] KASAN: null-ptr-deref in range [0x0000000000000140-0x0000000000000147] [ 378.476227][T13535] CPU: 0 PID: 13535 Comm: syz-executor.5 Not tainted 5.12.0-rc1-syzkaller #0 [ 378.485008][T13535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.495073][T13535] RIP: 0010:kvm_hv_irq_routing_update+0x230/0x460 [ 378.501575][T13535] Code: 80 19 00 00 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 ff 01 00 00 4d 8b ad 80 19 00 00 49 8d bd 40 01 00 00 48 89 f8 48 c1 e8 03 <0f> b6 04 28 84 c0 74 06 0f 8e d2 01 00 00 45 0f b6 bd 40 01 00 00 [ 378.521287][T13535] RSP: 0018:ffffc90002b27ac0 EFLAGS: 00010206 [ 378.527369][T13535] RAX: 0000000000000028 RBX: ffff888018cc7d80 RCX: ffffc90013b13000 [ 378.535352][T13535] RDX: 0000000000040000 RSI: ffffffff81174f63 RDI: 0000000000000140 [ 378.543335][T13535] RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffc90002b359eb 16:35:35 executing program 4: sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003ac0)={0x18, 0x2, &(0x7f0000003780)=@raw=[@initr0], &(0x7f00000037c0)='GPL\x00', 0x157f, 0xc3, &(0x7f0000003800)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:35:35 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1f) setsockopt$inet6_int(r0, 0x29, 0x1f, &(0x7f0000000000)=0x7fff, 0x4) 16:35:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x8, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 378.551320][T13535] R10: ffffffff8117115e R11: 0000000000000000 R12: 0000000000000000 [ 378.559311][T13535] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 378.567293][T13535] FS: 00007f6f907a2700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 378.576845][T13535] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 378.583442][T13535] CR2: 0000001b32d25000 CR3: 0000000025283000 CR4: 00000000001526f0 [ 378.591425][T13535] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 378.599411][T13535] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 378.607392][T13535] Call Trace: [ 378.610677][T13535] kvm_set_irq_routing+0x69b/0x940 [ 378.615873][T13535] kvm_vm_ioctl+0x12d0/0x2800 [ 378.620569][T13535] ? tomoyo_path_number_perm+0x204/0x590 [ 378.626275][T13535] ? lock_downgrade+0x6d0/0x6d0 [ 378.631143][T13535] ? kvm_unregister_device_ops+0x90/0x90 [ 378.636787][T13535] ? tomoyo_path_number_perm+0x441/0x590 [ 378.642443][T13535] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 378.648704][T13535] ? tomoyo_path_number_perm+0x24e/0x590 16:35:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 378.654358][T13535] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 378.660187][T13535] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 378.666101][T13535] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 378.672361][T13535] ? do_vfs_ioctl+0x27d/0x1090 [ 378.677189][T13535] ? generic_block_fiemap+0x60/0x60 [ 378.682403][T13535] ? lock_downgrade+0x6d0/0x6d0 [ 378.687273][T13535] ? __fget_files+0x288/0x3d0 [ 378.691967][T13535] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 378.698224][T13535] ? kvm_unregister_device_ops+0x90/0x90 [ 378.703876][T13535] __x64_sys_ioctl+0x193/0x200 [ 378.708659][T13535] do_syscall_64+0x2d/0x70 [ 378.713118][T13535] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 378.719033][T13535] RIP: 0033:0x465ef9 [ 378.722931][T13535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.742555][T13535] RSP: 002b:00007f6f907a2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 378.750985][T13535] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 378.758969][T13535] RDX: 0000000020000100 RSI: 000000004008ae6a RDI: 0000000000000004 [ 378.766952][T13535] RBP: 00000000004bcd1c R08: 0000000000000000 R09: 0000000000000000 [ 378.774938][T13535] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 378.782919][T13535] R13: 0000000000a9fb1f R14: 00007f6f907a2300 R15: 0000000000022000 [ 378.790907][T13535] Modules linked in: [ 378.831275][T13535] ---[ end trace b56070a33917e022 ]--- [ 378.843911][T13535] RIP: 0010:kvm_hv_irq_routing_update+0x230/0x460 [ 378.850530][T13535] Code: 80 19 00 00 48 89 f8 48 c1 e8 03 80 3c 28 00 0f 85 ff 01 00 00 4d 8b ad 80 19 00 00 49 8d bd 40 01 00 00 48 89 f8 48 c1 e8 03 <0f> b6 04 28 84 c0 74 06 0f 8e d2 01 00 00 45 0f b6 bd 40 01 00 00 16:35:35 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000005640)=[{&(0x7f0000000000)=@in={0x9, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000021c0)=[{&(0x7f0000000080)="13", 0x1}], 0x1, &(0x7f0000002200)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) 16:35:36 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1f) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x24, 0x0, 0x0) [ 378.997707][T13535] RSP: 0018:ffffc90002b27ac0 EFLAGS: 00010206 [ 379.033290][T13535] RAX: 0000000000000028 RBX: ffff888018cc7d80 RCX: ffffc90013b13000 [ 379.046666][T13535] RDX: 0000000000040000 RSI: ffffffff81174f63 RDI: 0000000000000140 [ 379.057280][T13535] RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffc90002b359eb [ 379.078573][T13535] R10: ffffffff8117115e R11: 0000000000000000 R12: 0000000000000000 [ 379.087441][T13535] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 379.098931][T13535] FS: 00007f6f907a2700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 379.124065][T13535] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 379.137077][T13535] CR2: 00007f24c0527000 CR3: 0000000025283000 CR4: 00000000001526f0 [ 379.149143][T13535] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 379.157490][T13535] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 379.167616][T13535] Kernel panic - not syncing: Fatal exception [ 379.174328][T13535] Kernel Offset: disabled [ 379.178650][T13535] Rebooting in 86400 seconds..