00000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:44:59 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x8f04, 'nq\x00'}, 0x2c) 08:44:59 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:44:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:44:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000020000000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 799.257670] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 799.287306] IPVS: ftp: loaded support on port[0] = 21 08:44:59 executing program 0: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, @loopback}, &(0x7f0000000080)=0x10) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000000c0)={0x1, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x1, 'nq\x00', 0x2d, 0x1, 0x48}, 0x2c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(generic-gcm-aesni)\x00'}, 0x58) 08:44:59 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:44:59 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x4c00, 'nq\x00'}, 0x2c) 08:44:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 799.448760] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 799.571819] IPVS: ftp: loaded support on port[0] = 21 08:44:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xd2]}}, 0x1c) 08:44:59 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:44:59 executing program 7: getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2}]}, &(0x7f00000001c0)=0x10) 08:44:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000001000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:44:59 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x200000000000000, 'nq\x00'}, 0x2c) 08:44:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x900], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:44:59 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filterz\x00'}, &(0x7f0000000140)=0x44) 08:44:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x20, 0x8, 0x0, 0x1}, 0x2c) close(r0) close(r0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000000)=@req) 08:45:00 executing program 7: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572290200"}, &(0x7f0000000140)=0x44) [ 799.688686] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000034000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x6300000000000000, 'nq\x00'}, 0x2c) 08:45:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x4002000000000000]}}, 0x1c) 08:45:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000002006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 799.843352] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 799.862272] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x3000000, 'nq\x00'}, 0x2c) 08:45:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x48000000, 'nq\x00'}, 0x2c) [ 799.978757] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000020006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x8000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 800.064482] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:01 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000000600"}, &(0x7f0000000140)=0x44) 08:45:01 executing program 0: socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000140)) socketpair(0xf, 0x100007, 0x20000004, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000040)=0x101, 0x4) bind$inet6(r1, &(0x7f00001fefe4)={0xa}, 0x1c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)) listen(r1, 0x0) 08:45:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xd200000000000000]}}, 0x1c) 08:45:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000001006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x100000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:01 executing program 7: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572290200"}, &(0x7f0000000140)=0x44) 08:45:01 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x900, 'nq\x00'}, 0x2c) [ 800.947903] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 800.970926] IPVS: ftp: loaded support on port[0] = 21 [ 800.987734] IPVS: ftp: loaded support on port[0] = 21 08:45:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000400300006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 800.997582] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:01 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x4800, 'nq\x00'}, 0x2c) 08:45:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000640)=@assoc_value={0x0, 0x5}, &(0x7f0000000680)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000001b40)=[{&(0x7f0000000780)=@in={0x2, 0x4e24}, 0x10, &(0x7f0000001a80)=[{&(0x7f00000007c0)="ba9bfb5250d01a6588c1cc5da8fc149ee854c129f1eb840320c3cad30e931e7243b1f827cbb9d6c07e9e8e3fa7", 0x2d}, {&(0x7f0000000800)="01d5103ca053fe7274f9829ece198f7d2656abce4542169f4ff4676fb8fd76f425fed969657e707bee3115d4238eeeb8", 0x30}, {&(0x7f0000000840)="50f2c63e8de7813cdd5f13633c56e73a0d53f5d90ff85641d95ad43c4c70802445405547c49efed5de0bac69048fb9df01188e9e73c1d5324eb5b8c3b1f93468808aa5efeeda75592d24d05a3317907e896f14d5dcc217baed6a8d92d6370725377e6dfda65a87f04b0925", 0x6b}, {&(0x7f00000008c0)="d5e7de92685c7c6f76218d68a4f808aadf10e9b5463c45055762bfe85f30600a0fd4d4868b3e07dc27e6df1eb0d9bb5f362afacab69d7a6e984909336c387cd243485a0dbeefc49d7a7c8e0ce74a6994eea26b731343e70daf43617b530063df85bfc6eaba4ec2586c1484bb543cb10f30022b51789098d10fac65864ca091e0bd76d70280839c5c8ba775941e75f4788695c4c2aa", 0x95}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="f0d5c51cfce08c923e12bbb6000e49180a", 0x11}, {&(0x7f00000019c0)="57000ab224522277573f5eb326f3329ef29835c7e2554e8c9634e9a3429ddb89529aa6f6d2eb780f0f4a6128d34b23037bf414dc54ef69fba04bedf0efacc0c02cde401dea32a9e2a275ef651ab2991f717ac314ece721acfc0b7f1c3b6ee216ae05e11445ae348414131b17738493f0494fdad400cbbbb48a3be4bdc3cf40f9a0a1b1b04dbfc25152492efdb8d3eeef906b42723285c90e0bc8f2593cbab21bff247a38", 0xa4}], 0x7, &(0x7f0000001b00)=[@init={0x18, 0x84, 0x0, {0x2, 0xd2, 0x0, 0x2}}], 0x18, 0x4}], 0x1, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0xfffffffffffffef0) 08:45:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000004000000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 801.171114] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 801.312554] IPVS: ftp: loaded support on port[0] = 21 08:45:01 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003fd00"}, &(0x7f0000000140)=0x44) 08:45:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x1000000]}}, 0x1c) 08:45:01 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000480)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl(r2, 0x8912, &(0x7f0000000140)="0047fc2f07d82c99240970") r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00006dbffc)=0x1, 0x4) bind$inet(r3, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/213, 0xd5}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/181, 0xb5}, {&(0x7f00000025c0)=""/179, 0xb3}], 0x7, &(0x7f0000002680)=""/206, 0xce, 0x9}, 0x40000000) sendto$inet(r3, &(0x7f0000f7db7f), 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmsg(r3, &(0x7f00000004c0)={&(0x7f0000000280)=@can, 0x4c, &(0x7f00000003c0)=[{&(0x7f0000000380)=""/50}], 0x0, &(0x7f0000000480)=""/2, 0xfffffffffffffee9}, 0x0) r4 = gettid() ioctl$sock_FIOSETOWN(r0, 0xc0189436, &(0x7f0000000180)=r4) 08:45:01 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x4c, 'nq\x00'}, 0x2c) 08:45:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000007fffffff006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:01 executing program 7: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000440)={0xffffffffffffffff}) r1 = accept4$inet(r0, &(0x7f0000000480), &(0x7f00000004c0)=0x10, 0x80800) r2 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) syz_emit_ethernet(0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="0000ddffffffffffffff00000000aa89c98b1024e04ff8c26169cad4a58b6bb8ed6da9535ae80aa90fa08d142069740645b4fa63e40b92584963dbace19e4dc970bb7579588bbb2e732387eccd405645fc7475fe82ad489c37628c3ac80d3fa5db"], &(0x7f0000000000)) write$binfmt_elf32(r2, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x5f3) vmsplice(r2, &(0x7f0000000400)=[{&(0x7f0000000100)="cb5d6e07699cbf031c025356d7b3", 0xe}, {&(0x7f0000000140)="d5b3a00d92145f6121944b83f3b681366f9f0366acafe25a4a5b98de51d49c3058b7a9ccf71f22f771d2977fe9777e831986f382f4cb4afa704b00a68222900e7e95ebb28f5958d65a65a8ee9c1e9ec7b186917004d4ad3d2f5941ddeb6a06f0b1994b50b925c9c7f3200dd7d38faa5c915ed8863a65204fbc8347a91741e7b3cacf771cdcdf6925eb8cbc8ef1a47ad7b31705ad1189ad589b3dd0b5d7aeaaf0d25c308ffe65c6418220a715080b8ac5718cbaa5ba1255c941816e44e808ba1d9ec7631ac72b368f333ea748e3f3e42d5de75e908492d27b49c5c1f7acd22d3eb4303e70da3946", 0xe7}, {&(0x7f0000000280)="52daebc72d1d38195ea4c9b498e1ef839e47cdc9879972abcbb774f709fc0f50ff315059dc2d10235cb6176bc2a5bb8f20020a8b010abcc9a36c54c6860b529f95e9dcad19c23c13bf9dd3207efa932f507f65ddfd41f9f30d57701200780ed1ea6f33cce02eb89f6748b0192e19835708b3d2041ba0cfabafbe3a0daa23a5f10218eb1ad7d726863e71a104f5222206e74e56e133214482d3fc642b59ad8d5810159742b5ba4f45ca6f0108473e2c98e868c46a99894ed778812cc86eb929547cb4c4bd46b2fb9febb3ca1dfc4ba4b6eadd92e5482a6cbd52be9d3be22585b6018e051cfb", 0xe5}, {&(0x7f0000000380)="725d9f5f47f5175886eff0ebe263e832226e062499485507c636b18810c9e0c95174298016b8eb5c5f400e4c7f2e292c119c4f1d3e4d1e3de5e097b0ddb08a8b6e5fde943a3594c369d664691800973860b6388c64cde34aae8a13bf24fc45d10aee90b0d03db7d3fa6d0d996cbcceebe434bc7f53", 0x75}], 0x4, 0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}}, &(0x7f0000000600)=0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000640)=r4, 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000500)) 08:45:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 801.499106] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 801.517148] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000004006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:01 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x7400000000000000, 'nq\x00'}, 0x2c) 08:45:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x1e) getpeername(r0, &(0x7f0000000040)=@alg, &(0x7f00000000c0)=0x80) bpf$MAP_CREATE(0xd, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9}, 0x14) [ 801.573601] IPVS: ftp: loaded support on port[0] = 21 08:45:02 executing program 7: r0 = socket(0x11, 0x4000000000080002, 0xffffffffffff0000) sendmmsg(0xffffffffffffffff, &(0x7f0000004bc0)=[{{&(0x7f0000000580)=@in={0x2}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000880)="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", 0xa42}], 0x1, &(0x7f0000001a40)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x34a7974f4f8d86f, &(0x7f0000000300), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000010000000800000005e208603bd568e9860176ace9839559a02ec3376395ebd16fbba7c3657556c1b12290a4bcca95d8f9035c31e209feaba64604ae1045ea797c3eb11a02e4427de2905c3a9c49281b17ae46a0f14597ec8936bbbab2e6ddf96e7d0755175809f41bb9cc39052f94175fbe532480b897ce2808000000000000fd2df51fbf47bd1f37482c0f6f81c0068c40621209ca25141aa3e443d492513bf901485f6bea167a9c26d459d4c689f4e74a89d170458c39425dca0ae1559443759a24130900000057e09d6b341f5b1aac17a793421bb3db0000000000000000bdd8010000ffffff7f42e6ba00000000000000000000000000000000e8b7599dd84c21253181b0585a993b5f8275b1ed776a7dec541ace614d58417cfe0d4086f231c29cd7c94bb7f2fc00ab452f506425e3e105743f0f63c1f89289721a8c6d2bc97524d572e4dc3420d803f0b505849aa63bbe36721e22f57ca96d9fd44017b7a211415ecd4b2bf9ac8d9abb4b0d"]}}, {{&(0x7f0000000100)=@nfc={0x27, 0x9}, 0x4b8, &(0x7f0000000e40), 0x1000000000000059, &(0x7f00000012c0), 0x302}}], 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000000)=0x54) [ 801.658666] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000200000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 801.908189] IPVS: ftp: loaded support on port[0] = 21 08:45:02 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465721d00"}, &(0x7f0000000140)=0x44) 08:45:02 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x400000000000000, 'nq\x00'}, 0x2c) 08:45:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f0000000100)={@local, @multicast2}, &(0x7f0000000140)=0xc) 08:45:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xd2000000]}}, 0x1c) 08:45:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)={0x303, 0x33}, 0x28) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000140)=0x5, 0xffffffffffffff46) 08:45:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000010000000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 802.012407] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 802.027482] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f0000000100)={@local, @multicast2}, &(0x7f0000000140)=0xc) 08:45:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000002000000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 802.081730] IPVS: ftp: loaded support on port[0] = 21 08:45:02 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x2000000000000000, 'nq\x00'}, 0x2c) 08:45:02 executing program 0: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003fd00"}, &(0x7f0000000140)=0x44) 08:45:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 802.217580] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 802.238728] IPVS: ftp: loaded support on port[0] = 21 [ 802.373679] IPVS: ftp: loaded support on port[0] = 21 08:45:02 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572f60300"}, &(0x7f0000000140)=0x44) 08:45:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f0000000100)={@local, @multicast2}, &(0x7f0000000140)=0xc) 08:45:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xfec0]}}, 0x1c) 08:45:02 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x1000000, 'nq\x00'}, 0x2c) 08:45:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000340006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:02 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet(0x2, 0x3, 0x2) ioctl$sock_netdev_private(r1, 0x89fb, &(0x7f0000000080)="dc2c2b97d52a42511a2df975cefe8994b91e43454adf6dfec086a096df578d539210f327932246310eee36a2374e8ee25eaa7015c15372993bb65ba66623513857af1df288e22b3a049ab76d061a292c7705770e6b2d2d50b6f2f941f6bd038f285347395008f9c7faf475ecac8e7659f2825455b2cd82f0") getsockopt(r1, 0x0, 0xd0, &(0x7f00000002c0)=""/203, &(0x7f0000000040)=0xffffffffffffff32) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={r2, r3, r4}, 0xc) 08:45:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f0000000100)={@local, @multicast2}, &(0x7f0000000140)=0xc) [ 802.566681] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000007fffffff6000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000100)={0x3, 0x10000, 0x5}, 0xc) r1 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r1, &(0x7f000001bff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x1}, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000080)={@ipv4={[], [], @loopback}}, &(0x7f00000000c0)=0x14) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000024fb8)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 08:45:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x300]}}, 0x1c) [ 802.650358] IPVS: ftp: loaded support on port[0] = 21 08:45:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x6800000000000000, 'nq\x00'}, 0x2c) 08:45:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000206000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 802.733984] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 802.823287] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 802.952428] IPVS: ftp: loaded support on port[0] = 21 08:45:03 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657203fd00"}, &(0x7f0000000140)=0x44) 08:45:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)) 08:45:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000016000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:03 executing program 0: unshare(0x2000400) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") ioctl$sock_bt(r1, 0x541b, &(0x7f0000000080)="6e94a75139eff803086e79073579b5650cdea18f9ff5887811d6f0ebdb724c81b54f9e2a11c2962c3c0c5765e50dd936f090e695cfeed635f5766d4f70cc0d5c3cbaac50e137e31434e015d42d2d134031962feb7d792ec83d04fa6645b181b0b6b5a9ce7391b5674fed2a1f5747b2114128046fdd1f66234925374499107c098e472a9e977fe6f0413d9e13a63d013c20ca97365ee755") connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x4}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x11, &(0x7f0000000000)=0xffffffa4, 0x4) 08:45:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x7a00000000000000, 'nq\x00'}, 0x2c) 08:45:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x6]}}, 0x1c) [ 803.060479] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000100000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@dstopts, 0x8) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000001c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000080)={r0, r0, 0x7, 0x1000, &(0x7f0000000000)="e75756234ed662dfc99f43a7fcadd247c570619dd347a8d067e0121ba2e1d12a6d5962d08d4822e5439cb35d72", 0x6, 0x20, 0x800, 0x2, 0x6, 0x100000001, 0x80, "733b4c4dc74842c908e230e8c92fe1a114b8ea9db838ebf027014812b0013868524fa495caeabb71951558c5c425f8290498da1794186c9352deb2b678b65b69c7f786547e4afad08a4158a4a1675474fd35a59dee5507cced115a351b3884c8e93fc05d0b014f68bf412f80a11681f87eed2aed6e539b450761b83e761ead12979a10c3ac8a6fe977ede4b1c7dd34f2fdca55ce30bebfc9802e87f9fc434b61498fa208383d8dd797119be30d4bbb1c238acb094ef93f85b042d84542e4545d714d7a4d6757d80b71d44c64c44106661ea06370fb18a1301b146adcc6a05906f147e73aa539994e"}) [ 803.104448] IPVS: ftp: loaded support on port[0] = 21 08:45:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xeffe]}}, 0x1c) 08:45:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x4c000000, 'nq\x00'}, 0x2c) 08:45:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) pipe(&(0x7f00000000c0)) [ 803.270931] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 803.429818] IPVS: ftp: loaded support on port[0] = 21 08:45:03 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657203ec00"}, &(0x7f0000000140)=0x44) 08:45:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000002000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:03 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x3]}}, 0x1c) 08:45:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x63000000, 'nq\x00'}, 0x2c) 08:45:03 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6c, 0x0, @remote={0xac, 0x223, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000100)={0x0, 0x0, [0x6ec]}) [ 803.547192] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000040000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xff0f000000000000]}}, 0x1c) 08:45:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x8400, 'nq\x00'}, 0x2c) [ 803.596320] IPVS: ftp: loaded support on port[0] = 21 08:45:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:03 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:04 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 803.684853] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 803.717996] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000046000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 803.918750] IPVS: ftp: loaded support on port[0] = 21 08:45:04 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003fe00"}, &(0x7f0000000140)=0x44) 08:45:04 executing program 7: socket$inet6(0xa, 0x1000000000002, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x10d, 'nq\x00'}, 0x2c) 08:45:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:04 executing program 0: r0 = socket$inet6(0xa, 0x8001000000000002, 0x0) ioctl(r0, 0x4, &(0x7f0000000040)="0047bf2f07d82c99240970f06d060000001bada0fe27fa32afb2fc") r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000980), &(0x7f0000000a00)=0x6e) r2 = gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c40)={0x0, 0x0}, &(0x7f0000000c80)=0xc) r4 = getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000cc0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000e00)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000e40)={0x0, 0x0, 0x0}, &(0x7f0000000e80)=0xc) r8 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001080)={0x0, 0x0}, &(0x7f00000010c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001100)={0x0, 0x0, 0x0}, &(0x7f0000001140)=0xc) r11 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001180)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001280)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000012c0)={0x0, 0x0, 0x0}, &(0x7f0000001300)=0xc) r14 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000014c0)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000015c0)=0xe8) r16 = getgid() r17 = gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001600)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000001700)=0xe8) r19 = getgid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000018c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001900)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0, 0x0}, &(0x7f0000001a80)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000025c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002600)={{{@in=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002700)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002740)={0x0, 0x0, 0x0}, &(0x7f0000002780)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003ac0)={0x0}, &(0x7f0000003b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000003c40)=0xe8) r28 = getgid() r29 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003c80)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003d80)=0xe8) r31 = getgid() sendmmsg$unix(r1, &(0x7f0000004680)=[{&(0x7f0000000a40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000ac0)="3efbebfe1b3b", 0x6}, {&(0x7f0000000b00)="486b8bf36289fde3f94658b106b11e8dff60880d2da202ce34ccf30dbed75febd48bfd7d867e65d97bdcc17706ef57f162168902d8e744675ac02d083176888606227785ef9b5ac69bd4b4b1bb7d3850293652802ce38ae0484c5753795fa1f62a6b351cf46967156158cf96b79bb2138ffa79bd328f0017856ba0615bd17f6311729f653dc267a508f92f3409fa98dd8c984443f4f0c6953772b920e8ee6f6f49bcc90b34be835161b7382a6a3fe7d31be7bdf64422baa27dac2d633e998ccdf97713f6fe4ab1861300fabc2a6e1bff9d77d3325e6f6746b900bffab7a7a82757b14261d02f0027accc72d440977568cef3d0e506305672", 0xf8}], 0x2, &(0x7f0000000ec0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0xa8, 0x8c4}, {&(0x7f0000000f80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001040)=[{&(0x7f0000001000)="15ab519a5193", 0x6}], 0x1, &(0x7f0000001340)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x40, 0x1}, {&(0x7f0000001380)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000001400)="2ecf8f3681210f0513aaeb5988607d727728edc7ffc82e41f25a738c160a88d0036d42f796d937ac3d75fa2d901e1a42c58c539cffe25ce2f0221e5258ba505ce2b0", 0x42}], 0x1, &(0x7f0000001740)=[@cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0xa8, 0x4000}, {&(0x7f0000001800)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001880), 0x0, &(0x7f0000001ac0)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}], 0x160, 0x10}, {&(0x7f0000001c40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002180)=[{&(0x7f0000001cc0)="18acfb56dcd5aa1c08950d1a7bdbc8152907ea452de611df62062584be26228ffc45e24db77b6e4d6ad5ec45", 0x2c}, {&(0x7f0000001d00)="02db0641b604fd40b6faddefad0a2e153ac60d215927379b46a4a2418836d6e19aed10e9b7c4f802175f532cc91853ae75e3242ac7f4897a317dfff5e92df5514a47beaa5e6caeb60ad736811b578314", 0x50}, {&(0x7f0000001d80)="95ab14a997622e105d1ce6085c07b38ef670e917cdaed616951a9e0eb77d0b8a827b512d638817bd315294c595264320f3d601447ac10272f4903333edfc4e95b1f230b2851035ce215ab92468b93005714dc60da1216ca158923932493770f4a4c93a947628fa19dc50cadc10abd92fc7da2116dbeaa24955206905d0b908b35ce01716ac736736937c4691b51940e5ac72894a51254fed4bd824439b9ceace28d3f344cd8d6483568bf3ec838754638157b96f64c1033e51d817e4dcaf87af197c3ce3951c5af9c06a434a0911711db63040ac80f2eca387537d7d2b", 0xdd}, {&(0x7f0000001e80)="e5e110f3e3335ab8ef219952626eea34a7d0729691dcc3e40bae1a5d1e3133e0b8cb", 0x22}, {&(0x7f0000001ec0)="37dcef933b8b8909896bf1719dd5ecb3b0c88f38fdc5535a513b7c24cc61b43995bd86b8adcb43a0569b757072245bf4c3c635ac2266595e", 0x38}, {&(0x7f0000001f00)="896666bae6584513ae9f33344aa4d7910d12f80acb6371f19c4c166d81b3e117539d9ed15e825ee4cd78fdf37f594ff8fea50dde9b61dd9c76305cc2dae9f968239f90753903fd30e43a258a4a7a500a795db646d41c2136cf43279e24e5f0ddeb1be09148c1cf0162cf21ff0f5f4f2c304df44df8b16d9e6d744d95300fb232e561f545d9efef6320d4853e894f54745015579f9be727d7bb72e7f5a6df8556773e8ac9b2861d822b0ff438956ef958f4e54cedcc5520ca44391bf6461d1189907a31edb3", 0xc5}, {&(0x7f0000002000)="0c4b104ee09a5f346e340fe7f98168357893ea712b3894389ea5b77fbf2f14eb4c0e34db3f4d8a3032d66a34b518783297d4e60cda945cf4041159949dec507e3df8b2ab185087540f10d02510", 0x4d}, {&(0x7f0000002080)="06fc1d85d5b450a227ec4feaa7a41f75fbd320acaa33538a10e9cae2940fba764f0cbbe40d18918d11cd0488278830c9c466b33461ae579f7e20ab439266777e7dbf33572eb6be7d684d590f0fa97686a1326b", 0x53}, {&(0x7f0000002100)="8158494eaa0df18d2e585662f16e0427b43842a9869c25f2bd888d27959887509d600c1f5e0c1528cf67f0cad9056a29a6a88e200d7c037237b7b1949b3ef106633c38949e965deafd53fdd842d1185acc5cd9099543c20d20e01023ae2fc890a6e933a199", 0x65}], 0x9, 0x0, 0x0, 0x4000000}, {&(0x7f0000002240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002540)=[{&(0x7f00000022c0)="e4f5e328633565fd51d38caadb6e839d490fc36eafffdb94dd38b1bc2ebdcab60155bb4c44a8fcac8c50c408a52df7cade39b92907337d2d422103", 0x3b}, {&(0x7f0000002300)="766eb887efc99b8948502ff69059115fbed90d195eecc09457d03d8b0b1d71fe8ea4c58c0d964348485033d5c569af51b8e729863d76ad837df38ff912d69bba0d1464088611fe79bfbc912c5e668b785a950e7660511ada0de8773d7e820ae6353960a147acc3ebb0b63b30696bf7a70d883aa72caa038e1f66299ec5f4492a875a7442fd9d8b62d36520af132bf57321f998996b334a4654d8e863de65902b492c1680ba77ee33be22ff3a12f317692bac053ae3371006d14daf90227c5dc0b59b6587fa", 0xc5}, {&(0x7f0000002400)="d578968644e396c8ea764cf38cf94d83c34a5d3db9c4ba8251baf4d915889a8d21361d5dbfed2dea519cb623aae6a1a8189ac9c7f0c56cba4f", 0x39}, {&(0x7f0000002440)="805a596aa6ddc68189785270e3fb25aadded97d7c31df27ec9c2e001854af3f677b2d1ddabefa8431c4cbfe65dbf88bed79bf6414c5cc17ae707bcd14443", 0x3e}, {&(0x7f0000002480)="ec3ae0d21399d3fc3188acbdeeeb42612375d8ab2217ccc6b9afb2341bdc1b82825e6008f5394f08bb98ea29b55e7045232b83dcbb7d62ffc3f714778488351f553f2f54333357e3ccddd327a3a0c9057a2086900302e15124530642e1b3f18947f1a97adcc0cdf50b540143e7e97497d7247147a5468921146d3e39a750abd532a25fd6f59993f8e348187319bdcdd5fa729d23a2a0c6426f8bae0d3d7178965970906c853a75def87babca1e", 0xad}], 0x5, &(0x7f00000027c0)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x60, 0x20040004}, {&(0x7f0000002840)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003a40)=[{&(0x7f00000028c0)="2155fe7c151b8a3fc02c564286f4586d0638ccc476713b788c25f40ad94716013e528b0d83655afae9133e74356a68fcbc4909c394d9b5289be04b219c", 0x3d}, {&(0x7f0000002900)="8d93c7b65c27440236", 0x9}, {&(0x7f0000002940)="c2c72404cd95d58861c3c93d6f5ea593b6dcd8b127e7dddeb36ee2b0b52e0d01318409c3bf727d83b992bb3c4900ffa743", 0x31}, {&(0x7f0000002980)="eaa945338ad70c2a1c22d5391fd0343356fdc5517ed936e1b5d8e67c5f4d636414ffbd96a93c619da1184217f70f28857506e6f183b6a3815e6a1130c5a3dab2d9135e42d7e13bf567eba0cf4de761a656021d497222efb126f330e1309e7dfa92d6d84e9a721616c840e8ecd231882b6be4862e7330cb9e0d276ded882054848656bfa99356d1dd96e8a6a6c8220260c4c829fc0e82e8cdb1d2aee9a6cdff5b20be205dcca487133aafbcd3e58f9be79fc8a07991c36f09a90f37e880eb019227e931be9d4b8e0d87cf2dda6cbef710459126da53ad131caf02d9d1c9720e23e57eb59d915aa50777ea5b998665c975acad586f8a9ca25a2412d9a3e6ac549cd58979222fb8d46ed6becb5f60af39fca5f264dd1eb38d6a9b624600bdfb8cb29556c1bc65f55dbe17d42d25abb38097bbf8cb9a6ad1e00267a692629d87132b66c62a3af8c6975673e8b203d940809b80cf1fb3441ac9246affc2c441948da82f77168b88abc93f5dfb26d2400794168e8bba20670d8cd4e39e3a5a89f5d329f1ad5411dd816d3c17a381dd7df5a58ffa644f3b545e759067e57b16193ab9e27fd22858d4567c2ff8581e15569a8f8885de36171622b72b959e871b223a82e9e78a583b7b45594a830b9e0ab94126fa1417b8cd0d282782da180fb550ac4ca2dc82b27bd8cfc32fa7eec206280bf8027c5285ee6a55d11643ef77818e903e118cadebabfa982007b51ffbede15be2bf04d146c32bf34cad24fe5aabaa814c870633862b937bdad16dd13477c3841f90802b2b4a1d28be9a2e757ac1db888b31bfa3d5aa4ed8b490b796b493942291d6ebd944adf38a81d3a073e859479c966a44c503a98a5045e6474039e19476c7e3a6f5c89464be8d7e174477851fa46ba8164b22635dc8ab2dec25b5326ab27b492fd89fd8c88003cca729d4468158a77ea258a7261d9054dc7b07b4c8fe7be010e59c1b9a7ac307a32329394fb3d495225e5d2dd1892d38806c7d8a594caa66edcd6db9cc6b47e46771f1f8272a0ec5ac50d4c04c24df05be6a81bfd7d7530d106b057fc0fec19d750155d869d4276719c09cb05193f1680bc6ffc35c112978deda2d267c6e69a1c917ec087cd8e3ed09a83590e30eb900d37d51d9c76aa19292182c0ddad9a7978ad447a2fdead1a8040f36c9bca4c33035858a0f0026a5fe37de17126047f133d8a2913a9a40e8be676064fb7366c8f858926bd2480980993b5da8a3215c17bbe0488e41f6dc21285d3967b12d8ac27da452456a2338a03c27a0e1e58c353dcb13d47f8753ba7ddde20f5a12979e60d776b45a2cae8702f3284dc20beb41e6b4bfdc3ecbf65c8b231087fc28a3464402649e49fb7a5647eb23ad187e94de16011b1ea6d8134f1fd4579b217f964ed984fc0bf2ce761cd09dbf11a01014aa996f6ca3e598d81291368ce2935d53167bf096cd206a2f0363afecf8f7b3c7734b1dfea94e1ae597931260683368a2c2c8b325d4b6f7c1bdfedd022060039e0b353bdbec8d062a73b6436e15caa7e5a99cd63e79974dcb09e3d424579425331275d97325fc0b9e9164b78be4cac20df867f9e8f89e7e1cf622a7c339a6272667b2761d56ec177dca56089f6fe4d4369c37e828b17c05047bfcb1a98865b1cf56495dab1acd0646acc4d1fbca768c3464e9ce82a989131b764b54c9bb53080622203378ea9cb3744b1d6c37ee506b953c86ccfcff1520606c246fc90550918c61d4c21aa916ce1b1fc2f0016ecf7cdc5d8a44ee41d4d942c6ca68032f3bf9471751a52b25df3950cec44e4018b8c72ea4ff76eb7358ad9653f3a11c29fd2ed8171e1e14bf076f1d0498850e4a26c83df4accc897c34a86790fe81dfcd22ffd4e9a62f2516cddd21d083aa2ed6e0ad277d11f4a55cab65dd7d80c6ae74948ba6a64611d893510022f270fc95c108e6b8257b80a073e8591dc7094391b80b473176993110d5001a56ffe32c4ff9c98a35df6786f36e30b3821e5de920cc7cbeadde34c1bc70547af0d62301c1e052225692877fe2362acd2debaafbb012ddd6d32598c17013e324530435b2b42db7c76ece1b78c6e3bce5bdf4e459cae09172c8adf766148b410cfc819481a931b77e1c4fdf78155f133907bc5be991e3535bb11a289d196dc82893c0a3ac785d42d398a7efc75985528dc152c2ec9c0223a4081459be52293e4e0a227703291951a1741c1a83bc5dbb81c565efbb3327c8baa654f6c8ea305548f78664551d014db84ead6da23a18e544f9f26e42bbcee7f558c1ec7d978af484776eb40ca942d2e8a22197dcdff8fe810485a25df58c75cf5a0442792aef8ecef1b0d96aacc421ad09f92abe06c7ccc2d854dce54cb0fd67956b1b427381755a273862ccfeeb74626749b4723a54be1f83d3aa475855058534cb6cfaa4df42c85f91a335e07bd5eace3b1e80ba0e92ff1a76abf8eb5b55dd2e204438cfb2fb3aaf14fd84c8aeb4c80fff96201891914587f9333e0a0fe286d565ac8a93e36659e5cb8e56b4086f87c09ae8ab46a281e49edf146c68cc6548f5b8db67b1f639c6d8debff9daed6eb9e08ee156be68499eba2e92400979aade0348df342cd22bd7a18856f12a02a4a5183199e409bf09980ec1ef678559fa94d09f5399c81a523513be40af5a749515995737d8f1f0388bd86a10d135a770aa00c03fab9ce6671c859d0bb0a71b54b2c406d0cbf65f97f55eef32b938cec4f596b02950d5d3a4ee925bff0bbc2d5d24e5a65fc09f1ee653d8a7ff114093771a09ae5b8c068c54e012f4cf3f09613bbeabb04c0d6e8d395f8f68d534eeebc20760686c2f56ba29e8fefda2fbf2b5e58abd96a738a7ff667d580cfd1d50446c61a643c153906c0c811baafaf41e5c3138185ce58fc1bdb0934590c73e6891de43ac585c59bf2ac6d5e8d492c99a1f93d3171030a14b6edbf7bbbd3789d96c603666d8f5f6e1ff7446204faf3b72c1f8c72de2c1f5943f0c3393fc71e7d47d5e55bf40ceb352d1e79d58b26d67c5c82c923cc067ac1f1aa81388d5aaddb17e189e2af3168a01303e42ae4f6e39ea8748e4c71a43fc0957682d8175593fd870d5fb07bacebbfc4ba78e7cc34550ba858612a204526469ba189ee0009ebadaa322b5e6d224f74b94a35dc28db4a853137c193ba08b3a85040e5966b451c4cc7e3096c2ed2a76fcfc5c2a1069d381f90f98cc008b2772f6227c023ddbe2efabef1d7bf6d9d91ab91c5a8db6bbd9fc09c5a6d3ab5bb6fca74e8c8f54c6f2534923e2660484578a6e03860f25e8c5a7ba3e7bad7ecbd916685129e14b94cc7d24effdc2f45c49005447a88b0bb841ff378e346f36fcf80d887244fc3f538dba4a5447cd2cda6d54d8fa98f2fe215226ef44051ef0a7eb1555d4b6857c6d1fd5332b10224b182719a359e181f147cf85ca2037f92c0b49d4f24bcef970409078b394654c2da74e6fce352e09b5d86683417c15ed2ca19fd77a05e3b6506b2bcba9b51a57b2f59d1b7ebbf02b5c21aff92f6fb9bc0d1daa15e784207bc8d25eea4fc3bd7cda7b4c2721ec2093f67265f9df2031f59c93b920d594f1bb1a43230b4fbd042f7c2adbfc459b100f5e3ce69e1c09140222569a7839a0703335b5cc1a8f81dfaf8207e7bc88fb2e9e842405fbb485e28d165092c517a8631678fa1db4927c45dc16eafa2fd1913928deee90bf330a7aba589c95f000bbc5019809d69244a3efdbb2f74f897a94f360a73a47ac167c8d602912692e12898edd82c560bbb7ce87b2774d01ab401ca99f5a0e36b9f5c7ff28337bba73877e509c3f29d1a8f12b569ed121012ad36791ef49207c0239ab5c932eee9ce2afdb68c10527bf3a01a0d1d42efb54f2a961a33c68bed3f093d64757171aa2bc3627cf790107fe6178470ee3af23a8ab4526c6cecb370c487198a885961d77557f891aa20850b13d69b51b38af6a4eb56c7d226e7e5f93dd90d6d0a733cf8e45b75e39f110fdf6c0423fbefad4464de50ddcfd32c0e95d1f2d0c9a1b500e416cc197549453d5e9d179e51ba57b40c78ec174d2737f4b7b16c32b4946673e5cf1524e947604c1dd3bae5085709431b64f0d5a497bbc7105df57ea779b3668f3f6d706234826998e91d0f9e292e5819cd8329899b3c6486d1afa337c057d506469fc6afdf534268c5ba8f289f3847c7c0eba30095c5581280837269a8c9bca2e8a9d1863d142d6dbc7578179896d9b4375dd47cd66e3584daf7f06bec27c1a11a9c660e71fa98793071ca4f8926f3f33461517a9c1c0d08cc981af413aeff8f79af6141f370f5bb0bfddd7e4d62ce58d468aad93d07a6fd3f3b97ea348da4f42c8bb4f3372d9aa2a3d92aa2d839dd0ea0d00a8899612c0f62530fcfbcb187e5c34692d58c6051fd3ade3ea8875969d366259e22a4b06b9cec9f2aadab83834609d22b32fedb6a256cbd4c75ac570433ba28c625ef2b3eb60fa44c352a7c62eaaefef7e8e7e30888b9561379afaa31d257cf206a5a76c2c954217b286f8e27746b38095ae11aee3fcff973f0f92f0788035fb3693dce3c4e6bf6522ade28f1a6d7cca7f32a1662b136dac27014c84ea53a81e91780a0c8983f143e5e1a39bd6ca55ff6b254f2c4313057d06b9350f7ec551c670ff412ee04189cf1bcc2b0e29b2bbc466b4e8ea91797ef4d84e125cf123ca02880368588b5ee96b396a12c4c9c73c21f26e98f83aaad5938b53d1442e41ec295e8c9b30ad9bbe13da01459d408d2134cf218b9d10216e6d3edfaaeec029a25b30fc23fe126745458c701f930ef3b5ec7484339bb8f6387e0ee38a2386e9cc1a4521ae4d4a80e7a1a56f8d95ff88f201c6536eefaaaca23903bd26ee1413b7ccecb14e678ea8b8a1fc52eb08e48ae713479bf87d56fe0e2833570238aa05082852082e5d2afabf2be08677d14d69d2848fad979dc1009410eb93411446697bd713fbee136c0b6b5724c237b577e12aaf42da9fa39a1b53eb2577c62437aefcee981eec98995e0d38f90c378574e7c1bbc4653368bb3be97b590f51a78b386debcec20969139ab0a58e65e9dd8b7bc1e3655a463f3352b56be4c2d7ae083fa484ee5951f046e929db514ed0ec56d8084c107e3523c4b5b7620b6d7184d086a239de90e25b2adaa31eae79cfa2e65b20b77b680b7faed2451c29629d0421547d627f45ffa36fabb0b72257bdd9654ea51c4eb8fb5877871292cf280c5e7f0c899b8b5c662ee6cfdd9f34cfd6a54a487de525b3b66e3b3b8ca32a71e9893e47e4c93e93a1b24c1ff0b903eb8f36994728bb5740bfd1b4f5cf8785a6f7ba0cf0f534e2816082fdbb44576293596fbe3658f965912c779e016ca3f21e6655dbf4d43154ea46cb39dd3206721e593d6aeb2e919da9cdd09499f54d488cfdaf06a9e2f84fa048f74e7aa10c283b9e6b150702ed1d7029357d8046d7a7dbe9d4303499525c6f66cfc325959a4c875dae785e3e0faa3e8695044c663095865d4eb1a79e784b52ac15644d84d22e367c9a378c4b08edc67b74d5a9ce7c6cc1d5c0c6b15da9bbe3c196dd983d7f873c2767cb5d7670d1183d394d443e3b0af49bec1b527703a8eae9a8f3369aed9314c64ceba14159bd16fa7650553d1b7edebe97cfeda4aee148b1c9d5808119144904f77cf334594e722f59a8849dff9d8d0e152066626edd058d09519b9675f6133bf643fef1bb8850710a2fa0f4481589816e83760245aab4f9ba2057a368f6de274be0c2081ccc4d679cca4705655d7457044372138199cc07f7cb54c4d6", 0x1000}, {&(0x7f0000003980)="5d4a19d82e72a5e63d0af7e38a8ca0694fe5d590df15e80c839540e9d86b9adf9161b65be3db2cfb1301ea1610bb1113ab955c744cd62e96d61ff31184603dcc0cd236736362dd7fba67514ec9dde180de07d2a47719cbf72f8e0e854e5de1569f603b8794c3040123f5e9930322425fea30a670e265ca2308842276208f8adbe0f1c4239e8881de0dad5daa98a65b059897d38eda1fea9f712450f473ec954d81a4f2f0a41f17edc85f9b1b9dab7bb14d254cfa56b39e4d159e05593cc056", 0xbf}], 0x5, &(0x7f0000003dc0)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x120}, {&(0x7f0000003f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004180)=[{&(0x7f0000003f80)="5ecced3a7c127c196bb203267709e2f25bf11880ecf30fd492958af52cad0f555cf639cb2acf95d5d9f0336bd1e71b7f2d50aa9f0d628ee5808ca350b80cd089a6b516e82a9299639be9da2ef472fbe27dc7dcd79fcf231e96c7e6651346ce1f70e0ae6b0e475550995f03d884a5f8d99a24e7a3181983c26a27cbdc8762e2439447b4f24781c7dbc92c9b0f81513b2b52c17a644f5d5c442657921265d0ad1728be06d683fdb95baf3d70aa2af8b577c60e17ded7e35ac71edab8dec7a8395aba9f956003ca57aeda0b704e61ef57830fd25db8c1bd682cca9561651098dbb9855177a1685b841e73", 0xe9}, {&(0x7f0000004080)="a0cfa5793a1583a9b14b152f5ea658852d109195e3827bf7316f9489930c9fb788f231c07dc0328b4b8595ebaa8b109940306fec6d7ffb5a6865c184eeea7ba20d8a6c96e7c0f7d5ca2ce02b78b106ec476cbcfd2b3b3f6356356ad7dbbbae237a6fab1e55eae38223ba6105fdc57969959645c1c4bf5e47bbdf72749b3862be16f422cc1c7d51374dcb4acee9139d6127cd6d38fbfbdc84d2d3be896627354ad460aad803d21e2295e40ba565644a0aa9bddffbd3d1adc613fb23eb366411f60437b6c42104bd0c887a75ed5d7ac62b380ac513532242c0640423ddb07abc27cd7ccc01751a10fafcd56790da5f00e4ce53f25485e9add5cf", 0xf9}], 0x2, 0x0, 0x0, 0x1}, {&(0x7f00000041c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004600)=[{&(0x7f0000004240)="e0466c961bd5c5527407ef621117dedabba456c685e1cc4c96ecd368a122bb01b7fecef75544dfcc9cc73dfd05b5c0a4f8bb7f16037bf5ac285b9ff6337680ef0e339190272f211923b34af70a37826bb7b0767ab4944ad91baf15ab", 0x5c}, {&(0x7f00000042c0)="b5f5dcc63caa8ae628957d21d81efe36367a71b0c99fe09e79381cb6d8df33aeee470631c257ebc304782912b61c611c601fa8da4709320ee8ed664ca57c913462a309f2cb8503e131347fb9e9064d277e6e404f3f79ff1bb8c1789aae8566e21f4182fe4a760a4b05d63401", 0x6c}, {&(0x7f0000004340)="1ad0cfc687bd7d9fafde029fae780ae5d87e87e548d84699af2f5f1096bcce03417e9c435907fa0f", 0x28}, {&(0x7f0000004380)="8e1ea7476311252dd109b1593bf5e9b16a02cdd9e873c0a3267a0c1db716c0", 0x1f}, {&(0x7f00000043c0)="3d18831ecd39f472a5f9955d348e2d1b26063682336b6c7a6adbc36f1c59459b62db6e25f6bec31eec6f8d1de5269b57af3179d2405e8ffa9f62422c315fcca95b2ea65dfc421f67e0121036a48a46292e5b96a6461b49f549027b7dc49dbba6a655afad24a39321e005824909d04f8be7b818104044f532dd3181d4d0e25759ec3920e881494247d9d0", 0x8a}, {&(0x7f0000004480)="8e75ee0c1428a6affcb1fb0c3d5fb81645f5afff861f633b0cc1ae2d7c34bab8d41045dd7d80d7e26964d857bb79e5bd606b2d1822538639fff4649eb9da251ea56d1d17fe9a8bfcdcb99707ed0d7e231bfa590863e2b5df63e74d2301a7a412a4cc441b62ef540e760d4918086dc250402da0758b068ae671ee369183f5d249f0208627de605a4383d25dd22220b5bd2ab15b2f904117307f08d3fc55c9dca73d704c99214c8944f56a834e21955212fea211407291cfb677ae7debdae5ced84706251e1d631d", 0xc7}, {&(0x7f0000004580)="1320fa238568d6bc865792c01a2ffe4769d64aad47d073d2087c87426d92acb3da6338199b85984d85c6fbb342580e44b6c5e44010c211fb0003717d9f8417f2b9ccadff8a47297b22bfc827c33d51636867f1e9039b62a02b1e447ca8f7823943f7289e2cfd5a9973897efa3358", 0x6e}], 0x7}], 0x9, 0x4) r32 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r32, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, {@in6, 0x0, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0x0, 0x0, 0xa, 0xf74d57a501, 0x0, 0xffffff7f}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}, 0x1}, 0x0) 08:45:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000010006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x5000000000000000]}}, 0x1c) 08:45:04 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000026000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 804.052755] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 804.083542] IPVS: ftp: loaded support on port[0] = 21 08:45:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x63, 'nq\x00'}, 0x2c) 08:45:04 executing program 0: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657203ec00"}, &(0x7f0000000140)=0x44) 08:45:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 804.140731] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000004003006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 804.259107] IPVS: ftp: loaded support on port[0] = 21 [ 804.264851] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 804.405509] IPVS: ftp: loaded support on port[0] = 21 08:45:04 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000000300"}, &(0x7f0000000140)=0x44) 08:45:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x6c, 'nq\x00'}, 0x2c) 08:45:04 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000020000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x14280000000000]}}, 0x1c) 08:45:04 executing program 0: r0 = socket(0xb, 0xe604e120f9ee669c, 0x6) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000140)={0x8, {{0xa, 0x4e20, 0x518d293b, @empty, 0x5}}, {{0xa, 0x4e29, 0x7, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x1ff}}}, 0x108) getsockname$packet(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x9a6a7899aa69972b) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', r1}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x3ff, @remote={0xfe, 0x80, [], 0xbb}, 0x4}, 0x1c) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000400)={'broute\x00'}, &(0x7f0000000100)=0x78) write(r0, &(0x7f00000007c0)="130000001000ffdde200f49ff60f050000230a009d0000001100c5302251a52baf69689cb9e5f9ec364fe86bc337747a04cb1c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efcb093896b77f850a7a7b86abfe8dd752d28ceb4ec3ff429e7e4f28bca763acd06f40ad03226af559bf91efdb19a5faccffe8090d92237be9951be4bd7c24025620078e0741ddbc396f9354c659f080f11901f669220a1fe13ffab66d81abeae63bc42d0dfb492d4f18852ca21b1f24c681a87de4cab888dcf84ec22f4eb51c20e4060e44a1bb9ce9ccbef237b222a8f8cb764473c505a7911592a739808159284639aee85f051bed800000000000000000000000000008a9a06b8395b8b3276aa8db9b20041e1fc18410700f8ce2325d5566b401c0159431bfb664f6c5a116bc54d0f1b72fda416555cc4ec2670b6ed0c5cff6a4168af9b6a223c8c007bd148fcafc10d130d4c7a42761b6cad5eb0f364805fff5b00000000000000", 0x185) accept4$bt_l2cap(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x80800) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000480), &(0x7f00000004c0)=0x8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e21, 0x6ea, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x13}}, 0x7f}}, 0x10001, 0x800, 0xffffffff, "3db0380a0217f45e19b1c52bedf588f4efc519e6fab9b70dd1295006fce38c47eabe8c4a155c85fb96e5c7c2bd2c6a947b0c443228e67d720b540c0953bbb1ed43f70bf8c3d852687ce313322cd909f6"}, 0xd8) 08:45:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:05 executing program 7: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 804.603313] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 804.619717] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 804.635560] IPVS: ftp: loaded support on port[0] = 21 08:45:05 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000400006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0xffffff7f00000000, 'nq\x00'}, 0x2c) 08:45:05 executing program 0: r0 = socket(0x4040000000001e, 0x4, 0x0) setsockopt(r0, 0x10f, 0x80, &(0x7f0000000080)="010090bf", 0x4) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffffc) 08:45:05 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 804.840163] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 804.981254] IPVS: ftp: loaded support on port[0] = 21 08:45:05 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00\x00\x00\x00\x00@\x00'}, &(0x7f0000000140)=0x44) 08:45:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000020006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:05 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xff000000]}}, 0x1c) 08:45:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x3ff, 0x10000000000009, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000140)="ea050000000000000048372a8bd6498ed1996d052fc71192", &(0x7f0000000180)=""/115}, 0x18) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = accept(r1, &(0x7f0000000200)=@in={0x0, 0x0, @multicast2}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000004c0)=ANY=[], &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x8000}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000380)={r3, 0x15, "c54c671489ee02a6b72665d1831d7caeb1a56a0c5c"}, &(0x7f00000003c0)=0x1d) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x10) socket$can_raw(0x1d, 0x3, 0x1) 08:45:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x4000000, 'nq\x00'}, 0x2c) 08:45:05 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, '\nq\x00'}, 0x2c) 08:45:05 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000001000006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 805.116576] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 805.132308] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:05 executing program 7: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 805.215268] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, '%q\x00'}, 0x2c) 08:45:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000200006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 805.374530] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 805.600819] IPVS: ftp: loaded support on port[0] = 21 [ 805.636054] IPVS: ftp: loaded support on port[0] = 21 08:45:08 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000018400"}, &(0x7f0000000140)=0x44) 08:45:08 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nqH\x00'}, 0x2c) 08:45:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x8dffffff]}}, 0x1c) 08:45:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000004006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000003600)={0x0, 0x0, @broadcast}, &(0x7f0000003640)=0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000003680)={0x303, 0x33}, 0x4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1={0xff, 0x1, [], 0x1}}, &(0x7f0000000040)=0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000280)={0x0, 0x4, 0xffff, 0x63, &(0x7f00000000c0)=""/99, 0xbd, &(0x7f0000000140)=""/189, 0x4e, &(0x7f0000000200)=""/78}) 08:45:08 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 808.104581] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 808.129829] IPVS: ftp: loaded support on port[0] = 21 08:45:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000002006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x18020000]}}, 0x1c) 08:45:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00`\x00'}, 0x2c) 08:45:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f00000005c0)=""/141, &(0x7f00000000c0)=0xfffffffffffffe26) pwrite64(r0, &(0x7f00000002c0)="820752bcbf2886876861655cdbd31a029860b11a0d31be01cf2a5bbcc2ec814f527df3546675a2578a733a60c6176cc2dc34b81c9f5c0fb8f46d430e0062bc1afadab00c9d79ec954a462f0d56ed4e1bfb8b5cd112574862e590f386e68877bb3091912ea7af39a65f1069da2d013785aeb2a8208c78e3ea9a0b051ef3d696c339a5f81326ec05a9f5ecfa82bca1c25a", 0x90, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x4, 0x1, 0x8, 0x0, 0x0}, &(0x7f0000000140)=0x10) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000003c0)={r1, 0x3}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000680)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000280)=0xc8) 08:45:08 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 808.307566] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 808.329596] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 808.436817] IPVS: ftp: loaded support on port[0] = 21 08:45:08 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000003fc00"}, &(0x7f0000000140)=0x44) 08:45:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000010006000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x2c) 08:45:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xff, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_int(r3, 0x107, 0xe, &(0x7f00000001c0)=0x1, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000140)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000000)=0x76, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e24, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x9}, {0xa, 0x4e24, 0xfffffffffffffffa, @remote={0xfe, 0x80, [], 0xbb}, 0x80000000}, 0x3, [0xfffffffffffffff8, 0x80, 0x228f, 0x81, 0x80000000, 0x80, 0x4, 0x1]}, 0x5c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e24, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, 0x1c) 08:45:08 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x142800]}}, 0x1c) 08:45:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 808.614913] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 808.618848] IPVS: ftp: loaded support on port[0] = 21 08:45:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000206000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xbb8], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 808.682960] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00c\x00'}, 0x2c) 08:45:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000046000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 808.873877] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 808.999519] IPVS: ftp: loaded support on port[0] = 21 08:45:09 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00@\x00'}, &(0x7f0000000140)=0x44) 08:45:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x11]}}, 0x1c) 08:45:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000026000000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000500"}, 0x2c) 08:45:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0x75f}, 0x4) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002680)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000002640)={&(0x7f00000022c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x33fe0}, 0x1}, 0x0) [ 809.227309] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 809.247380] IPVS: ftp: loaded support on port[0] = 21 08:45:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000013000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00H\x00'}, 0x2c) 08:45:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x25890ca2]}}, 0x1c) 08:45:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006002000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 809.467519] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 809.610926] IPVS: ftp: loaded support on port[0] = 21 08:45:10 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720300"}, &(0x7f0000000140)=0x44) 08:45:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x300000000000000]}}, 0x1c) 08:45:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006004000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00`\x00'}, 0x2c) 08:45:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f00000006c0)={@mcast1, 0x0}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001680)={"74756e6c30000000000000464fbe2100", r1}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3000000013800501000000000000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000004002b000c00010008000000", @ANYRES32], 0x30}, 0x1}, 0x0) 08:45:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000200100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 809.729396] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 809.762157] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71048f00"}, 0x2c) 08:45:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:10 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000440)="0047fc2f07d82c99240970") socket(0x0, 0x0, 0x0) accept4$ipx(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030000000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c00ec4480697fbb8994a79bc88100002e00190100008ce600000000010000000800000004000100"], 0x1c}, 0x1}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 08:45:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d8") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 809.838827] IPVS: ftp: loaded support on port[0] = 21 08:45:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006010000100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 809.884586] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 810.141809] IPVS: ftp: loaded support on port[0] = 21 08:45:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d8") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000130000000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\t\x00'}, 0x2c) 08:45:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:10 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x87) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000100)="5978f999fdd793b894fa343c49a0937f16c6abddabce38009cbc16b1de4245bc56668e8f9f6204c295e707891309ec2cabe8347c2b0104898b38e4c8e2745f73b109a4fd92222436b87a6efefe26", 0x4e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x2b}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) r3 = accept4(r1, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f00000004c0)={0x3, 'bond_slave_0\x00', 0x2}, 0x18) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000340)=0x2, 0x4) 08:45:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x1802000000000000]}}, 0x1c) 08:45:10 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572f60100"}, &(0x7f0000000140)=0x44) 08:45:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 810.231680] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 810.232385] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:10 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="240000001a0007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xbc, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {0xc}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xd2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}]}, 0xbc}, 0x1, 0x0, 0x0, 0x40}, 0x800) 08:45:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000fe00000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 810.288851] IPVS: ftp: loaded support on port[0] = 21 [ 810.486277] IPVS: ftp: loaded support on port[0] = 21 08:45:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d8") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:10 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710600"}, 0x2c) 08:45:10 executing program 0: r0 = socket$kcm(0x29, 0x80000400000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) 08:45:10 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000000100"}, &(0x7f0000000140)=0x44) 08:45:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000040000000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xb00000000000000]}}, 0x1c) [ 810.604897] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 810.618449] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c9924") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 810.682447] IPVS: ftp: loaded support on port[0] = 21 [ 810.850497] IPVS: ftp: loaded support on port[0] = 21 08:45:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000020100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:11 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000000200"}, 0x2c) 08:45:11 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c9924") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e33}, 0x1c) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) bind$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10) 08:45:11 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572022900"}, &(0x7f0000000140)=0x44) 08:45:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x80301000]}}, 0x1c) 08:45:11 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 810.959972] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 810.960095] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c9924") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000040100000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:11 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:11 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 811.013520] IPVS: ftp: loaded support on port[0] = 21 08:45:11 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000000600"}, 0x2c) 08:45:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c992409") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000800000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:11 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 811.182975] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x4000000]}}, 0x1c) 08:45:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c992409") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:11 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 811.311679] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 811.387600] IPVS: ftp: loaded support on port[0] = 21 08:45:12 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000000100"}, 0x2c) 08:45:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c992409") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000200000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:12 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000022900"}, &(0x7f0000000140)=0x44) 08:45:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:12 executing program 0: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572022900"}, &(0x7f0000000140)=0x44) 08:45:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xcf00]}}, 0x1c) 08:45:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000fe00000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 811.969959] IPVS: ftp: loaded support on port[0] = 21 [ 811.975669] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 811.984114] IPVS: ftp: loaded support on port[0] = 21 08:45:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 812.099453] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 812.272299] IPVS: ftp: loaded support on port[0] = 21 08:45:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000013000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:12 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00l\x00'}, 0x2c) 08:45:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x5000]}}, 0x1c) 08:45:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:12 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00\x00\x00\x00\x00z\x00'}, &(0x7f0000000140)=0x44) 08:45:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="00f0fffff7ffffff00000000000000000000000005"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8933, &(0x7f0000000000)) socket$inet_sctp(0x2, 0x1, 0x84) [ 812.373257] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 812.389930] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000017fffffff000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 812.429238] IPVS: ftp: loaded support on port[0] = 21 08:45:12 executing program 0: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000022900"}, &(0x7f0000000140)=0x44) 08:45:12 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00l\x00'}, 0x2c) 08:45:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 812.590836] IPVS: ftp: loaded support on port[0] = 21 08:45:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:12 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000020000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 812.614914] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x1100]}}, 0x1c) [ 812.759886] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 812.763093] IPVS: ftp: loaded support on port[0] = 21 08:45:13 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000600"}, 0x2c) 08:45:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:13 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:13 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000110000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:13 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000280)="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", 0x1000) getsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000002540)={'broute\x00', 0x0, 0x4, 0x1000, [], 0x4, &(0x7f0000001500)=[{}, {}, {}, {}], &(0x7f0000001540)=""/4096}, &(0x7f00000025c0)=0x78) 08:45:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xffb8]}}, 0x1c) 08:45:13 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000000200"}, &(0x7f0000000140)=0x44) [ 813.022994] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 813.037870] IPVS: ftp: loaded support on port[0] = 21 08:45:13 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x9, &(0x7f0000000100)=@req3, 0x3) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000240)={0x5, {{0xa, 0x4e21, 0xfffffffffffffff7, @local={0xfe, 0x80, [], 0xaa}, 0x7}}}, 0x88) socketpair(0x10, 0x80f, 0x7f, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, [0xfffffffffffffff8, 0x6, 0x6, 0x89, 0x1, 0x1000000000000, 0x2, 0x1, 0x1ff, 0x5b, 0x6b, 0x2, 0x1000, 0x6, 0x1]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000080)={0x80, 0x7ff, 0xa, 0xffffffffffffbd0a, 0xa52, 0x100000001, 0x40, 0x5, r3}, 0x20) 08:45:13 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b0000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000010000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:13 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nqh\x00'}, 0x2c) 08:45:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x7000000]}}, 0x1c) 08:45:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 813.237447] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 813.283897] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 813.346584] IPVS: ftp: loaded support on port[0] = 21 08:45:13 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb405], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:13 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000340000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:13 executing program 0: r0 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x80, 0x800) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={0x0, 0xffffffff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={r2, 0xac, &(0x7f0000000200)=[@in={0x2, 0x4e23, @multicast1=0xe0000001}, @in6={0xa, 0x4e21, 0x3, @empty, 0x8}, @in6={0xa, 0x4e24, 0x400, @local={0xfe, 0x80, [], 0xaa}, 0x9}, @in6={0xa, 0x4e21, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x8}, @in6={0xa, 0x4e21, 0xa1, @dev={0xfe, 0x80, [], 0xd}, 0x7}, @in6={0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x3}, @in={0x2, 0x4e23, @loopback=0x7f000001}]}, &(0x7f0000000300)=0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x168, r3, 0x800, 0x70bd27, 0x25dfdbfb, {0xd}, [@IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x19}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x11}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local={0xfe, 0x80, [], 0xaa}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4697}]}, 0x168}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400c0}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x50, r3, 0x210, 0x70bd26, 0x25dfdbfc, {0x4}, [@IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x24008801}, 0x80) r4 = socket$rds(0x15, 0x5, 0x0) write$binfmt_misc(r4, &(0x7f0000000700)={'syz1', "88471b16e2ee52014d313f994db15c2921c96d19f3c76deafc9e490c7ed7c3d729176d1ee361c11ef1eff0774c927df30edab48bc8f78111c551bbd4a9bf47866d6445c40abbbad6ab8683ad56644eee3c502d5f05b74669f53ea93b889172fe957e6504032e3febbf79cfd5d4514d8deb743ef57b70325eb9"}, 0x7d) pwritev(r0, &(0x7f0000001880)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="fa9a4a05d670c66739751844d9674f49806e6cbfe9c4ac6f9712427ebeacd1710792514b3d999196fcc3be36ac09a64da80d303ba8be6edccf85592ba8bcac5a29947b278f3c774a979534d348aa30493253fb789bc68bca99d0aa9f66f41a47e5103144d2a8f80c326d405dce71518f87887e7925b7c2c379e0ebe064574de4436539f254278a58f8e620ca3318270fbacb7854766fba46342277f07e05b0c60eb7b0f944a984898ca93922ac68940ce9081357ffb37d20092ed0d1bf4e621ba39e9d822e70cf8a7c5b5bf00da688d00a2d7e359d399c4366", 0xd9}], 0x2, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000018c0)={r2, 0x8}, 0x8) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001900)=0x6, &(0x7f0000001940)=0x2) r5 = socket$inet(0x2, 0x6, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000001980)=0x80000001, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000019c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001ac0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b00)={{{@in6=@dev={0xfe, 0x80, [], 0x1b}, @in=@multicast1=0xe0000001, 0x4e24, 0x7fffffff, 0x4e22, 0x2, 0xa, 0x20, 0x20, 0xbf, r1, r7}, {0x4, 0x100000001, 0x5, 0x7, 0x8, 0x5, 0x5, 0x570}, {0x5, 0x3ff, 0x15d, 0x47}, 0x8, 0x6e6bb3, 0x0, 0x1, 0x2, 0x1}, {{@in=@rand_addr=0x5, 0x4d6, 0x6c}, 0xa, @in=@multicast1=0xe0000001, 0x0, 0x0, 0x1, 0x3, 0x3, 0x3ff, 0x2}}, 0xe8) r8 = accept4$ax25(r0, &(0x7f0000001c00), &(0x7f0000001c40)=0x10, 0x800) getpeername$ax25(r8, &(0x7f0000001c80), &(0x7f0000001cc0)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001d00)={r2, 0x1}, 0x8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000001d40)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000001dc0)={0x1, &(0x7f0000001d80)=[{0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r10, 0xc0086423, &(0x7f0000001e00)={r11, 0x3}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001e40)={@loopback={0x0, 0x1}, 0x1c, r1}) getsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000001e80), &(0x7f0000001ec0)=0x4) getpeername$packet(r0, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001f80)={r6, @empty, @multicast2=0xe0000002}, 0xc) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000001fc0)={'filter\x00'}, &(0x7f0000002040)=0x54) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000002080)={{0xaf, @local={0xac, 0x14, 0x14, 0xaa}, 0x4e20, 0x2, 'sh\x00', 0x2, 0x8, 0x7e}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e20, 0x10003, 0x7fff, 0xffffffffffffffff, 0x5}}, 0x44) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000002100)=[@in6={0xa, 0x4e21, 0x1f, @dev={0xfe, 0x80, [], 0x1a}, 0x987e}, @in6={0xa, 0x4e20, 0x42f42a96, @empty, 0x3ff}, @in6={0xa, 0x4e21, 0x631, @loopback={0x0, 0x1}, 0x63a2}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e24, 0x2, @loopback={0x0, 0x1}, 0x4}, @in={0x2, 0x4e22, @broadcast=0xffffffff}], 0xb0) ioctl$DRM_IOCTL_GEM_CLOSE(r10, 0x40086409, &(0x7f00000021c0)={r9}) 08:45:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:13 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq`\x00'}, 0x2c) 08:45:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x9]}}, 0x1c) 08:45:13 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000000600"}, &(0x7f0000000140)=0x44) [ 813.554995] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 813.587501] IPVS: ftp: loaded support on port[0] = 21 08:45:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000020000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:14 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:14 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000008400"}, 0x2c) 08:45:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x8000000000000000]}}, 0x1c) 08:45:14 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x8001) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket(0xc, 0x0, 0xfffffffffffffff8) sendmsg$rds(r1, &(0x7f0000004e00)={&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/159, 0x9f}, {&(0x7f0000000280)=""/218, 0xda}, {&(0x7f0000000100)=""/161, 0xa1}, {&(0x7f0000000380)=""/80, 0x50}, {&(0x7f0000000400)=""/200, 0xc8}, {&(0x7f0000000500)=""/139, 0x8b}], 0x6, &(0x7f0000004c80)=[@cswp={0x58, 0x114, 0x7, {{0x8001, 0xfffffffffffffffd}, &(0x7f0000000200)=0x939, &(0x7f0000000640)=0x1, 0xcc7, 0xffffffffffffffff, 0x5c, 0xa56, 0x1, 0x40}}, @rdma_args={0x48, 0x114, 0x1, {{0xbd}, {&(0x7f0000000680)=""/4096, 0x1000}, &(0x7f0000004ac0)=[{&(0x7f0000001680)=""/4096, 0x1000}, {&(0x7f0000002680)=""/183, 0xb7}, {&(0x7f0000002740)=""/26, 0x1a}, {&(0x7f0000002780)=""/136, 0x88}, {&(0x7f0000002840)=""/216, 0xd8}, {&(0x7f0000002940)=""/209, 0xd1}, {&(0x7f0000002a40)=""/38, 0x26}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/41, 0x29}], 0xa, 0x12, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x200, 0x2}, &(0x7f0000004b80)=0x6, &(0x7f0000004bc0)=0x100000001, 0x9, 0x7, 0x5, 0x2, 0x1a, 0x6fcc}}, @rdma_dest={0x18, 0x114, 0x2, {0x5, 0x9}}, @mask_fadd={0x58, 0x114, 0x8, {{0x0, 0x8}, &(0x7f0000004c00)=0x9, &(0x7f0000004c40)=0xffff, 0x3, 0x5, 0x2, 0x3, 0x70}}], 0x168, 0x4040}, 0xc000) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x5, &(0x7f00003dd000)=""/13, &(0x7f00000001c0)=0xffffffc7) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000004e40)={0x8, 0xca}, 0x2) 08:45:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) 08:45:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000004000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 813.791486] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 813.807700] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 813.891398] IPVS: ftp: loaded support on port[0] = 21 08:45:14 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:14 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000000400"}, 0x2c) 08:45:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) 08:45:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000104000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) readv(r0, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f00000000c0)=""/70, 0x46}], 0x3) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0xffffffffffffff81, @mcast2={0xff, 0x2, [], 0x1}, 0x3}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x880}, &(0x7f0000000280)=0x8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x14) 08:45:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0xb000000]}}, 0x1c) 08:45:14 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000036c00"}, &(0x7f0000000140)=0x44) [ 814.067587] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 814.100484] IPVS: ftp: loaded support on port[0] = 21 08:45:14 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x64) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) sendto$llc(r2, &(0x7f00000000c0)="d36ed14b7155d0d6b154997cc805707adbc1ded300251eb87725a9b930ee0b717306e10f7fa3b17406969c95e924eff68e6d28b45e95feacca1b978301fdccaa30e5e6186df77f0c7e5ed70ffe3e69382c1c1a991704fe537be6de460fc3708845215e11407bff2654b0120ad88bf60c", 0x70, 0x0, 0x0, 0x0) 08:45:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) 08:45:14 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000040000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:14 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e717fffffff00"}, 0x2c) [ 814.145789] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:14 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000014c0)="2ba75e2556057f82c8cd17f5b17d80047f233bbfd229499ea02a2f4728874ef22c10799b326f07f25e422ffb352e0893ff057309be87d99ca513d1990ff1a4762e6b973ceb59295ea114e868483e221a5032feb049b7886a59b2adbbd31a2153d613093c3b15b3cd6e225b7a740a8cb37b4baca5d225c8928e57ef27c7a1bf47", 0x80}], 0x1, &(0x7f0000001300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) read(r1, &(0x7f0000001340)=""/195, 0xc3) recvmsg(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000f7ffa8)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000001240)=""/87, 0x57}, 0x0) [ 814.288506] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 814.397432] IPVS: ftp: loaded support on port[0] = 21 08:45:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:14 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:14 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000200000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1000000000000000]}}, 0x1c) 08:45:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000000500"}, 0x2c) 08:45:14 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00z\x00'}, &(0x7f0000000140)=0x44) 08:45:14 executing program 0: r0 = socket(0x7, 0x3, 0x7) write(r0, &(0x7f0000000000)="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", 0xfc) [ 814.505426] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 814.538486] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 814.582826] IPVS: ftp: loaded support on port[0] = 21 08:45:14 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00z\x00'}, 0x2c) 08:45:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000ffffffff0000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 814.700594] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000010000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x6000000]}}, 0x1c) 08:45:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x2c) [ 814.888710] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 814.901576] IPVS: ftp: loaded support on port[0] = 21 [ 814.950315] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5b4], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100001000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00h\x00'}, 0x2c) 08:45:15 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000080)={0x2, 0x7}) ioctl(r0, 0x6, &(0x7f0000000040)="0047fc2f07d82c00c57b2c") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x3, 0x0, 0x10001, 0xfff}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000100)={0x6, r2}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000044ff8)) getpeername(r0, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x80) 08:45:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x4002]}}, 0x1c) 08:45:15 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572f00300"}, &(0x7f0000000140)=0x44) 08:45:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000001000)=ANY=[@ANYRES16], &(0x7f0000000100)='GPL\x00', 0x7}, 0x48) [ 815.162501] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 815.197116] IPVS: ftp: loaded support on port[0] = 21 08:45:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100034000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00L\x00'}, 0x2c) 08:45:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3e8]}}, 0x1c) 08:45:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 815.381173] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 815.529775] IPVS: ftp: loaded support on port[0] = 21 08:45:15 executing program 0: r0 = socket(0xf, 0x6, 0x6) accept$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") socket$inet6_sctp(0xa, 0x5, 0x84) 08:45:15 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100200000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb405000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xeffe000000000000]}}, 0x1c) 08:45:15 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00L\x00'}, 0x2c) 08:45:15 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572fe0300"}, &(0x7f0000000140)=0x44) 08:45:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 815.645390] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 815.647645] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 815.682398] IPVS: ftp: loaded support on port[0] = 21 08:45:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100400300000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(seed)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000016c0)=[{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000004b00)="877488460455363a89fb7f81ba1fd3d7aa15ccad42aa08d6f6c964978c685df9", 0x20}], 0x1, &(0x7f0000001640)}], 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000000)={r0, 0x7f2b, 0x7ff, "ccccdb77b8bc8fa211635845997bb67a814f74675f119276b83f0611"}) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/87, 0xfffffffffffffd7e}, 0x0) r1 = socket(0x1f, 0x3, 0x8) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000001}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x800, 0x70bd27, 0x25dfdbff, {0x2}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40004) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000003c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000440)={0x1, &(0x7f0000000400)=[{0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000580)={r4, &(0x7f0000000480)=""/241}) 08:45:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000102000000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00z\x00'}, 0x2c) [ 815.918451] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 815.983319] IPVS: ftp: loaded support on port[0] = 21 08:45:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb4050000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:16 executing program 0: syz_emit_ethernet(0x42, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa008105000000000000009c00082b00fe8000000000000000000000000000bbfe8000000000000000000000000000aa00005eea6c477e7c"], &(0x7f0000000040)={0x0, 0x0, [0x0, 0x0, 0x0, 0x8000]}) r0 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast2=0xe0000002}}}, &(0x7f00000001c0)=0x84) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000380)={0x0, 0x0, 0x8000}, 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0x9, 0x800, 0x7, 0x6, 0x5}, &(0x7f0000000240)=0x14) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000280)=0xfffffffffffffffe) 08:45:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x700000000000000]}}, 0x1c) 08:45:16 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003fc00"}, &(0x7f0000000140)=0x44) 08:45:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000002000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nqL\x00'}, 0x2c) 08:45:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket(0xb, 0x800, 0x7) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000000206ff000000000000000000000069f7fa40fe1f86287903ff6fbd7ae0de512cb446b253e0cb6e7604506c0f778698465bc44a69111278327929ad1b09dabab3d61e2571d3be0c0dae4b2c0b54bff8cbd76ab245bf28e65846e09bfd9657213d3d1cd97aad07368d90c8d7fb17be793acb2ef33ab224e9973887fb74c7cc0000000000000000000000000000"], 0x14}, 0x1}, 0x0) 08:45:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000007fffffff0000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 816.098007] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 816.119798] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 816.142722] IPVS: ftp: loaded support on port[0] = 21 08:45:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00H\x00'}, 0x2c) 08:45:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 816.297126] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 816.437984] IPVS: ftp: loaded support on port[0] = 21 08:45:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000001000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe00000000000000]}}, 0x1c) 08:45:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:16 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\a\x00'}, 0x2c) 08:45:16 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003f600"}, &(0x7f0000000140)=0x44) 08:45:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 816.548997] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 816.575674] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100004003000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 816.597567] IPVS: ftp: loaded support on port[0] = 21 08:45:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:16 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\t\x00'}, 0x2c) [ 816.781253] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 816.901464] IPVS: ftp: loaded support on port[0] = 21 08:45:17 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000003400000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2000000]}}, 0x1c) 08:45:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:17 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000003fd00"}, &(0x7f0000000140)=0x44) 08:45:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e718f0400"}, 0x2c) [ 816.984934] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 816.995486] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:17 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 817.039914] IPVS: ftp: loaded support on port[0] = 21 08:45:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000010000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nql\x00'}, 0x2c) 08:45:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:17 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 817.200627] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x4000000]}}, 0x1c) 08:45:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100020000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00`\x00'}, 0x2c) [ 817.363693] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 817.366304] IPVS: ftp: loaded support on port[0] = 21 [ 817.401265] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:17 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:17 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000020000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1100]}}, 0x1c) 08:45:17 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\a\x00'}, 0x2c) 08:45:17 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000003d800"}, &(0x7f0000000140)=0x44) 08:45:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 817.669464] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 817.691845] IPVS: ftp: loaded support on port[0] = 21 08:45:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001007fffffff0000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:18 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 817.718287] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00H\x00'}, 0x2c) 08:45:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 817.920335] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 818.025170] IPVS: ftp: loaded support on port[0] = 21 08:45:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000340000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:18 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00c\x00'}, 0x2c) 08:45:18 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000003f600"}, &(0x7f0000000140)=0x44) 08:45:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe803]}}, 0x1c) 08:45:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 818.150163] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000400000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 818.203913] IPVS: ftp: loaded support on port[0] = 21 08:45:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:18 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x9]}}, 0x1c) 08:45:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e718400"}, 0x2c) [ 818.400116] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 818.522444] IPVS: ftp: loaded support on port[0] = 21 08:45:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000000000ffffffff00000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:18 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x80301000]}}, 0x1c) 08:45:18 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:18 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00h\x00'}, 0x2c) 08:45:18 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657202b800"}, &(0x7f0000000140)=0x44) 08:45:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 818.614569] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 818.641884] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000100000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:19 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:19 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 818.678915] IPVS: ftp: loaded support on port[0] = 21 08:45:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nqz\x00'}, 0x2c) 08:45:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000200000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 818.852804] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 819.027143] IPVS: ftp: loaded support on port[0] = 21 08:45:19 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:19 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000007fffffff00000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x801004d1]}}, 0x1c) 08:45:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:19 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000002b800"}, &(0x7f0000000140)=0x44) 08:45:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000000100"}, 0x2c) 08:45:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000002000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:19 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 819.127231] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 819.195308] IPVS: ftp: loaded support on port[0] = 21 08:45:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:19 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x54550100]}}, 0x1c) 08:45:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00t\x00'}, 0x2c) 08:45:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000010000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:19 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 819.346599] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 819.351974] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:19 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:19 executing program 0: socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 819.499767] IPVS: ftp: loaded support on port[0] = 21 08:45:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:19 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000001100"}, 0x2c) 08:45:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000200000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:19 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:19 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:19 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd100]}}, 0x1c) 08:45:19 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000001d00"}, &(0x7f0000000140)=0x44) [ 819.680348] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:20 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100002000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 819.733708] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 819.735245] IPVS: ftp: loaded support on port[0] = 21 08:45:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71008400"}, 0x2c) 08:45:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100040000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 819.894663] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:20 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nqc\x00'}, 0x2c) 08:45:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000100000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffffffffffffff]}}, 0x1c) 08:45:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 820.068122] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 820.106963] IPVS: ftp: loaded support on port[0] = 21 08:45:20 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000300"}, &(0x7f0000000140)=0x44) 08:45:20 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe0], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000040000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000000300"}, 0x2c) 08:45:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x8]}}, 0x1c) 08:45:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 820.344082] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100100000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 820.384328] IPVS: ftp: loaded support on port[0] = 21 08:45:20 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffff8d]}}, 0x1c) 08:45:20 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00c\x00'}, 0x2c) 08:45:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:20 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 820.586190] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 820.639390] IPVS: ftp: loaded support on port[0] = 21 08:45:21 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003d800"}, &(0x7f0000000140)=0x44) 08:45:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xaaaa]}}, 0x1c) 08:45:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000040030000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00h\x00'}, 0x2c) 08:45:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 820.830654] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 820.842975] IPVS: ftp: loaded support on port[0] = 21 08:45:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x200000000000000]}}, 0x1c) 08:45:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000001000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00t\x00'}, 0x2c) 08:45:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 821.012380] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 821.139755] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 821.276731] IPVS: ftp: loaded support on port[0] = 21 08:45:21 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000018800"}, &(0x7f0000000140)=0x44) 08:45:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000002000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:21 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\n\x00'}, 0x2c) 08:45:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd1041080]}}, 0x1c) [ 821.409892] IPVS: ftp: loaded support on port[0] = 21 08:45:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000400000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd2]}}, 0x1c) 08:45:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100001000000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:21 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:21 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x500]}}, 0x1c) [ 821.575517] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 821.691845] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 821.786484] IPVS: ftp: loaded support on port[0] = 21 08:45:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xcf00000000000000]}}, 0x1c) 08:45:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000200000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710500"}, 0x2c) 08:45:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:22 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00z\x00'}, &(0x7f0000000140)=0x44) 08:45:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:22 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 821.948583] IPVS: ftp: loaded support on port[0] = 21 08:45:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000004000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:22 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 821.982145] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 821.990064] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710200"}, 0x2c) 08:45:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000000000ffffffff000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:22 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4050000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 822.301937] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 822.392354] IPVS: ftp: loaded support on port[0] = 21 08:45:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x8000000]}}, 0x1c) 08:45:22 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000000600"}, 0x2c) 08:45:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:22 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000003fe00"}, &(0x7f0000000140)=0x44) 08:45:22 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000000000007fffffff000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000002000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:22 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 822.508622] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 822.523319] IPVS: ftp: loaded support on port[0] = 21 08:45:22 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000003400000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:22 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000034000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 822.691737] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 822.890350] IPVS: ftp: loaded support on port[0] = 21 08:45:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x9000000]}}, 0x1c) 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000001000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:23 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000600"}, &(0x7f0000000140)=0x44) 08:45:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:23 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710400"}, 0x2c) 08:45:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:23 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 822.990503] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 823.011256] IPVS: ftp: loaded support on port[0] = 21 [ 823.019283] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000200000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710d0100"}, 0x2c) 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 823.199663] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 823.368311] IPVS: ftp: loaded support on port[0] = 21 08:45:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x300]}}, 0x1c) 08:45:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00L\x00'}, 0x2c) 08:45:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:23 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572fc0300"}, &(0x7f0000000140)=0x44) 08:45:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100007fffffff00000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:23 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x76, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}]}]}}}}}}}, &(0x7f0000000000)) [ 823.461679] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 823.485496] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {}]}]}}}}}}}, &(0x7f0000000000)) 08:45:23 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 823.519705] IPVS: ftp: loaded support on port[0] = 21 08:45:23 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000100000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:23 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x2c) 08:45:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {}]}]}}}}}}}, &(0x7f0000000000)) 08:45:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) [ 823.691404] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 823.822392] IPVS: ftp: loaded support on port[0] = 21 08:45:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff00]}}, 0x1c) 08:45:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00 \x00'}, 0x2c) 08:45:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {}]}]}}}}}}}, &(0x7f0000000000)) 08:45:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:24 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572840100"}, &(0x7f0000000140)=0x44) 08:45:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000020000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 823.955392] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 823.981223] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb405000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:24 executing program 7: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000018800"}, &(0x7f0000000140)=0x44) 08:45:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000400000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 824.011703] IPVS: ftp: loaded support on port[0] = 21 08:45:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000000200"}, 0x2c) [ 824.115150] IPVS: ftp: loaded support on port[0] = 21 08:45:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000020000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 824.202582] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 824.339181] IPVS: ftp: loaded support on port[0] = 21 08:45:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x4]}}, 0x1c) 08:45:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\n\x00'}, 0x2c) 08:45:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:24 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00^\x00'}, &(0x7f0000000140)=0x44) 08:45:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000100000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:24 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 824.504183] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:24 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:24 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:24 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000007fffffff00"}, 0x2c) [ 824.562640] IPVS: ftp: loaded support on port[0] = 21 [ 824.687948] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 824.791847] IPVS: ftp: loaded support on port[0] = 21 08:45:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd200]}}, 0x1c) 08:45:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000010000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x0, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:25 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:25 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572001d00"}, &(0x7f0000000140)=0x44) 08:45:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00z\x00'}, 0x2c) [ 824.880527] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 824.895338] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:25 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x0, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000200000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 824.956049] IPVS: ftp: loaded support on port[0] = 21 08:45:25 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:25 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000000500"}, 0x2c) 08:45:25 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x0, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000010000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:25 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572e800"}, &(0x7f0000000140)=0x44) 08:45:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfec0]}}, 0x1c) [ 825.167221] IPVS: ftp: loaded support on port[0] = 21 08:45:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x0, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 825.267473] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:25 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000340000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa]}}, 0x1c) [ 825.341712] IPVS: ftp: loaded support on port[0] = 21 08:45:25 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:25 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00t\x00'}, 0x2c) 08:45:25 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000020000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 825.485264] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:25 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 825.688183] IPVS: ftp: loaded support on port[0] = 21 08:45:26 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa00]}}, 0x1c) 08:45:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71001100"}, 0x2c) 08:45:26 executing program 7 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000001000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:26 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000000e800"}, &(0x7f0000000140)=0x44) 08:45:26 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 825.801874] FAULT_INJECTION: forcing a failure. [ 825.801874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 825.802257] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 825.813844] CPU: 1 PID: 25705 Comm: syz-executor7 Not tainted 4.17.0-rc7+ #81 [ 825.830990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.840344] Call Trace: [ 825.842938] dump_stack+0x1b9/0x294 [ 825.846574] ? dump_stack_print_info.cold.2+0x52/0x52 [ 825.851788] should_fail.cold.4+0xa/0x1a [ 825.855867] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 825.860991] ? debug_check_no_locks_freed+0x310/0x310 [ 825.866195] ? __lock_acquire+0x7f5/0x5140 [ 825.870438] ? check_noncircular+0x20/0x20 [ 825.874690] ? debug_check_no_locks_freed+0x310/0x310 [ 825.879902] __alloc_pages_nodemask+0x34e/0xd70 [ 825.884581] ? __lock_acquire+0x7f5/0x5140 [ 825.888820] ? kasan_slab_alloc+0x12/0x20 [ 825.892972] ? kmem_cache_alloc+0x12e/0x760 [ 825.897298] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 825.902320] ? print_usage_bug+0xc0/0xc0 [ 825.906387] ? graph_lock+0x170/0x170 [ 825.910296] ? __lock_acquire+0x7f5/0x5140 [ 825.914607] ? __lock_acquire+0x7f5/0x5140 [ 825.918843] ? graph_lock+0x170/0x170 [ 825.922641] ? lock_acquire+0x1dc/0x520 [ 825.926617] ? __lock_acquire+0x7f5/0x5140 [ 825.930853] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 825.936389] alloc_pages_current+0x10c/0x210 [ 825.940801] skb_page_frag_refill+0x453/0x6a0 [ 825.945299] ? sock_kzfree_s+0x60/0x60 [ 825.949189] ? kasan_check_read+0x11/0x20 [ 825.953330] ? rcu_is_watching+0x85/0x140 [ 825.957475] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 825.962672] tun_build_skb.isra.53+0x354/0x2250 [ 825.967434] ? print_usage_bug+0xc0/0xc0 [ 825.971493] ? tun_device_event+0x1020/0x1020 [ 825.975983] ? print_usage_bug+0xc0/0xc0 [ 825.980038] ? __wake_up_common_lock+0x1c2/0x300 [ 825.984796] ? lock_acquire+0x1dc/0x520 [ 825.988770] ? alloc_set_pte+0x1013/0x1600 [ 825.993001] ? graph_lock+0x170/0x170 [ 825.996798] ? print_usage_bug+0xc0/0xc0 [ 826.000865] ? reacquire_held_locks+0xbc/0x3e0 [ 826.005447] ? alloc_set_pte+0x1013/0x1600 [ 826.009682] ? print_usage_bug+0xc0/0xc0 [ 826.013747] ? print_usage_bug+0xc0/0xc0 [ 826.017808] ? lock_downgrade+0x8e0/0x8e0 [ 826.021985] ? print_usage_bug+0xc0/0xc0 [ 826.026039] ? print_usage_bug+0xc0/0xc0 [ 826.030100] ? __lock_acquire+0x7f5/0x5140 [ 826.034337] ? debug_check_no_locks_freed+0x310/0x310 [ 826.039534] ? print_usage_bug+0xc0/0xc0 [ 826.043615] ? debug_check_no_locks_freed+0x310/0x310 [ 826.048806] ? __lock_acquire+0x7f5/0x5140 [ 826.053052] tun_get_user+0xc47/0x42c0 [ 826.056960] ? debug_check_no_locks_freed+0x310/0x310 [ 826.062163] ? tun_build_skb.isra.53+0x2250/0x2250 [ 826.067092] ? print_usage_bug+0xc0/0xc0 [ 826.071153] ? graph_lock+0x170/0x170 [ 826.074957] ? graph_lock+0x170/0x170 [ 826.078758] ? lock_acquire+0x1dc/0x520 [ 826.082729] ? __fdget_pos+0x1a9/0x1e0 [ 826.086616] ? find_held_lock+0x36/0x1c0 [ 826.090683] ? lock_downgrade+0x8e0/0x8e0 [ 826.094849] ? kasan_check_read+0x11/0x20 [ 826.099005] ? rcu_is_watching+0x85/0x140 [ 826.103173] ? tun_get+0x22b/0x360 [ 826.106709] ? tun_chr_close+0x180/0x180 [ 826.110781] tun_chr_write_iter+0xb9/0x154 [ 826.115017] do_iter_readv_writev+0x859/0xa50 [ 826.119512] ? vfs_dedupe_file_range+0xa00/0xa00 [ 826.124269] ? rw_verify_area+0x118/0x360 [ 826.128415] do_iter_write+0x185/0x5f0 [ 826.132301] ? dup_iter+0x270/0x270 [ 826.135932] vfs_writev+0x1c7/0x330 [ 826.139560] ? vfs_iter_write+0xb0/0xb0 [ 826.143540] ? wait_for_completion+0x870/0x870 [ 826.148136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:45:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x600]}}, 0x1c) 08:45:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 826.153670] ? __fdget_pos+0xd6/0x1e0 [ 826.157470] ? __fdget_raw+0x20/0x20 [ 826.161187] ? __sb_end_write+0xac/0xe0 [ 826.165167] do_writev+0x112/0x2f0 [ 826.168717] ? vfs_writev+0x330/0x330 [ 826.172524] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 826.178069] __x64_sys_writev+0x75/0xb0 [ 826.182047] do_syscall_64+0x1b1/0x800 [ 826.185943] ? finish_task_switch+0x1ca/0x840 [ 826.190446] ? syscall_return_slowpath+0x5c0/0x5c0 [ 826.195380] ? syscall_return_slowpath+0x30f/0x5c0 [ 826.200322] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 826.205691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.210542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.215729] RIP: 0033:0x4558c1 [ 826.218919] RSP: 002b:00007fe57a2bbba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 826.226627] RAX: ffffffffffffffda RBX: 000000000000007e RCX: 00000000004558c1 [ 826.230903] IPVS: ftp: loaded support on port[0] = 21 [ 826.233889] RDX: 0000000000000001 RSI: 00007fe57a2bbbf0 RDI: 00000000000000fc [ 826.233899] RBP: 0000000020000040 R08: 00000000000000fc R09: 0000000000000000 [ 826.233907] R10: 000000000000007e R11: 0000000000000293 R12: 0000000000000014 [ 826.233916] R13: 000000000000073e R14: 00000000006ffe70 R15: 0000000000000000 [ 826.269197] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 826.289546] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 826.416255] IPVS: ftp: loaded support on port[0] = 21 08:45:26 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:26 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 08:45:26 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\n\x00'}, 0x2c) 08:45:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000034000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:26 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003f000"}, &(0x7f0000000140)=0x44) 08:45:26 executing program 7 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x250076c7]}}, 0x1c) [ 826.539281] FAULT_INJECTION: forcing a failure. [ 826.539281] name failslab, interval 1, probability 0, space 0, times 0 [ 826.550581] CPU: 0 PID: 25740 Comm: syz-executor7 Not tainted 4.17.0-rc7+ #81 [ 826.557854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.567204] Call Trace: [ 826.569796] dump_stack+0x1b9/0x294 [ 826.573376] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 826.573561] ? dump_stack_print_info.cold.2+0x52/0x52 [ 826.580796] IPVS: ftp: loaded support on port[0] = 21 [ 826.584337] ? debug_check_no_locks_freed+0x310/0x310 [ 826.584364] should_fail.cold.4+0xa/0x1a [ 826.584383] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 826.584404] ? debug_check_no_locks_freed+0x310/0x310 [ 826.584421] ? rcu_pm_notify+0xc0/0xc0 [ 826.612962] ? rcu_read_lock_sched_held+0x108/0x120 [ 826.617989] ? __alloc_pages_nodemask+0xacf/0xd70 [ 826.622836] ? graph_lock+0x170/0x170 [ 826.626645] ? kmem_cache_alloc+0x12e/0x760 [ 826.630981] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 826.636020] ? print_usage_bug+0xc0/0xc0 [ 826.640088] ? find_held_lock+0x36/0x1c0 [ 826.644163] __should_failslab+0x124/0x180 [ 826.648400] should_failslab+0x9/0x14 [ 826.652241] kmem_cache_alloc+0x47/0x760 [ 826.656315] __build_skb+0xa3/0x410 [ 826.659946] ? skb_try_coalesce+0x1c70/0x1c70 [ 826.664443] ? graph_lock+0x170/0x170 [ 826.668248] ? lock_acquire+0x1dc/0x520 [ 826.672229] ? tun_build_skb.isra.53+0x494/0x2250 [ 826.677086] build_skb+0x6f/0x2e0 [ 826.680643] ? __build_skb+0x410/0x410 [ 826.684560] tun_build_skb.isra.53+0x899/0x2250 08:45:27 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000000400"}, 0x2c) 08:45:27 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff0f000000000000]}}, 0x1c) 08:45:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) [ 826.689239] ? tun_device_event+0x1020/0x1020 [ 826.693739] ? print_usage_bug+0xc0/0xc0 [ 826.697800] ? __wake_up_common_lock+0x1c2/0x300 [ 826.702564] ? lock_acquire+0x1dc/0x520 [ 826.706544] ? alloc_set_pte+0x1013/0x1600 [ 826.710791] ? graph_lock+0x170/0x170 [ 826.714591] ? print_usage_bug+0xc0/0xc0 [ 826.718894] ? reacquire_held_locks+0xbc/0x3e0 [ 826.723478] ? alloc_set_pte+0x1013/0x1600 [ 826.727715] ? print_usage_bug+0xc0/0xc0 [ 826.731785] ? print_usage_bug+0xc0/0xc0 [ 826.736075] ? lock_downgrade+0x8e0/0x8e0 [ 826.740229] ? print_usage_bug+0xc0/0xc0 [ 826.744308] ? print_usage_bug+0xc0/0xc0 [ 826.748374] ? __lock_acquire+0x7f5/0x5140 [ 826.752606] ? debug_check_no_locks_freed+0x310/0x310 [ 826.757798] ? print_usage_bug+0xc0/0xc0 [ 826.757820] ? debug_check_no_locks_freed+0x310/0x310 [ 826.757833] ? __lock_acquire+0x7f5/0x5140 [ 826.757856] tun_get_user+0xc47/0x42c0 [ 826.757875] ? debug_check_no_locks_freed+0x310/0x310 [ 826.757902] ? tun_build_skb.isra.53+0x2250/0x2250 [ 826.757914] ? print_usage_bug+0xc0/0xc0 08:45:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) [ 826.757929] ? graph_lock+0x170/0x170 [ 826.776849] IPVS: ftp: loaded support on port[0] = 21 [ 826.780424] ? graph_lock+0x170/0x170 [ 826.780440] ? lock_acquire+0x1dc/0x520 [ 826.780454] ? __fdget_pos+0x1a9/0x1e0 [ 826.780472] ? find_held_lock+0x36/0x1c0 [ 826.780495] ? lock_downgrade+0x8e0/0x8e0 [ 826.780517] ? kasan_check_read+0x11/0x20 [ 826.780532] ? rcu_is_watching+0x85/0x140 [ 826.780554] ? tun_get+0x22b/0x360 [ 826.830173] ? tun_chr_close+0x180/0x180 [ 826.834252] tun_chr_write_iter+0xb9/0x154 [ 826.838496] do_iter_readv_writev+0x859/0xa50 [ 826.843001] ? vfs_dedupe_file_range+0xa00/0xa00 [ 826.847888] ? rw_verify_area+0x118/0x360 [ 826.852040] do_iter_write+0x185/0x5f0 [ 826.855950] ? dup_iter+0x270/0x270 [ 826.859599] vfs_writev+0x1c7/0x330 [ 826.863229] ? vfs_iter_write+0xb0/0xb0 [ 826.867219] ? wait_for_completion+0x870/0x870 [ 826.871820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 826.877361] ? __fdget_pos+0xd6/0x1e0 [ 826.881168] ? __fdget_raw+0x20/0x20 [ 826.884881] ? __sb_end_write+0xac/0xe0 08:45:27 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 826.888861] do_writev+0x112/0x2f0 [ 826.892406] ? vfs_writev+0x330/0x330 [ 826.896214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 826.901777] __x64_sys_writev+0x75/0xb0 [ 826.905760] do_syscall_64+0x1b1/0x800 [ 826.909649] ? finish_task_switch+0x1ca/0x840 [ 826.914148] ? syscall_return_slowpath+0x5c0/0x5c0 [ 826.919078] ? syscall_return_slowpath+0x30f/0x5c0 [ 826.919100] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 826.919121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.919142] entry_SYSCALL_64_after_hwframe+0x49/0xbe 08:45:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000002000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 826.919154] RIP: 0033:0x4558c1 [ 826.919162] RSP: 002b:00007fe57a2bbba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 826.919178] RAX: ffffffffffffffda RBX: 000000000000007e RCX: 00000000004558c1 [ 826.919187] RDX: 0000000000000001 RSI: 00007fe57a2bbbf0 RDI: 00000000000000fc [ 826.919195] RBP: 0000000020000040 R08: 00000000000000fc R09: 0000000000000000 [ 826.919203] R10: 000000000000007e R11: 0000000000000293 R12: 0000000000000014 [ 826.919212] R13: 000000000000073e R14: 00000000006ffe70 R15: 0000000000000001 08:45:27 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:27 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000000300"}, &(0x7f0000000140)=0x44) [ 827.018339] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 827.058017] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:27 executing program 7 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 827.111583] IPVS: ftp: loaded support on port[0] = 21 [ 827.220115] FAULT_INJECTION: forcing a failure. [ 827.220115] name failslab, interval 1, probability 0, space 0, times 0 [ 827.231418] CPU: 0 PID: 25788 Comm: syz-executor7 Not tainted 4.17.0-rc7+ #81 [ 827.238705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.243937] IPVS: ftp: loaded support on port[0] = 21 [ 827.248074] Call Trace: [ 827.248098] dump_stack+0x1b9/0x294 [ 827.248117] ? dump_stack_print_info.cold.2+0x52/0x52 [ 827.248136] ? fib_insert_alias+0x11d0/0x11d0 [ 827.248177] should_fail.cold.4+0xa/0x1a [ 827.273370] ? graph_lock+0x170/0x170 [ 827.277190] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 827.282320] ? graph_lock+0x170/0x170 [ 827.286133] ? debug_check_no_locks_freed+0x310/0x310 [ 827.291336] ? find_held_lock+0x36/0x1c0 [ 827.295531] ? graph_lock+0x170/0x170 [ 827.299354] ? lock_downgrade+0x8e0/0x8e0 [ 827.303514] ? __lock_is_held+0xb5/0x140 [ 827.307597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.313143] __should_failslab+0x124/0x180 [ 827.317501] should_failslab+0x9/0x14 [ 827.321328] kmem_cache_alloc+0x47/0x760 [ 827.325403] skb_clone+0x1ed/0x4f0 [ 827.328949] ? skb_split+0x11d0/0x11d0 [ 827.332850] ? lock_downgrade+0x8e0/0x8e0 [ 827.337127] ip6_err_gen_icmpv6_unreach+0x164/0x8a0 [ 827.342162] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 827.347356] ? icmp6_send+0x2da0/0x2da0 [ 827.351344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.356881] ? ipip_err+0x3a9/0xce0 [ 827.360519] ipip6_err+0x3c3/0x990 [ 827.364068] ? ipip6_tunnel_lookup+0x1190/0x1190 [ 827.368840] tunnel4_err+0x182/0x320 [ 827.372557] ? xfrm4_tunnel_deregister+0x1a0/0x1a0 [ 827.377484] ? __lock_is_held+0xb5/0x140 [ 827.381550] ? xfrm4_tunnel_deregister+0x1a0/0x1a0 [ 827.386480] icmp_socket_deliver+0x27a/0x450 [ 827.390892] ? icmpv4_global_allow+0xf0/0xf0 [ 827.395307] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 827.400496] icmp_unreach+0x3b4/0xc40 [ 827.404303] ? icmpv4_xrlim_allow.isra.20+0x540/0x540 [ 827.409504] icmp_rcv+0x8b1/0x1560 [ 827.413054] ip_local_deliver_finish+0x2e3/0xd80 [ 827.417815] ? inet_add_protocol.cold.0+0x21/0x21 [ 827.422664] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 827.427675] ? nf_hook_slow+0x11e/0x1c0 [ 827.431650] ip_local_deliver+0x1e1/0x720 [ 827.435799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 827.441337] ? ip_call_ra_chain+0x720/0x720 [ 827.445667] ? inet_add_protocol.cold.0+0x21/0x21 [ 827.450520] ip_rcv_finish+0x81b/0x2200 [ 827.454502] ? ip_local_deliver_finish+0xd80/0xd80 [ 827.459445] ? lock_downgrade+0x8e0/0x8e0 [ 827.463601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 827.469281] ? kasan_check_read+0x11/0x20 [ 827.473431] ? rcu_is_watching+0x85/0x140 [ 827.477578] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 827.482767] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 827.487780] ? nf_hook_slow+0x11e/0x1c0 [ 827.491755] ip_rcv+0x9fe/0x125c [ 827.495123] ? ip_local_deliver+0x720/0x720 [ 827.499445] ? __save_stack_trace+0x7e/0xd0 [ 827.503776] ? ip_local_deliver_finish+0xd80/0xd80 [ 827.508705] ? ip_local_deliver+0x720/0x720 [ 827.513032] __netif_receive_skb_core+0x2468/0x3650 [ 827.518054] ? nf_ingress+0xa00/0xa00 [ 827.521858] ? __lock_acquire+0x7f5/0x5140 [ 827.526098] ? kmem_cache_alloc+0x12e/0x760 [ 827.530419] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 827.535439] ? debug_check_no_locks_freed+0x310/0x310 [ 827.540628] ? __lock_acquire+0x7f5/0x5140 [ 827.544869] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 827.550061] ? __skb_flow_dissect+0xba1/0x45e0 [ 827.554639] ? kmem_cache_alloc+0x5fa/0x760 [ 827.558970] ? find_held_lock+0x36/0x1c0 [ 827.563039] ? lock_downgrade+0x8e0/0x8e0 [ 827.567199] ? pvclock_read_flags+0x160/0x160 [ 827.571775] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 827.576802] ? tun_build_skb.isra.53+0xaee/0x2250 [ 827.581652] ? __local_bh_enable_ip+0x161/0x230 [ 827.586325] ? ktime_get_with_offset+0x395/0x4a0 [ 827.591089] ? lock_acquire+0x1dc/0x520 [ 827.595066] ? netif_receive_skb_internal+0xa2/0x7b0 [ 827.600188] ? kasan_check_read+0x11/0x20 [ 827.604336] ? rcu_is_watching+0x85/0x140 [ 827.608486] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 827.613678] __netif_receive_skb+0x2c/0x1e0 [ 827.618003] netif_receive_skb_internal+0x126/0x7b0 [ 827.623020] ? dev_cpu_dead+0xad0/0xad0 [ 827.626997] ? kasan_check_read+0x11/0x20 [ 827.631140] ? rcu_is_watching+0x85/0x140 [ 827.635289] ? reacquire_held_locks+0xbc/0x3e0 [ 827.639870] ? rcu_pm_notify+0xc0/0xc0 [ 827.643779] netif_receive_skb+0xba/0x400 [ 827.647929] ? netif_receive_skb_internal+0x7b0/0x7b0 [ 827.653119] ? find_held_lock+0x36/0x1c0 [ 827.657184] ? tun_rx_batched.isra.54+0x494/0x8c0 [ 827.662028] tun_rx_batched.isra.54+0x4ba/0x8c0 [ 827.666696] ? tun_sock_write_space+0x390/0x390 [ 827.671362] ? kasan_check_read+0x11/0x20 [ 827.675514] ? __local_bh_enable_ip+0x161/0x230 [ 827.680288] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 827.685302] ? tun_get_user+0x2fd5/0x42c0 [ 827.689461] tun_get_user+0x2ad0/0x42c0 [ 827.693437] ? debug_check_no_locks_freed+0x310/0x310 [ 827.698637] ? tun_build_skb.isra.53+0x2250/0x2250 [ 827.703563] ? print_usage_bug+0xc0/0xc0 [ 827.707625] ? graph_lock+0x170/0x170 [ 827.711432] ? graph_lock+0x170/0x170 [ 827.715230] ? lock_acquire+0x1dc/0x520 [ 827.720185] ? __fdget_pos+0x1a9/0x1e0 [ 827.724081] ? find_held_lock+0x36/0x1c0 [ 827.728156] ? kasan_check_read+0x11/0x20 [ 827.732346] ? rcu_is_watching+0x85/0x140 [ 827.738716] ? tun_get+0x22b/0x360 [ 827.742259] ? tun_chr_close+0x180/0x180 [ 827.746329] tun_chr_write_iter+0xb9/0x154 [ 827.750568] do_iter_readv_writev+0x859/0xa50 [ 827.755242] ? vfs_dedupe_file_range+0xa00/0xa00 [ 827.760002] ? rw_verify_area+0x118/0x360 [ 827.764147] do_iter_write+0x185/0x5f0 [ 827.768038] ? dup_iter+0x270/0x270 [ 827.771668] vfs_writev+0x1c7/0x330 [ 827.775296] ? vfs_iter_write+0xb0/0xb0 [ 827.779273] ? wait_for_completion+0x870/0x870 [ 827.783870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.789407] ? __fdget_pos+0xd6/0x1e0 [ 827.793218] ? __fdget_raw+0x20/0x20 [ 827.796931] ? __sb_end_write+0xac/0xe0 [ 827.800909] do_writev+0x112/0x2f0 [ 827.804449] ? vfs_writev+0x330/0x330 [ 827.808247] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 827.813789] __x64_sys_writev+0x75/0xb0 [ 827.817781] do_syscall_64+0x1b1/0x800 [ 827.821669] ? finish_task_switch+0x1ca/0x840 [ 827.826171] ? syscall_return_slowpath+0x5c0/0x5c0 [ 827.831099] ? syscall_return_slowpath+0x30f/0x5c0 [ 827.836033] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 827.841405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 827.846250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.851918] RIP: 0033:0x4558c1 [ 827.855100] RSP: 002b:00007fe57a2bbba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 827.862923] RAX: ffffffffffffffda RBX: 000000000000007e RCX: 00000000004558c1 08:45:28 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00 \x00'}, 0x2c) 08:45:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000002000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:28 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x0, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x142800]}}, 0x1c) 08:45:28 executing program 7 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 827.870185] RDX: 0000000000000001 RSI: 00007fe57a2bbbf0 RDI: 00000000000000fc [ 827.877448] RBP: 0000000020000040 R08: 00000000000000fc R09: 0000000000000000 [ 827.884711] R10: 000000000000007e R11: 0000000000000293 R12: 0000000000000014 [ 827.891975] R13: 000000000000073e R14: 00000000006ffe70 R15: 0000000000000002 08:45:28 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000003ec00"}, &(0x7f0000000140)=0x44) [ 827.932837] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 827.968552] IPVS: ftp: loaded support on port[0] = 21 08:45:28 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:28 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 827.975735] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000ffffffff0000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 828.058614] FAULT_INJECTION: forcing a failure. [ 828.058614] name failslab, interval 1, probability 0, space 0, times 0 [ 828.069921] CPU: 1 PID: 25815 Comm: syz-executor7 Not tainted 4.17.0-rc7+ #81 [ 828.077199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.086560] Call Trace: [ 828.089157] dump_stack+0x1b9/0x294 [ 828.092798] ? dump_stack_print_info.cold.2+0x52/0x52 [ 828.098003] ? debug_check_no_locks_freed+0x310/0x310 [ 828.103207] should_fail.cold.4+0xa/0x1a [ 828.107283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 828.112400] ? graph_lock+0x170/0x170 [ 828.116215] ? __lock_is_held+0xb5/0x140 [ 828.120296] ? __lock_is_held+0xb5/0x140 [ 828.124378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.129920] ? __rt6_find_exception_rcu+0x371/0x500 [ 828.134949] ? rt6_exception_hash+0x7d0/0x7d0 [ 828.139455] __should_failslab+0x124/0x180 [ 828.143796] should_failslab+0x9/0x14 [ 828.147611] kmem_cache_alloc+0x47/0x760 [ 828.148815] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 828.151681] ? rt6_find_cached_rt+0x22a/0x330 [ 828.151702] dst_alloc+0xbb/0x1d0 [ 828.151723] ip6_dst_alloc+0x35/0xa0 [ 828.151741] ip6_create_rt_rcu+0x105/0x160 [ 828.173211] ip6_pol_route_lookup+0xb12/0x1000 [ 828.176470] IPVS: ftp: loaded support on port[0] = 21 [ 828.177807] ? fib6_multipath_select+0x460/0x460 [ 828.177822] ? kasan_kmalloc+0xc4/0xe0 [ 828.177839] ? kasan_slab_alloc+0x12/0x20 [ 828.195783] ? kmem_cache_alloc+0x12e/0x760 [ 828.200106] ? skb_clone+0x1ed/0x4f0 [ 828.203829] ? ip6_err_gen_icmpv6_unreach+0x164/0x8a0 [ 828.209024] ? ipip6_err+0x3c3/0x990 [ 828.212746] ? tunnel4_err+0x182/0x320 [ 828.216642] ? icmp_unreach+0x3b4/0xc40 [ 828.220618] ? icmp_rcv+0x8b1/0x1560 [ 828.224336] ? ip_local_deliver_finish+0x2e3/0xd80 [ 828.229271] ? ip_local_deliver+0x1e1/0x720 [ 828.233598] ? ip_rcv_finish+0x81b/0x2200 [ 828.237756] ? ip_rcv+0x9fe/0x125c [ 828.241304] ? __netif_receive_skb_core+0x2468/0x3650 [ 828.246502] ? netif_receive_skb_internal+0x126/0x7b0 [ 828.251876] ? netif_receive_skb+0xba/0x400 [ 828.256374] ? tun_rx_batched.isra.54+0x4ba/0x8c0 [ 828.261221] ? tun_get_user+0x2ad0/0x42c0 [ 828.265369] ? tun_chr_write_iter+0xb9/0x154 [ 828.269779] ? do_iter_readv_writev+0x859/0xa50 [ 828.274452] ? do_iter_write+0x185/0x5f0 [ 828.278602] ? vfs_writev+0x1c7/0x330 [ 828.282415] ? do_writev+0x112/0x2f0 [ 828.286396] ? __x64_sys_writev+0x75/0xb0 [ 828.290544] ? do_syscall_64+0x1b1/0x800 [ 828.294603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.299981] ? graph_lock+0x170/0x170 [ 828.303798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.309350] fib6_rule_lookup+0x211/0x6d0 [ 828.313497] ? fib6_multipath_select+0x460/0x460 [ 828.318257] ? fib6_lookup+0x460/0x460 [ 828.322142] ? kasan_check_write+0x14/0x20 [ 828.326375] ? __skb_clone+0x686/0x9a0 [ 828.330265] ? __copy_skb_header+0x540/0x540 [ 828.334678] rt6_lookup+0x28f/0x3a0 [ 828.338307] ? ip6_route_input_lookup+0xd0/0xd0 [ 828.342970] ? skb_split+0x11d0/0x11d0 [ 828.346870] ip6_err_gen_icmpv6_unreach+0x2c4/0x8a0 [ 828.351888] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 828.357081] ? icmp6_send+0x2da0/0x2da0 [ 828.361055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.366592] ? ipip_err+0x3a9/0xce0 [ 828.370225] ipip6_err+0x3c3/0x990 [ 828.373766] ? ipip6_tunnel_lookup+0x1190/0x1190 [ 828.378533] tunnel4_err+0x182/0x320 [ 828.382248] ? xfrm4_tunnel_deregister+0x1a0/0x1a0 [ 828.387632] ? __lock_is_held+0xb5/0x140 [ 828.391702] ? xfrm4_tunnel_deregister+0x1a0/0x1a0 [ 828.396633] icmp_socket_deliver+0x27a/0x450 [ 828.401042] ? icmpv4_global_allow+0xf0/0xf0 [ 828.405457] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 828.410644] icmp_unreach+0x3b4/0xc40 [ 828.414445] ? icmpv4_xrlim_allow.isra.20+0x540/0x540 [ 828.419646] icmp_rcv+0x8b1/0x1560 [ 828.423197] ip_local_deliver_finish+0x2e3/0xd80 [ 828.427954] ? inet_add_protocol.cold.0+0x21/0x21 [ 828.432800] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 828.437816] ? nf_hook_slow+0x11e/0x1c0 [ 828.441793] ip_local_deliver+0x1e1/0x720 [ 828.445945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 828.451496] ? ip_call_ra_chain+0x720/0x720 [ 828.455924] ? inet_add_protocol.cold.0+0x21/0x21 [ 828.460862] ip_rcv_finish+0x81b/0x2200 [ 828.464840] ? ip_local_deliver_finish+0xd80/0xd80 [ 828.469778] ? lock_downgrade+0x8e0/0x8e0 [ 828.473929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.479469] ? kasan_check_read+0x11/0x20 [ 828.483620] ? rcu_is_watching+0x85/0x140 [ 828.487769] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 828.492961] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 828.497972] ? nf_hook_slow+0x11e/0x1c0 [ 828.501950] ip_rcv+0x9fe/0x125c [ 828.505322] ? ip_local_deliver+0x720/0x720 [ 828.509642] ? __save_stack_trace+0x7e/0xd0 [ 828.513973] ? ip_local_deliver_finish+0xd80/0xd80 [ 828.518902] ? ip_local_deliver+0x720/0x720 [ 828.523229] __netif_receive_skb_core+0x2468/0x3650 [ 828.528251] ? nf_ingress+0xa00/0xa00 [ 828.532053] ? __lock_acquire+0x7f5/0x5140 [ 828.536284] ? kmem_cache_alloc+0x12e/0x760 [ 828.540609] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 828.545635] ? debug_check_no_locks_freed+0x310/0x310 [ 828.550828] ? __lock_acquire+0x7f5/0x5140 [ 828.555070] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 828.560262] ? __skb_flow_dissect+0xba1/0x45e0 [ 828.564845] ? kmem_cache_alloc+0x5fa/0x760 [ 828.569175] ? find_held_lock+0x36/0x1c0 [ 828.573241] ? lock_downgrade+0x8e0/0x8e0 [ 828.577397] ? pvclock_read_flags+0x160/0x160 [ 828.581892] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 828.586905] ? tun_build_skb.isra.53+0xaee/0x2250 [ 828.591752] ? __local_bh_enable_ip+0x161/0x230 [ 828.596424] ? ktime_get_with_offset+0x395/0x4a0 [ 828.601183] ? lock_acquire+0x1dc/0x520 [ 828.605160] ? netif_receive_skb_internal+0xa2/0x7b0 [ 828.610271] ? kasan_check_read+0x11/0x20 [ 828.614433] ? rcu_is_watching+0x85/0x140 [ 828.618580] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 828.623777] __netif_receive_skb+0x2c/0x1e0 [ 828.628102] netif_receive_skb_internal+0x126/0x7b0 [ 828.633122] ? dev_cpu_dead+0xad0/0xad0 [ 828.637096] ? kasan_check_read+0x11/0x20 [ 828.641243] ? rcu_is_watching+0x85/0x140 [ 828.645386] ? reacquire_held_locks+0xbc/0x3e0 [ 828.649964] ? rcu_pm_notify+0xc0/0xc0 [ 828.653863] netif_receive_skb+0xba/0x400 [ 828.658015] ? netif_receive_skb_internal+0x7b0/0x7b0 [ 828.663206] ? find_held_lock+0x36/0x1c0 [ 828.667271] ? tun_rx_batched.isra.54+0x494/0x8c0 [ 828.672119] tun_rx_batched.isra.54+0x4ba/0x8c0 [ 828.676791] ? tun_sock_write_space+0x390/0x390 [ 828.682569] ? kasan_check_read+0x11/0x20 [ 828.686726] ? __local_bh_enable_ip+0x161/0x230 [ 828.691397] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 828.696417] ? tun_get_user+0x2fd5/0x42c0 [ 828.700564] tun_get_user+0x2ad0/0x42c0 [ 828.704547] ? debug_check_no_locks_freed+0x310/0x310 [ 828.709751] ? tun_build_skb.isra.53+0x2250/0x2250 [ 828.714765] ? print_usage_bug+0xc0/0xc0 [ 828.718827] ? graph_lock+0x170/0x170 [ 828.722633] ? graph_lock+0x170/0x170 [ 828.726431] ? lock_acquire+0x1dc/0x520 [ 828.730404] ? __fdget_pos+0x1a9/0x1e0 [ 828.734291] ? find_held_lock+0x36/0x1c0 [ 828.738366] ? kasan_check_read+0x11/0x20 [ 828.742512] ? rcu_is_watching+0x85/0x140 [ 828.746667] ? tun_get+0x22b/0x360 [ 828.750212] ? tun_chr_close+0x180/0x180 [ 828.754269] tun_chr_write_iter+0xb9/0x154 [ 828.758504] do_iter_readv_writev+0x859/0xa50 [ 828.763002] ? vfs_dedupe_file_range+0xa00/0xa00 [ 828.767765] ? rw_verify_area+0x118/0x360 [ 828.771915] do_iter_write+0x185/0x5f0 [ 828.775803] ? dup_iter+0x270/0x270 [ 828.779435] vfs_writev+0x1c7/0x330 [ 828.783064] ? vfs_iter_write+0xb0/0xb0 [ 828.787039] ? wait_for_completion+0x870/0x870 [ 828.791635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.797169] ? __fdget_pos+0xd6/0x1e0 [ 828.800967] ? __fdget_raw+0x20/0x20 [ 828.804679] ? __sb_end_write+0xac/0xe0 [ 828.808653] do_writev+0x112/0x2f0 [ 828.812196] ? vfs_writev+0x330/0x330 [ 828.815994] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 828.822315] __x64_sys_writev+0x75/0xb0 [ 828.826292] do_syscall_64+0x1b1/0x800 [ 828.830183] ? finish_task_switch+0x1ca/0x840 [ 828.834684] ? syscall_return_slowpath+0x5c0/0x5c0 [ 828.839615] ? syscall_return_slowpath+0x30f/0x5c0 [ 828.844550] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 828.849918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.854763] entry_SYSCALL_64_after_hwframe+0x49/0xbe 08:45:28 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nqt\x00'}, 0x2c) [ 828.859948] RIP: 0033:0x4558c1 [ 828.863131] RSP: 002b:00007fe57a2bbba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 828.870837] RAX: ffffffffffffffda RBX: 000000000000007e RCX: 00000000004558c1 [ 828.878100] RDX: 0000000000000001 RSI: 00007fe57a2bbbf0 RDI: 00000000000000fc [ 828.885364] RBP: 0000000020000040 R08: 00000000000000fc R09: 0000000000000000 [ 828.892623] R10: 000000000000007e R11: 0000000000000293 R12: 0000000000000014 [ 828.899883] R13: 000000000000073e R14: 00000000006ffe70 R15: 0000000000000003 08:45:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x2c) 08:45:29 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000001d000"}, &(0x7f0000000140)=0x44) 08:45:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000200000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x0, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x20000000]}}, 0x1c) 08:45:29 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:29 executing program 7 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:29 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000040000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:29 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 829.056163] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 829.072837] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 829.084719] IPVS: ftp: loaded support on port[0] = 21 08:45:29 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000000300"}, 0x2c) 08:45:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x0, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000004000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:29 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 829.247841] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:29 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 829.486395] IPVS: ftp: loaded support on port[0] = 21 08:45:29 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 08:45:29 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657203fc00"}, &(0x7f0000000140)=0x44) 08:45:29 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b4], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0xbe, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000004000000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:29 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000008400"}, 0x2c) 08:45:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd2000000]}}, 0x1c) [ 829.575794] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 829.590134] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x200000be, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000010d00"}, 0x2c) 08:45:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000000000007fffffff0000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:30 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 829.669987] IPVS: ftp: loaded support on port[0] = 21 [ 829.738454] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:30 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000010000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 829.852050] FAULT_INJECTION: forcing a failure. [ 829.852050] name failslab, interval 1, probability 0, space 0, times 0 [ 829.863395] CPU: 0 PID: 25940 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 829.870678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.880048] Call Trace: [ 829.882639] dump_stack+0x1b9/0x294 [ 829.886268] ? dump_stack_print_info.cold.2+0x52/0x52 [ 829.891637] ? __lock_acquire+0x7f5/0x5140 [ 829.895884] should_fail.cold.4+0xa/0x1a [ 829.899947] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 829.905059] ? debug_check_no_locks_freed+0x310/0x310 [ 829.910254] ? __lock_acquire+0x7f5/0x5140 [ 829.914490] ? find_held_lock+0x36/0x1c0 [ 829.918569] ? check_same_owner+0x320/0x320 [ 829.922915] ? rcu_note_context_switch+0x710/0x710 [ 829.927850] ? retint_kernel+0x10/0x10 [ 829.931744] __should_failslab+0x124/0x180 [ 829.935981] should_failslab+0x9/0x14 [ 829.939785] kmem_cache_alloc_node+0x272/0x780 [ 829.944366] ? retint_kernel+0x10/0x10 [ 829.948260] __alloc_skb+0x111/0x780 [ 829.951979] ? skb_scrub_packet+0x580/0x580 [ 829.956305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 829.961842] ? _copy_from_user+0xdf/0x150 [ 829.965999] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 829.971029] ? rw_copy_check_uvector+0x2d3/0x3a0 [ 829.975795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 829.981333] ? import_iovec+0x24b/0x420 [ 829.985310] ? security_socket_getpeersec_dgram+0x95/0xc0 [ 829.990857] netlink_sendmsg+0xb01/0xfa0 [ 829.994927] ? netlink_unicast+0x740/0x740 08:45:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710300"}, 0x2c) [ 829.999172] ? security_socket_sendmsg+0x94/0xc0 [ 830.003939] ? netlink_unicast+0x740/0x740 [ 830.008209] sock_sendmsg+0xd5/0x120 [ 830.011931] ___sys_sendmsg+0x805/0x940 [ 830.015916] ? copy_msghdr_from_user+0x560/0x560 [ 830.020691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 830.026238] ? proc_fail_nth_write+0x96/0x1f0 [ 830.030744] ? __fget_light+0x2ef/0x430 [ 830.034724] ? fget_raw+0x20/0x20 [ 830.038176] ? find_held_lock+0x36/0x1c0 [ 830.042249] ? kasan_check_write+0x14/0x20 [ 830.046493] ? wait_for_completion+0x870/0x870 08:45:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xc776002500000000]}}, 0x1c) [ 830.051087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.056628] ? sockfd_lookup_light+0xc5/0x160 [ 830.061127] __sys_sendmsg+0x115/0x270 [ 830.065017] ? __ia32_sys_shutdown+0x80/0x80 [ 830.069428] ? __sb_end_write+0xac/0xe0 [ 830.073424] ? fput+0x130/0x1a0 [ 830.076727] ? ksys_write+0x1a6/0x250 [ 830.080561] __x64_sys_sendmsg+0x78/0xb0 [ 830.084645] do_syscall_64+0x1b1/0x800 [ 830.088536] ? finish_task_switch+0x1ca/0x840 [ 830.093042] ? syscall_return_slowpath+0x5c0/0x5c0 [ 830.097986] ? syscall_return_slowpath+0x30f/0x5c0 [ 830.102927] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 830.107145] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 830.108297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.108322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.108332] RIP: 0033:0x455a09 [ 830.108341] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 830.139206] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 830.146735] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 830.154006] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 830.161290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 830.168686] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000000 [ 830.193076] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 830.245145] IPVS: ftp: loaded support on port[0] = 21 08:45:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:30 executing program 0 (fault-call:3 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:30 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\a\x00'}, 0x2c) 08:45:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x8dffffff]}}, 0x1c) 08:45:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000001000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7ffff000, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:30 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657203f600"}, &(0x7f0000000140)=0x44) [ 830.440507] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 830.456602] FAULT_INJECTION: forcing a failure. [ 830.456602] name failslab, interval 1, probability 0, space 0, times 0 [ 830.467977] CPU: 0 PID: 25966 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 830.470951] IPVS: ftp: loaded support on port[0] = 21 [ 830.475343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:45:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x11000000]}}, 0x1c) [ 830.475350] Call Trace: [ 830.475372] dump_stack+0x1b9/0x294 [ 830.475395] ? dump_stack_print_info.cold.2+0x52/0x52 [ 830.501340] ? is_bpf_text_address+0xd7/0x170 [ 830.505864] ? kernel_text_address+0x79/0xf0 [ 830.510287] ? __unwind_start+0x166/0x330 [ 830.514592] should_fail.cold.4+0xa/0x1a [ 830.518660] ? __save_stack_trace+0x7e/0xd0 [ 830.523004] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 830.528136] ? save_stack+0xa9/0xd0 [ 830.531769] ? save_stack+0x43/0xd0 [ 830.535404] ? kasan_kmalloc+0xc4/0xe0 [ 830.539293] ? kasan_slab_alloc+0x12/0x20 [ 830.543450] ? find_held_lock+0x36/0x1c0 [ 830.547542] ? check_same_owner+0x320/0x320 [ 830.551875] ? rcu_note_context_switch+0x710/0x710 [ 830.556812] __should_failslab+0x124/0x180 [ 830.561053] should_failslab+0x9/0x14 [ 830.564867] kmem_cache_alloc_node_trace+0x26f/0x770 [ 830.569986] __kmalloc_node_track_caller+0x33/0x70 [ 830.570072] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 830.574929] __kmalloc_reserve.isra.39+0x3a/0xe0 [ 830.574948] __alloc_skb+0x14d/0x780 [ 830.574965] ? skb_scrub_packet+0x580/0x580 [ 830.574987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.603211] ? _copy_from_user+0xdf/0x150 [ 830.607369] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 830.612392] ? rw_copy_check_uvector+0x2d3/0x3a0 [ 830.617163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.622704] ? import_iovec+0x24b/0x420 [ 830.626700] ? security_socket_getpeersec_dgram+0x95/0xc0 [ 830.632329] netlink_sendmsg+0xb01/0xfa0 [ 830.636397] ? netlink_unicast+0x740/0x740 08:45:30 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:30 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000010d00"}, 0x2c) 08:45:30 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 830.640636] ? security_socket_sendmsg+0x94/0xc0 [ 830.645393] ? netlink_unicast+0x740/0x740 [ 830.649631] sock_sendmsg+0xd5/0x120 [ 830.653352] ___sys_sendmsg+0x805/0x940 [ 830.657339] ? copy_msghdr_from_user+0x560/0x560 [ 830.662224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 830.667766] ? proc_fail_nth_write+0x96/0x1f0 [ 830.672267] ? __fget_light+0x2ef/0x430 [ 830.676244] ? fget_raw+0x20/0x20 [ 830.679703] ? find_held_lock+0x36/0x1c0 [ 830.683778] ? kasan_check_write+0x14/0x20 [ 830.688027] ? wait_for_completion+0x870/0x870 [ 830.692628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 830.698171] ? sockfd_lookup_light+0xc5/0x160 [ 830.702674] __sys_sendmsg+0x115/0x270 [ 830.706568] ? __ia32_sys_shutdown+0x80/0x80 [ 830.710986] ? __sb_end_write+0xac/0xe0 [ 830.714970] ? fput+0x130/0x1a0 [ 830.718555] ? ksys_write+0x1a6/0x250 [ 830.722369] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 830.727223] __x64_sys_sendmsg+0x78/0xb0 [ 830.731293] do_syscall_64+0x1b1/0x800 [ 830.731385] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 830.738966] ? finish_task_switch+0x1ca/0x840 [ 830.738985] ? syscall_return_slowpath+0x5c0/0x5c0 [ 830.739001] ? syscall_return_slowpath+0x30f/0x5c0 [ 830.739022] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 830.739041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.739062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.739073] RIP: 0033:0x455a09 [ 830.739081] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 08:45:31 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000400300000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 830.790983] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 830.798261] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 830.806922] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 830.814203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 830.821486] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000001 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000020000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 830.921075] IPVS: ftp: loaded support on port[0] = 21 08:45:31 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xcf000000]}}, 0x1c) 08:45:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000048f00"}, 0x2c) 08:45:31 executing program 0 (fault-call:3 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000007fffffff000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:31 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720400"}, &(0x7f0000000140)=0x44) [ 831.174965] FAULT_INJECTION: forcing a failure. [ 831.174965] name failslab, interval 1, probability 0, space 0, times 0 [ 831.186435] CPU: 1 PID: 26029 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 831.193458] IPVS: ftp: loaded support on port[0] = 21 [ 831.193714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.208241] Call Trace: [ 831.210838] dump_stack+0x1b9/0x294 [ 831.214485] ? dump_stack_print_info.cold.2+0x52/0x52 [ 831.219696] should_fail.cold.4+0xa/0x1a 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.223768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 831.228885] ? print_usage_bug+0xc0/0xc0 [ 831.232957] ? graph_lock+0x170/0x170 [ 831.236765] ? __isolate_free_page+0x7c0/0x7c0 [ 831.241359] ? find_held_lock+0x36/0x1c0 [ 831.245438] ? __lock_is_held+0xb5/0x140 [ 831.249517] ? check_same_owner+0x320/0x320 [ 831.253853] ? rcu_note_context_switch+0x710/0x710 [ 831.258783] ? __lock_acquire+0x7f5/0x5140 [ 831.263028] __should_failslab+0x124/0x180 [ 831.267272] should_failslab+0x9/0x14 [ 831.271082] __kmalloc+0x2c8/0x760 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.274632] ? debug_check_no_locks_freed+0x310/0x310 [ 831.279828] ? wiphy_new_nm+0x819/0x2290 [ 831.283906] wiphy_new_nm+0x819/0x2290 [ 831.287801] ? print_usage_bug+0xc0/0xc0 [ 831.291871] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 831.297416] ? __lock_acquire+0x7f5/0x5140 [ 831.301658] ? __lock_acquire+0x7f5/0x5140 [ 831.305903] ? check_noncircular+0x20/0x20 [ 831.310142] ? print_usage_bug+0xc0/0xc0 [ 831.314212] ? __lock_acquire+0x7f5/0x5140 [ 831.318456] ? __lock_acquire+0x7f5/0x5140 [ 831.322692] ? print_usage_bug+0xc0/0xc0 [ 831.326761] ? print_usage_bug+0xc0/0xc0 [ 831.330823] ? print_usage_bug+0xc0/0xc0 [ 831.334887] ? print_usage_bug+0xc0/0xc0 [ 831.338957] ? __lock_acquire+0x7f5/0x5140 [ 831.343198] ? check_noncircular+0x20/0x20 [ 831.347445] ? __lock_acquire+0x7f5/0x5140 [ 831.351687] ? debug_check_no_locks_freed+0x310/0x310 [ 831.356889] ? debug_check_no_locks_freed+0x310/0x310 [ 831.361521] IPVS: ftp: loaded support on port[0] = 21 [ 831.362086] ? print_usage_bug+0xc0/0xc0 [ 831.362103] ? print_usage_bug+0xc0/0xc0 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.362117] ? __lock_acquire+0x7f5/0x5140 [ 831.362134] ? unwind_get_return_address+0x61/0xa0 [ 831.362152] ? __save_stack_trace+0x7e/0xd0 [ 831.388862] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 831.393536] ? print_usage_bug+0xc0/0xc0 [ 831.397601] ? ieee80211_restart_work+0x1a0/0x1a0 [ 831.402447] ? __lock_acquire+0x7f5/0x5140 [ 831.406686] ? __lock_acquire+0x7f5/0x5140 [ 831.410925] ? kasan_slab_alloc+0x12/0x20 [ 831.415079] ? kmem_cache_alloc+0x12e/0x760 [ 831.419405] ? __d_alloc+0xc0/0xd30 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.423047] ? graph_lock+0x170/0x170 [ 831.426855] ? debug_check_no_locks_freed+0x310/0x310 [ 831.432051] ? debug_check_no_locks_freed+0x310/0x310 [ 831.437245] ? __lock_acquire+0x7f5/0x5140 [ 831.441487] ? print_usage_bug+0xc0/0xc0 [ 831.445552] ? find_held_lock+0x36/0x1c0 [ 831.449623] ? lock_downgrade+0x8e0/0x8e0 [ 831.453780] ? mark_held_locks+0xc9/0x160 [ 831.457933] ? kasan_check_read+0x11/0x20 [ 831.462089] ? __local_bh_enable_ip+0x161/0x230 [ 831.466760] ? trace_hardirqs_on_caller+0x421/0x5c0 08:45:31 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572d00100"}, &(0x7f0000000140)=0x44) 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.471783] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 831.476889] ? trace_hardirqs_on+0xd/0x10 [ 831.481039] ? __local_bh_enable_ip+0x161/0x230 [ 831.485712] mac80211_hwsim_new_radio+0x235/0x33b0 [ 831.490645] ? graph_lock+0x170/0x170 [ 831.495242] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 831.501398] ? lock_release+0xa10/0xa10 [ 831.505383] ? check_same_owner+0x320/0x320 [ 831.509711] ? rcu_note_context_switch+0x710/0x710 [ 831.514638] ? __lock_acquire+0x7f5/0x5140 [ 831.518877] ? __might_sleep+0x95/0x190 [ 831.522859] ? kasan_check_write+0x14/0x20 [ 831.527100] ? __mutex_lock+0x7d9/0x17f0 [ 831.531166] ? genl_rcv_msg+0x13a/0x170 [ 831.535152] ? __lock_acquire+0x7f5/0x5140 [ 831.539399] ? mutex_trylock+0x2a0/0x2a0 [ 831.543464] ? graph_lock+0x170/0x170 [ 831.547282] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 831.552480] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 831.557507] ? validate_nla+0x2d9/0x7b0 [ 831.561491] hwsim_new_radio_nl+0x7b8/0xa60 [ 831.565812] ? nla_parse+0x358/0x4a0 [ 831.569533] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 08:45:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.570259] IPVS: ftp: loaded support on port[0] = 21 [ 831.574730] ? __netlink_ns_capable+0x100/0x130 [ 831.574751] genl_family_rcv_msg+0x889/0x1120 [ 831.574770] ? genl_rcv+0x40/0x40 [ 831.574788] ? lock_downgrade+0x8e0/0x8e0 [ 831.596669] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 831.601694] ? kasan_check_read+0x11/0x20 [ 831.605847] ? lock_acquire+0x1dc/0x520 [ 831.609822] ? genl_rcv+0x19/0x40 [ 831.613291] genl_rcv_msg+0xc6/0x170 [ 831.617011] netlink_rcv_skb+0x172/0x440 [ 831.621073] ? genl_family_rcv_msg+0x1120/0x1120 08:45:32 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 831.625830] ? netlink_ack+0xbc0/0xbc0 [ 831.629717] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 831.634910] ? netlink_skb_destructor+0x210/0x210 [ 831.639760] genl_rcv+0x28/0x40 [ 831.643041] netlink_unicast+0x58b/0x740 [ 831.647109] ? netlink_attachskb+0x970/0x970 [ 831.651521] ? import_iovec+0x24b/0x420 [ 831.655503] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 831.660518] ? security_netlink_send+0x88/0xb0 [ 831.665098] netlink_sendmsg+0x9f0/0xfa0 [ 831.669167] ? netlink_unicast+0x740/0x740 [ 831.673411] ? security_socket_sendmsg+0x94/0xc0 [ 831.678169] ? netlink_unicast+0x740/0x740 [ 831.682407] sock_sendmsg+0xd5/0x120 [ 831.686123] ___sys_sendmsg+0x805/0x940 [ 831.690103] ? copy_msghdr_from_user+0x560/0x560 [ 831.694873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 831.700409] ? proc_fail_nth_write+0x96/0x1f0 [ 831.704904] ? __fget_light+0x2ef/0x430 [ 831.708876] ? fget_raw+0x20/0x20 [ 831.712333] ? find_held_lock+0x36/0x1c0 [ 831.716407] ? kasan_check_write+0x14/0x20 [ 831.720656] ? wait_for_completion+0x870/0x870 [ 831.725249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 831.728450] IPVS: ftp: loaded support on port[0] = 21 [ 831.731133] ? sockfd_lookup_light+0xc5/0x160 [ 831.731152] __sys_sendmsg+0x115/0x270 [ 831.731169] ? __ia32_sys_shutdown+0x80/0x80 [ 831.731184] ? __sb_end_write+0xac/0xe0 [ 831.731201] ? fput+0x130/0x1a0 [ 831.756345] ? ksys_write+0x1a6/0x250 [ 831.760163] __x64_sys_sendmsg+0x78/0xb0 [ 831.764238] do_syscall_64+0x1b1/0x800 [ 831.768133] ? finish_task_switch+0x1ca/0x840 [ 831.772633] ? syscall_return_slowpath+0x5c0/0x5c0 08:45:32 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 831.777565] ? syscall_return_slowpath+0x30f/0x5c0 [ 831.782502] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 831.787869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.792721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.797917] RIP: 0033:0x455a09 [ 831.801109] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 831.805514] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 831.808815] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 831.808824] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 831.808833] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 831.808841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 831.808849] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000002 [ 831.826141] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:32 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000008000"}, &(0x7f0000000140)=0x44) 08:45:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000040000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:32 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:32 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\t\x00'}, 0x2c) 08:45:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff0f0000]}}, 0x1c) 08:45:32 executing program 0 (fault-call:3 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:32 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0xfffffdef, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 832.154291] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 832.178364] IPVS: ftp: loaded support on port[0] = 21 08:45:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0xfdef, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:32 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000000000000000ffffffff00000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:32 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 832.205848] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:32 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000300"}, 0x2c) 08:45:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000200000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 832.358535] FAULT_INJECTION: forcing a failure. [ 832.358535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 832.370424] CPU: 0 PID: 26099 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 832.377707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.387066] Call Trace: [ 832.389672] dump_stack+0x1b9/0x294 [ 832.393311] ? dump_stack_print_info.cold.2+0x52/0x52 [ 832.398514] ? print_usage_bug+0xc0/0xc0 [ 832.402583] ? rb_erase_cached+0xc6a/0x32a0 [ 832.406922] should_fail.cold.4+0xa/0x1a [ 832.410996] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 832.416118] ? debug_check_no_locks_freed+0x310/0x310 [ 832.421328] ? debug_check_no_locks_freed+0x310/0x310 [ 832.426530] ? print_usage_bug+0xc0/0xc0 [ 832.430599] ? __lock_acquire+0x7f5/0x5140 [ 832.434859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.440400] ? should_fail+0x21b/0xbcd [ 832.444288] ? check_noncircular+0x20/0x20 [ 832.448540] __alloc_pages_nodemask+0x34e/0xd70 [ 832.453213] ? pmd_huge+0x92/0x140 [ 832.456768] ? print_usage_bug+0xc0/0xc0 [ 832.460847] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 832.466038] ? find_held_lock+0x36/0x1c0 [ 832.470124] ? __lock_is_held+0xb5/0x140 [ 832.474211] ? check_same_owner+0x320/0x320 [ 832.478543] cache_grow_begin+0x6e/0x6c0 [ 832.482620] __kmalloc+0x688/0x760 [ 832.486172] ? wiphy_new_nm+0x819/0x2290 [ 832.490246] wiphy_new_nm+0x819/0x2290 [ 832.494144] ? print_usage_bug+0xc0/0xc0 [ 832.498218] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 832.506713] ? __lock_acquire+0x7f5/0x5140 [ 832.510952] ? __lock_acquire+0x7f5/0x5140 [ 832.515196] ? check_noncircular+0x20/0x20 [ 832.519445] ? print_usage_bug+0xc0/0xc0 [ 832.523518] ? __lock_acquire+0x7f5/0x5140 [ 832.527772] ? __lock_acquire+0x7f5/0x5140 [ 832.532020] ? print_usage_bug+0xc0/0xc0 [ 832.536092] ? print_usage_bug+0xc0/0xc0 [ 832.540158] ? print_usage_bug+0xc0/0xc0 [ 832.544335] ? print_usage_bug+0xc0/0xc0 [ 832.548406] ? __lock_acquire+0x7f5/0x5140 [ 832.552643] ? check_noncircular+0x20/0x20 [ 832.556880] ? __lock_acquire+0x7f5/0x5140 [ 832.561116] ? debug_check_no_locks_freed+0x310/0x310 [ 832.566315] ? debug_check_no_locks_freed+0x310/0x310 [ 832.571500] ? print_usage_bug+0xc0/0xc0 [ 832.575560] ? print_usage_bug+0xc0/0xc0 [ 832.579615] ? __lock_acquire+0x7f5/0x5140 [ 832.583854] ? unwind_get_return_address+0x61/0xa0 [ 832.588785] ? __save_stack_trace+0x7e/0xd0 [ 832.593107] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 832.597774] ? print_usage_bug+0xc0/0xc0 [ 832.601833] ? ieee80211_restart_work+0x1a0/0x1a0 [ 832.606675] ? __lock_acquire+0x7f5/0x5140 [ 832.610912] ? __lock_acquire+0x7f5/0x5140 [ 832.615142] ? kasan_slab_alloc+0x12/0x20 [ 832.619292] ? kmem_cache_alloc+0x12e/0x760 [ 832.623611] ? __d_alloc+0xc0/0xd30 [ 832.627230] ? d_alloc+0x8e/0x370 [ 832.630687] ? graph_lock+0x170/0x170 [ 832.634488] ? debug_check_no_locks_freed+0x310/0x310 [ 832.639674] ? debug_check_no_locks_freed+0x310/0x310 [ 832.644859] ? __lock_acquire+0x7f5/0x5140 [ 832.649098] ? print_usage_bug+0xc0/0xc0 [ 832.653173] ? find_held_lock+0x36/0x1c0 [ 832.657243] ? lock_downgrade+0x8e0/0x8e0 [ 832.661394] ? mark_held_locks+0xc9/0x160 [ 832.665542] ? kasan_check_read+0x11/0x20 [ 832.669689] ? __local_bh_enable_ip+0x161/0x230 [ 832.674357] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 832.679374] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 832.684480] ? trace_hardirqs_on+0xd/0x10 [ 832.688628] ? __local_bh_enable_ip+0x161/0x230 [ 832.693301] mac80211_hwsim_new_radio+0x235/0x33b0 [ 832.698226] ? graph_lock+0x170/0x170 [ 832.702034] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 832.708182] ? lock_release+0xa10/0xa10 [ 832.712156] ? check_same_owner+0x320/0x320 [ 832.716477] ? rcu_note_context_switch+0x710/0x710 [ 832.722113] ? __lock_acquire+0x7f5/0x5140 [ 832.726347] ? __might_sleep+0x95/0x190 [ 832.730323] ? kasan_check_write+0x14/0x20 [ 832.735790] ? __mutex_lock+0x7d9/0x17f0 [ 832.739854] ? genl_rcv_msg+0x13a/0x170 [ 832.743829] ? __lock_acquire+0x7f5/0x5140 [ 832.748064] ? mutex_trylock+0x2a0/0x2a0 [ 832.752988] ? graph_lock+0x170/0x170 [ 832.756790] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 832.761979] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 832.768220] ? validate_nla+0x2d9/0x7b0 [ 832.772359] hwsim_new_radio_nl+0x7b8/0xa60 [ 832.776930] ? nla_parse+0x358/0x4a0 [ 832.780648] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 832.785845] ? __netlink_ns_capable+0x100/0x130 [ 832.790518] genl_family_rcv_msg+0x889/0x1120 [ 832.795020] ? genl_rcv+0x40/0x40 [ 832.798477] ? lock_downgrade+0x8e0/0x8e0 [ 832.802772] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 832.807793] ? kasan_check_read+0x11/0x20 [ 832.811943] ? lock_acquire+0x1dc/0x520 [ 832.815952] ? genl_rcv+0x19/0x40 [ 832.819430] genl_rcv_msg+0xc6/0x170 [ 832.823145] netlink_rcv_skb+0x172/0x440 [ 832.827205] ? genl_family_rcv_msg+0x1120/0x1120 [ 832.831969] ? netlink_ack+0xbc0/0xbc0 [ 832.835884] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 832.841075] ? netlink_skb_destructor+0x210/0x210 [ 832.845919] genl_rcv+0x28/0x40 [ 832.849198] netlink_unicast+0x58b/0x740 [ 832.853263] ? netlink_attachskb+0x970/0x970 [ 832.857670] ? import_iovec+0x24b/0x420 [ 832.861648] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 832.866660] ? security_netlink_send+0x88/0xb0 [ 832.871241] netlink_sendmsg+0x9f0/0xfa0 [ 832.875306] ? netlink_unicast+0x740/0x740 [ 832.879541] ? security_socket_sendmsg+0x94/0xc0 [ 832.884291] ? netlink_unicast+0x740/0x740 [ 832.888529] sock_sendmsg+0xd5/0x120 [ 832.892241] ___sys_sendmsg+0x805/0x940 [ 832.896220] ? copy_msghdr_from_user+0x560/0x560 [ 832.900982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.906520] ? proc_fail_nth_write+0x96/0x1f0 [ 832.911016] ? __fget_light+0x2ef/0x430 [ 832.914985] ? fget_raw+0x20/0x20 [ 832.918432] ? find_held_lock+0x36/0x1c0 [ 832.922499] ? kasan_check_write+0x14/0x20 [ 832.926740] ? wait_for_completion+0x870/0x870 [ 832.931332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 832.936866] ? sockfd_lookup_light+0xc5/0x160 [ 832.941361] __sys_sendmsg+0x115/0x270 [ 832.945252] ? __ia32_sys_shutdown+0x80/0x80 [ 832.949663] ? __sb_end_write+0xac/0xe0 [ 832.953644] ? fput+0x130/0x1a0 [ 832.956922] ? ksys_write+0x1a6/0x250 [ 832.960740] __x64_sys_sendmsg+0x78/0xb0 [ 832.964812] do_syscall_64+0x1b1/0x800 [ 832.968697] ? finish_task_switch+0x1ca/0x840 [ 832.973194] ? syscall_return_slowpath+0x5c0/0x5c0 [ 832.978123] ? syscall_return_slowpath+0x30f/0x5c0 [ 832.983058] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 832.988448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.993296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.998482] RIP: 0033:0x455a09 [ 833.001667] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 833.009370] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 833.016632] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 833.023895] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 833.031159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 833.038430] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000003 08:45:32 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:32 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 833.057454] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 833.083854] IPVS: ftp: loaded support on port[0] = 21 08:45:33 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000340000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71010d00"}, 0x2c) 08:45:33 executing program 0 (fault-call:3 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:33 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572ffffffffffffffff00"}, &(0x7f0000000140)=0x44) 08:45:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb8ff]}}, 0x1c) 08:45:33 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0xd, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x300, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc00]}}, 0x1c) 08:45:33 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000200000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 833.254587] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 833.292384] IPVS: ftp: loaded support on port[0] = 21 08:45:33 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:33 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e711100"}, 0x2c) [ 833.422720] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 833.430463] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 833.565118] IPVS: ftp: loaded support on port[0] = 21 [ 833.570989] FAULT_INJECTION: forcing a failure. [ 833.570989] name failslab, interval 1, probability 0, space 0, times 0 [ 833.582295] CPU: 0 PID: 26147 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 833.589572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.598925] Call Trace: [ 833.601552] dump_stack+0x1b9/0x294 [ 833.605197] ? dump_stack_print_info.cold.2+0x52/0x52 [ 833.610408] should_fail.cold.4+0xa/0x1a [ 833.614483] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 833.619598] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 833.624806] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 833.630003] ? graph_lock+0x170/0x170 [ 833.633818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.639357] ? put_dec_trunc8+0x273/0x300 [ 833.643508] ? find_held_lock+0x36/0x1c0 [ 833.647576] ? __lock_is_held+0xb5/0x140 [ 833.651668] ? check_same_owner+0x320/0x320 [ 833.655999] ? save_stack+0x43/0xd0 [ 833.659628] ? kasan_kmalloc+0xc4/0xe0 [ 833.663503] ? rcu_note_context_switch+0x710/0x710 [ 833.668421] __should_failslab+0x124/0x180 [ 833.672640] should_failslab+0x9/0x14 [ 833.676430] __kmalloc_track_caller+0x2c4/0x760 [ 833.681081] ? pointer+0xa10/0xa10 [ 833.684605] ? print_usage_bug+0xc0/0xc0 [ 833.688672] ? kvasprintf_const+0x67/0x190 [ 833.692899] kvasprintf+0xa9/0x130 [ 833.696422] ? bust_spinlocks+0xe0/0xe0 [ 833.700386] kvasprintf_const+0x67/0x190 [ 833.704432] kobject_set_name_vargs+0x5b/0x150 [ 833.708999] dev_set_name+0xa4/0xc0 [ 833.712616] ? device_initialize+0x5d0/0x5d0 [ 833.717296] ? wiphy_new_nm+0x819/0x2290 [ 833.721345] wiphy_new_nm+0x94e/0x2290 [ 833.725224] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 833.730908] ? __lock_acquire+0x7f5/0x5140 [ 833.737075] ? __lock_acquire+0x7f5/0x5140 [ 833.741306] ? check_noncircular+0x20/0x20 [ 833.746545] ? print_usage_bug+0xc0/0xc0 [ 833.750592] ? __lock_acquire+0x7f5/0x5140 [ 833.754811] ? __lock_acquire+0x7f5/0x5140 [ 833.759065] ? print_usage_bug+0xc0/0xc0 [ 833.763132] ? print_usage_bug+0xc0/0xc0 [ 833.767180] ? print_usage_bug+0xc0/0xc0 [ 833.771339] ? print_usage_bug+0xc0/0xc0 [ 833.775384] ? __lock_acquire+0x7f5/0x5140 [ 833.779604] ? check_noncircular+0x20/0x20 [ 833.783827] ? __lock_acquire+0x7f5/0x5140 [ 833.788045] ? debug_check_no_locks_freed+0x310/0x310 [ 833.793228] ? debug_check_no_locks_freed+0x310/0x310 [ 833.798399] ? print_usage_bug+0xc0/0xc0 [ 833.802445] ? print_usage_bug+0xc0/0xc0 [ 833.806487] ? __lock_acquire+0x7f5/0x5140 [ 833.810705] ? unwind_get_return_address+0x61/0xa0 [ 833.815617] ? __save_stack_trace+0x7e/0xd0 [ 833.819942] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 833.824594] ? print_usage_bug+0xc0/0xc0 [ 833.828637] ? ieee80211_restart_work+0x1a0/0x1a0 [ 833.833467] ? __lock_acquire+0x7f5/0x5140 [ 833.837683] ? __lock_acquire+0x7f5/0x5140 [ 833.841901] ? kasan_slab_alloc+0x12/0x20 [ 833.846035] ? kmem_cache_alloc+0x12e/0x760 [ 833.850912] ? __d_alloc+0xc0/0xd30 [ 833.854529] ? graph_lock+0x170/0x170 [ 833.858315] ? debug_check_no_locks_freed+0x310/0x310 [ 833.863489] ? debug_check_no_locks_freed+0x310/0x310 [ 833.868662] ? __lock_acquire+0x7f5/0x5140 [ 833.872884] ? print_usage_bug+0xc0/0xc0 [ 833.876943] ? find_held_lock+0x36/0x1c0 [ 833.880995] ? lock_downgrade+0x8e0/0x8e0 [ 833.885136] ? mark_held_locks+0xc9/0x160 [ 833.889269] ? kasan_check_read+0x11/0x20 [ 833.893401] ? __local_bh_enable_ip+0x161/0x230 [ 833.898053] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 833.903056] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 833.908143] ? trace_hardirqs_on+0xd/0x10 [ 833.912273] ? __local_bh_enable_ip+0x161/0x230 [ 833.916926] mac80211_hwsim_new_radio+0x235/0x33b0 [ 833.921844] ? graph_lock+0x170/0x170 [ 833.925641] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 833.931771] ? lock_release+0xa10/0xa10 [ 833.935732] ? check_same_owner+0x320/0x320 [ 833.940038] ? rcu_note_context_switch+0x710/0x710 [ 833.944953] ? __lock_acquire+0x7f5/0x5140 [ 833.949171] ? __might_sleep+0x95/0x190 [ 833.953224] ? kasan_check_write+0x14/0x20 [ 833.957445] ? __mutex_lock+0x7d9/0x17f0 [ 833.961492] ? genl_rcv_msg+0x13a/0x170 [ 833.965448] ? __lock_acquire+0x7f5/0x5140 [ 833.969668] ? mutex_trylock+0x2a0/0x2a0 [ 833.973712] ? graph_lock+0x170/0x170 [ 833.977498] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 833.982673] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 833.987676] ? validate_nla+0x2d9/0x7b0 [ 833.991669] hwsim_new_radio_nl+0x7b8/0xa60 [ 833.995974] ? nla_parse+0x358/0x4a0 [ 833.999671] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 834.004866] ? __netlink_ns_capable+0x100/0x130 [ 834.009528] genl_family_rcv_msg+0x889/0x1120 [ 834.014217] ? genl_rcv+0x40/0x40 [ 834.017656] ? lock_downgrade+0x8e0/0x8e0 [ 834.021788] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 834.026789] ? kasan_check_read+0x11/0x20 [ 834.030920] ? lock_acquire+0x1dc/0x520 [ 834.034884] ? genl_rcv+0x19/0x40 [ 834.038330] genl_rcv_msg+0xc6/0x170 [ 834.042037] netlink_rcv_skb+0x172/0x440 [ 834.046083] ? genl_family_rcv_msg+0x1120/0x1120 [ 834.050821] ? netlink_ack+0xbc0/0xbc0 [ 834.054691] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 834.059866] ? netlink_skb_destructor+0x210/0x210 [ 834.064692] genl_rcv+0x28/0x40 [ 834.067955] netlink_unicast+0x58b/0x740 [ 834.072002] ? netlink_attachskb+0x970/0x970 [ 834.076404] ? import_iovec+0x24b/0x420 [ 834.080378] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 834.085377] ? security_netlink_send+0x88/0xb0 [ 834.089941] netlink_sendmsg+0x9f0/0xfa0 [ 834.093988] ? netlink_unicast+0x740/0x740 [ 834.098208] ? security_socket_sendmsg+0x94/0xc0 [ 834.103033] ? netlink_unicast+0x740/0x740 [ 834.107254] sock_sendmsg+0xd5/0x120 [ 834.110951] ___sys_sendmsg+0x805/0x940 [ 834.114912] ? copy_msghdr_from_user+0x560/0x560 [ 834.119656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 834.125184] ? proc_fail_nth_write+0x96/0x1f0 [ 834.129666] ? __fget_light+0x2ef/0x430 [ 834.133630] ? fget_raw+0x20/0x20 [ 834.137068] ? find_held_lock+0x36/0x1c0 [ 834.141114] ? kasan_check_write+0x14/0x20 [ 834.145337] ? wait_for_completion+0x870/0x870 [ 834.149910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 834.155427] ? sockfd_lookup_light+0xc5/0x160 [ 834.159905] __sys_sendmsg+0x115/0x270 [ 834.163775] ? __ia32_sys_shutdown+0x80/0x80 [ 834.168164] ? __sb_end_write+0xac/0xe0 [ 834.172133] ? fput+0x130/0x1a0 [ 834.175398] ? ksys_write+0x1a6/0x250 [ 834.179187] __x64_sys_sendmsg+0x78/0xb0 [ 834.183235] do_syscall_64+0x1b1/0x800 [ 834.187105] ? syscall_return_slowpath+0x5c0/0x5c0 [ 834.192024] ? syscall_return_slowpath+0x30f/0x5c0 [ 834.196939] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 834.202287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 834.207125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.212296] RIP: 0033:0x455a09 [ 834.215466] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 834.223165] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 834.230544] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 834.237796] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 834.245045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 834.252296] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000004 08:45:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000100000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8100, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:34 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:34 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000000001100"}, 0x2c) 08:45:34 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720200"}, &(0x7f0000000140)=0x44) 08:45:34 executing program 0 (fault-call:3 fault-nth:5): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x50]}}, 0x1c) [ 834.343498] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 834.352829] IPVS: ftp: loaded support on port[0] = 21 [ 834.385816] FAULT_INJECTION: forcing a failure. [ 834.385816] name failslab, interval 1, probability 0, space 0, times 0 [ 834.397202] CPU: 0 PID: 26214 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 834.404478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.413839] Call Trace: [ 834.416437] dump_stack+0x1b9/0x294 [ 834.420074] ? dump_stack_print_info.cold.2+0x52/0x52 [ 834.425277] ? print_usage_bug+0xc0/0xc0 [ 834.429375] should_fail.cold.4+0xa/0x1a [ 834.433456] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 834.438573] ? graph_lock+0x170/0x170 [ 834.442387] ? mark_held_locks+0xc9/0x160 [ 834.446541] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 834.451134] ? find_held_lock+0x36/0x1c0 [ 834.455206] ? __lock_is_held+0xb5/0x140 [ 834.459287] ? check_same_owner+0x320/0x320 [ 834.463627] ? rcu_note_context_switch+0x710/0x710 [ 834.468565] __should_failslab+0x124/0x180 [ 834.472808] should_failslab+0x9/0x14 [ 834.476624] __kmalloc+0x2c8/0x760 [ 834.480176] ? lockdep_init_map+0x9/0x10 [ 834.484244] ? rfkill_alloc+0xf2/0x390 [ 834.488144] rfkill_alloc+0xf2/0x390 [ 834.491873] ? rfkill_fop_read+0x710/0x710 [ 834.496115] ? __lockdep_init_map+0x105/0x590 [ 834.500628] wiphy_new_nm+0x1633/0x2290 [ 834.504638] ? cfg80211_dev_check_name.isra.7+0x420/0x420 [ 834.510183] ? __lock_acquire+0x7f5/0x5140 [ 834.514425] ? __lock_acquire+0x7f5/0x5140 [ 834.518667] ? check_noncircular+0x20/0x20 [ 834.522912] ? print_usage_bug+0xc0/0xc0 [ 834.526984] ? __lock_acquire+0x7f5/0x5140 [ 834.531226] ? __lock_acquire+0x7f5/0x5140 [ 834.535469] ? print_usage_bug+0xc0/0xc0 [ 834.539541] ? print_usage_bug+0xc0/0xc0 [ 834.543617] ? print_usage_bug+0xc0/0xc0 [ 834.547686] ? print_usage_bug+0xc0/0xc0 [ 834.551759] ? __lock_acquire+0x7f5/0x5140 [ 834.556004] ? check_noncircular+0x20/0x20 [ 834.560252] ? __lock_acquire+0x7f5/0x5140 [ 834.564509] ? debug_check_no_locks_freed+0x310/0x310 [ 834.569700] ? print_usage_bug+0xc0/0xc0 [ 834.573874] ? print_usage_bug+0xc0/0xc0 [ 834.577934] ? __lock_acquire+0x7f5/0x5140 08:45:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb405], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb8], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:34 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 834.582177] ? unwind_get_return_address+0x61/0xa0 [ 834.587112] ? __save_stack_trace+0x7e/0xd0 [ 834.591438] ieee80211_alloc_hw_nm+0x4c9/0x20d0 [ 834.596109] ? print_usage_bug+0xc0/0xc0 [ 834.600174] ? ieee80211_restart_work+0x1a0/0x1a0 [ 834.605025] ? __lock_acquire+0x7f5/0x5140 [ 834.609260] ? __lock_acquire+0x7f5/0x5140 [ 834.613497] ? kasan_slab_alloc+0x12/0x20 [ 834.617654] ? kmem_cache_alloc+0x12e/0x760 [ 834.621978] ? __d_alloc+0xc0/0xd30 [ 834.625620] ? graph_lock+0x170/0x170 [ 834.629419] ? debug_check_no_locks_freed+0x310/0x310 08:45:34 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2]}}, 0x1c) 08:45:35 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 834.634612] ? debug_check_no_locks_freed+0x310/0x310 [ 834.639807] ? __lock_acquire+0x7f5/0x5140 [ 834.644050] ? print_usage_bug+0xc0/0xc0 [ 834.648111] ? find_held_lock+0x36/0x1c0 [ 834.652187] ? lock_downgrade+0x8e0/0x8e0 [ 834.656339] ? mark_held_locks+0xc9/0x160 [ 834.660493] ? kasan_check_read+0x11/0x20 [ 834.664654] ? __local_bh_enable_ip+0x161/0x230 [ 834.669323] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 834.674345] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 834.679450] ? trace_hardirqs_on+0xd/0x10 [ 834.683613] ? __local_bh_enable_ip+0x161/0x230 [ 834.688293] mac80211_hwsim_new_radio+0x235/0x33b0 [ 834.693228] ? graph_lock+0x170/0x170 [ 834.697046] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 834.703197] ? lock_release+0xa10/0xa10 [ 834.707174] ? check_same_owner+0x320/0x320 [ 834.711678] ? rcu_note_context_switch+0x710/0x710 [ 834.717953] ? __lock_acquire+0x7f5/0x5140 [ 834.722191] ? __might_sleep+0x95/0x190 [ 834.726169] ? kasan_check_write+0x14/0x20 [ 834.730408] ? __mutex_lock+0x7d9/0x17f0 [ 834.737534] ? genl_rcv_msg+0x13a/0x170 [ 834.741524] ? __lock_acquire+0x7f5/0x5140 [ 834.745794] ? mutex_trylock+0x2a0/0x2a0 [ 834.749857] ? graph_lock+0x170/0x170 [ 834.753668] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 834.758867] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 834.763884] ? validate_nla+0x2d9/0x7b0 [ 834.767866] hwsim_new_radio_nl+0x7b8/0xa60 [ 834.772186] ? nla_parse+0x358/0x4a0 [ 834.775910] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 834.781111] ? __netlink_ns_capable+0x100/0x130 [ 834.785789] genl_family_rcv_msg+0x889/0x1120 [ 834.790291] ? genl_rcv+0x40/0x40 [ 834.793752] ? lock_downgrade+0x8e0/0x8e0 [ 834.797906] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 834.802953] ? kasan_check_read+0x11/0x20 [ 834.807112] ? lock_acquire+0x1dc/0x520 [ 834.811086] ? genl_rcv+0x19/0x40 [ 834.814583] genl_rcv_msg+0xc6/0x170 [ 834.818312] netlink_rcv_skb+0x172/0x440 [ 834.822379] ? genl_family_rcv_msg+0x1120/0x1120 [ 834.827141] ? netlink_ack+0xbc0/0xbc0 [ 834.831030] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 834.836224] ? netlink_skb_destructor+0x210/0x210 [ 834.841078] genl_rcv+0x28/0x40 [ 834.844370] netlink_unicast+0x58b/0x740 [ 834.848442] ? netlink_attachskb+0x970/0x970 [ 834.852853] ? import_iovec+0x24b/0x420 [ 834.856838] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 834.861850] ? security_netlink_send+0x88/0xb0 [ 834.866415] netlink_sendmsg+0x9f0/0xfa0 [ 834.870468] ? netlink_unicast+0x740/0x740 [ 834.874693] ? security_socket_sendmsg+0x94/0xc0 [ 834.879426] ? netlink_unicast+0x740/0x740 [ 834.883641] sock_sendmsg+0xd5/0x120 [ 834.887335] ___sys_sendmsg+0x805/0x940 [ 834.891292] ? copy_msghdr_from_user+0x560/0x560 [ 834.896042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 834.901568] ? proc_fail_nth_write+0x96/0x1f0 [ 834.906050] ? __fget_light+0x2ef/0x430 [ 834.910004] ? fget_raw+0x20/0x20 [ 834.913445] ? find_held_lock+0x36/0x1c0 [ 834.917491] ? kasan_check_write+0x14/0x20 [ 834.921720] ? wait_for_completion+0x870/0x870 [ 834.926298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 834.931817] ? sockfd_lookup_light+0xc5/0x160 [ 834.936293] __sys_sendmsg+0x115/0x270 [ 834.940163] ? __ia32_sys_shutdown+0x80/0x80 [ 834.944558] ? __sb_end_write+0xac/0xe0 [ 834.948513] ? fput+0x130/0x1a0 [ 834.951775] ? ksys_write+0x1a6/0x250 [ 834.955572] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 834.960400] __x64_sys_sendmsg+0x78/0xb0 [ 834.964452] do_syscall_64+0x1b1/0x800 [ 834.968329] ? finish_task_switch+0x1ca/0x840 [ 834.972808] ? syscall_return_slowpath+0x5c0/0x5c0 [ 834.977724] ? syscall_return_slowpath+0x30f/0x5c0 [ 834.982650] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 834.988087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 834.992918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.998085] RIP: 0033:0x455a09 [ 835.001254] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 835.008943] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 835.016192] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 835.023453] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 835.030711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 08:45:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000100000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:35 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x2c) 08:45:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x15554]}}, 0x1c) 08:45:35 executing program 0 (fault-call:3 fault-nth:6): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 835.037969] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000005 [ 835.122303] FAULT_INJECTION: forcing a failure. [ 835.122303] name failslab, interval 1, probability 0, space 0, times 0 [ 835.133623] CPU: 1 PID: 26257 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 835.140905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.150267] Call Trace: [ 835.152865] dump_stack+0x1b9/0x294 [ 835.156509] ? dump_stack_print_info.cold.2+0x52/0x52 [ 835.161713] ? debug_object_free+0x5f0/0x5f0 [ 835.166144] should_fail.cold.4+0xa/0x1a [ 835.170220] ? __lock_is_held+0xb5/0x140 [ 835.174294] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 835.179410] ? mark_held_locks+0xc9/0x160 [ 835.183575] ? graph_lock+0x170/0x170 [ 835.187386] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 835.192417] ? find_held_lock+0x36/0x1c0 [ 835.196491] ? __lock_is_held+0xb5/0x140 [ 835.200576] ? check_same_owner+0x320/0x320 [ 835.204912] ? rcu_note_context_switch+0x710/0x710 [ 835.209872] __should_failslab+0x124/0x180 [ 835.214118] should_failslab+0x9/0x14 [ 835.217933] kmem_cache_alloc_node_trace+0x26f/0x770 [ 835.223049] ? __lockdep_init_map+0x105/0x590 [ 835.227568] __kmalloc_node+0x33/0x70 [ 835.231382] kvmalloc_node+0x6b/0x100 [ 835.235194] bucket_table_alloc+0x4c4/0x5d0 [ 835.239523] ? __raw_spin_lock_init+0x1c/0x100 [ 835.244118] ? rhashtable_insert_one+0xb20/0xb20 [ 835.248886] ? __lockdep_init_map+0x105/0x590 [ 835.253415] rhashtable_init+0x5ba/0xaa0 [ 835.257489] ? rhashtable_rehash_alloc+0x100/0x100 [ 835.262429] ? check_noncircular+0x20/0x20 [ 835.265184] IPVS: ftp: loaded support on port[0] = 21 [ 835.266676] ? __lock_acquire+0x7f5/0x5140 [ 835.266705] rhltable_init+0x58/0xb0 [ 835.266722] sta_info_init+0x75/0x1e0 [ 835.266740] ? print_usage_bug+0xc0/0xc0 [ 835.287681] ? sta_info_recalc_tim+0x20/0x20 [ 835.292097] ? print_usage_bug+0xc0/0xc0 [ 835.296251] ? __lock_acquire+0x7f5/0x5140 [ 835.300494] ? unwind_get_return_address+0x61/0xa0 [ 835.305431] ? __save_stack_trace+0x7e/0xd0 [ 835.309759] ieee80211_alloc_hw_nm+0x796/0x20d0 [ 835.314432] ? print_usage_bug+0xc0/0xc0 [ 835.318500] ? ieee80211_restart_work+0x1a0/0x1a0 [ 835.323353] ? __lock_acquire+0x7f5/0x5140 [ 835.327594] ? __lock_acquire+0x7f5/0x5140 [ 835.331829] ? kasan_slab_alloc+0x12/0x20 [ 835.335983] ? kmem_cache_alloc+0x12e/0x760 [ 835.340310] ? __d_alloc+0xc0/0xd30 [ 835.343943] ? d_alloc+0x8e/0x370 [ 835.347406] ? graph_lock+0x170/0x170 [ 835.351211] ? debug_check_no_locks_freed+0x310/0x310 [ 835.356406] ? debug_check_no_locks_freed+0x310/0x310 [ 835.361606] ? print_usage_bug+0xc0/0xc0 [ 835.365659] ? find_held_lock+0x36/0x1c0 [ 835.369722] ? lock_downgrade+0x8e0/0x8e0 [ 835.373868] ? mark_held_locks+0xc9/0x160 [ 835.378013] ? kasan_check_read+0x11/0x20 [ 835.382170] ? __local_bh_enable_ip+0x161/0x230 [ 835.386842] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 835.391842] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 835.396943] ? trace_hardirqs_on+0xd/0x10 [ 835.401084] ? __local_bh_enable_ip+0x161/0x230 [ 835.405746] mac80211_hwsim_new_radio+0x235/0x33b0 [ 835.410672] ? graph_lock+0x170/0x170 [ 835.414465] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 835.420602] ? lock_release+0xa10/0xa10 [ 835.424582] ? check_same_owner+0x320/0x320 [ 835.428920] ? rcu_note_context_switch+0x710/0x710 [ 835.433848] ? __lock_acquire+0x7f5/0x5140 [ 835.438091] ? __might_sleep+0x95/0x190 [ 835.442156] ? kasan_check_write+0x14/0x20 [ 835.446384] ? __mutex_lock+0x7d9/0x17f0 [ 835.450441] ? genl_rcv_msg+0x13a/0x170 [ 835.454415] ? __lock_acquire+0x7f5/0x5140 [ 835.458652] ? mutex_trylock+0x2a0/0x2a0 [ 835.462729] ? graph_lock+0x170/0x170 [ 835.466542] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 835.471741] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 835.476766] ? validate_nla+0x2d9/0x7b0 [ 835.480738] hwsim_new_radio_nl+0x7b8/0xa60 [ 835.485059] ? nla_parse+0x358/0x4a0 [ 835.488768] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 835.493959] ? __netlink_ns_capable+0x100/0x130 [ 835.498629] genl_family_rcv_msg+0x889/0x1120 [ 835.503130] ? genl_rcv+0x40/0x40 [ 835.506583] ? lock_downgrade+0x8e0/0x8e0 [ 835.510722] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 835.515730] ? kasan_check_read+0x11/0x20 [ 835.519862] ? lock_acquire+0x1dc/0x520 [ 835.523826] ? genl_rcv+0x19/0x40 [ 835.527292] genl_rcv_msg+0xc6/0x170 [ 835.531042] netlink_rcv_skb+0x172/0x440 [ 835.535113] ? genl_family_rcv_msg+0x1120/0x1120 [ 835.539868] ? netlink_ack+0xbc0/0xbc0 [ 835.543744] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 835.548932] ? netlink_skb_destructor+0x210/0x210 [ 835.553765] genl_rcv+0x28/0x40 [ 835.557048] netlink_unicast+0x58b/0x740 [ 835.561106] ? netlink_attachskb+0x970/0x970 [ 835.565499] ? import_iovec+0x24b/0x420 [ 835.569476] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 835.574486] ? security_netlink_send+0x88/0xb0 [ 835.579061] netlink_sendmsg+0x9f0/0xfa0 [ 835.583109] ? netlink_unicast+0x740/0x740 [ 835.587330] ? security_socket_sendmsg+0x94/0xc0 [ 835.592069] ? netlink_unicast+0x740/0x740 [ 835.596286] sock_sendmsg+0xd5/0x120 [ 835.599985] ___sys_sendmsg+0x805/0x940 [ 835.603952] ? copy_msghdr_from_user+0x560/0x560 [ 835.608701] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 835.614232] ? proc_fail_nth_write+0x96/0x1f0 [ 835.618725] ? __fget_light+0x2ef/0x430 [ 835.622682] ? fget_raw+0x20/0x20 [ 835.626117] ? find_held_lock+0x36/0x1c0 [ 835.630168] ? kasan_check_write+0x14/0x20 [ 835.634390] ? wait_for_completion+0x870/0x870 [ 835.639007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 835.644552] ? sockfd_lookup_light+0xc5/0x160 [ 835.649052] __sys_sendmsg+0x115/0x270 [ 835.652940] ? __ia32_sys_shutdown+0x80/0x80 [ 835.657352] ? __sb_end_write+0xac/0xe0 [ 835.661321] ? fput+0x130/0x1a0 [ 835.664586] ? ksys_write+0x1a6/0x250 [ 835.668400] __x64_sys_sendmsg+0x78/0xb0 [ 835.672453] do_syscall_64+0x1b1/0x800 [ 835.676325] ? finish_task_switch+0x1ca/0x840 [ 835.680805] ? syscall_return_slowpath+0x5c0/0x5c0 [ 835.685718] ? syscall_return_slowpath+0x30f/0x5c0 [ 835.690644] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 835.696013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.700872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.706052] RIP: 0033:0x455a09 [ 835.709237] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 835.716935] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 835.724201] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 835.731460] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 835.738717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 835.745972] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000006 [ 835.763502] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x700, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5555000000000000]}}, 0x1c) 08:45:37 executing program 0 (fault-call:3 fault-nth:7): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:37 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e710000048f00"}, 0x2c) 08:45:37 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000100000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:37 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:37 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000000036c00"}, &(0x7f0000000140)=0x44) [ 837.453611] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 837.463126] FAULT_INJECTION: forcing a failure. [ 837.463126] name failslab, interval 1, probability 0, space 0, times 0 [ 837.464946] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 837.474954] CPU: 1 PID: 26283 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 837.492152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.501507] Call Trace: [ 837.504102] dump_stack+0x1b9/0x294 [ 837.507742] ? dump_stack_print_info.cold.2+0x52/0x52 [ 837.510431] IPVS: ftp: loaded support on port[0] = 21 [ 837.512936] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 837.512960] should_fail.cold.4+0xa/0x1a [ 837.512980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 837.532476] ? unwind_get_return_address+0x61/0xa0 [ 837.537413] ? __save_stack_trace+0x7e/0xd0 [ 837.541738] ? graph_lock+0x170/0x170 [ 837.545548] ? find_held_lock+0x36/0x1c0 [ 837.549621] ? __lock_is_held+0xb5/0x140 [ 837.553693] ? check_same_owner+0x320/0x320 [ 837.558020] ? rcu_note_context_switch+0x710/0x710 [ 837.562982] __should_failslab+0x124/0x180 [ 837.567218] should_failslab+0x9/0x14 [ 837.571019] kmem_cache_alloc_node_trace+0x26f/0x770 [ 837.576125] ? __kmalloc_node+0x33/0x70 [ 837.580100] ? __kmalloc_node+0x33/0x70 [ 837.584080] ? rcu_read_lock_sched_held+0x108/0x120 [ 837.589107] __kmalloc_node+0x33/0x70 [ 837.592916] kvmalloc_node+0x6b/0x100 [ 837.596720] alloc_bucket_spinlocks+0x92/0x1a0 [ 837.601308] bucket_table_alloc+0x17e/0x5d0 [ 837.605638] ? __raw_spin_lock_init+0x1c/0x100 [ 837.610222] ? rhashtable_insert_one+0xb20/0xb20 [ 837.614981] ? __lockdep_init_map+0x105/0x590 [ 837.619489] rhashtable_init+0x5ba/0xaa0 [ 837.623558] ? rhashtable_rehash_alloc+0x100/0x100 [ 837.628492] ? check_noncircular+0x20/0x20 [ 837.632749] ? __lock_acquire+0x7f5/0x5140 [ 837.636995] rhltable_init+0x58/0xb0 [ 837.640715] sta_info_init+0x75/0x1e0 [ 837.644521] ? print_usage_bug+0xc0/0xc0 [ 837.648590] ? sta_info_recalc_tim+0x20/0x20 [ 837.653002] ? print_usage_bug+0xc0/0xc0 [ 837.654159] IPVS: ftp: loaded support on port[0] = 21 [ 837.657061] ? __lock_acquire+0x7f5/0x5140 [ 837.657081] ? unwind_get_return_address+0x61/0xa0 [ 837.657097] ? __save_stack_trace+0x7e/0xd0 [ 837.657113] ieee80211_alloc_hw_nm+0x796/0x20d0 [ 837.657128] ? print_usage_bug+0xc0/0xc0 [ 837.684453] ? ieee80211_restart_work+0x1a0/0x1a0 [ 837.689306] ? __lock_acquire+0x7f5/0x5140 [ 837.693544] ? __lock_acquire+0x7f5/0x5140 [ 837.697793] ? kasan_slab_alloc+0x12/0x20 [ 837.701951] ? kmem_cache_alloc+0x12e/0x760 [ 837.706281] ? __d_alloc+0xc0/0xd30 [ 837.709919] ? graph_lock+0x170/0x170 [ 837.713724] ? debug_check_no_locks_freed+0x310/0x310 [ 837.718916] ? debug_check_no_locks_freed+0x310/0x310 [ 837.724105] ? __lock_acquire+0x7f5/0x5140 [ 837.728352] ? print_usage_bug+0xc0/0xc0 [ 837.732417] ? find_held_lock+0x36/0x1c0 [ 837.736488] ? lock_downgrade+0x8e0/0x8e0 [ 837.740646] ? mark_held_locks+0xc9/0x160 [ 837.744799] ? kasan_check_read+0x11/0x20 [ 837.748964] ? __local_bh_enable_ip+0x161/0x230 08:45:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x83a, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:37 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) [ 837.753653] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 837.758685] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 837.763786] ? trace_hardirqs_on+0xd/0x10 [ 837.767942] ? __local_bh_enable_ip+0x161/0x230 [ 837.772621] mac80211_hwsim_new_radio+0x235/0x33b0 [ 837.777554] ? graph_lock+0x170/0x170 [ 837.781370] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 837.787520] ? lock_release+0xa10/0xa10 [ 837.791496] ? check_same_owner+0x320/0x320 [ 837.795829] ? rcu_note_context_switch+0x710/0x710 [ 837.800763] ? __lock_acquire+0x7f5/0x5140 [ 837.805015] ? __might_sleep+0x95/0x190 [ 837.808998] ? kasan_check_write+0x14/0x20 [ 837.813243] ? __mutex_lock+0x7d9/0x17f0 [ 837.817307] ? genl_rcv_msg+0x13a/0x170 [ 837.821288] ? __lock_acquire+0x7f5/0x5140 [ 837.825526] ? mutex_trylock+0x2a0/0x2a0 [ 837.829591] ? graph_lock+0x170/0x170 [ 837.833403] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 837.838603] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 837.843626] ? validate_nla+0x2d9/0x7b0 [ 837.847607] hwsim_new_radio_nl+0x7b8/0xa60 [ 837.851927] ? nla_parse+0x358/0x4a0 [ 837.855652] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 837.860851] ? __netlink_ns_capable+0x100/0x130 [ 837.865528] genl_family_rcv_msg+0x889/0x1120 [ 837.870034] ? genl_rcv+0x40/0x40 [ 837.873497] ? lock_downgrade+0x8e0/0x8e0 [ 837.877637] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 837.882637] ? kasan_check_read+0x11/0x20 [ 837.886768] ? lock_acquire+0x1dc/0x520 [ 837.890741] ? genl_rcv+0x19/0x40 [ 837.894358] genl_rcv_msg+0xc6/0x170 [ 837.898053] netlink_rcv_skb+0x172/0x440 [ 837.902094] ? genl_family_rcv_msg+0x1120/0x1120 [ 837.906921] ? netlink_ack+0xbc0/0xbc0 [ 837.910791] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 837.915966] ? netlink_skb_destructor+0x210/0x210 [ 837.920799] genl_rcv+0x28/0x40 [ 837.924069] netlink_unicast+0x58b/0x740 [ 837.928111] ? netlink_attachskb+0x970/0x970 [ 837.932515] ? import_iovec+0x24b/0x420 [ 837.936471] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 837.941469] ? security_netlink_send+0x88/0xb0 [ 837.946040] netlink_sendmsg+0x9f0/0xfa0 [ 837.950086] ? netlink_unicast+0x740/0x740 [ 837.954301] ? security_socket_sendmsg+0x94/0xc0 [ 837.959039] ? netlink_unicast+0x740/0x740 [ 837.963265] sock_sendmsg+0xd5/0x120 [ 837.966959] ___sys_sendmsg+0x805/0x940 [ 837.970917] ? copy_msghdr_from_user+0x560/0x560 [ 837.975667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 837.981184] ? proc_fail_nth_write+0x96/0x1f0 [ 837.985660] ? __fget_light+0x2ef/0x430 [ 837.989626] ? fget_raw+0x20/0x20 [ 837.993069] ? find_held_lock+0x36/0x1c0 [ 837.997120] ? kasan_check_write+0x14/0x20 [ 838.001350] ? wait_for_completion+0x870/0x870 [ 838.005921] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.011440] ? sockfd_lookup_light+0xc5/0x160 [ 838.015917] __sys_sendmsg+0x115/0x270 [ 838.019802] ? __ia32_sys_shutdown+0x80/0x80 [ 838.024213] ? __sb_end_write+0xac/0xe0 [ 838.028173] ? fput+0x130/0x1a0 [ 838.031446] ? ksys_write+0x1a6/0x250 [ 838.035250] __x64_sys_sendmsg+0x78/0xb0 [ 838.039390] do_syscall_64+0x1b1/0x800 [ 838.043267] ? finish_task_switch+0x1ca/0x840 [ 838.047746] ? syscall_return_slowpath+0x5c0/0x5c0 [ 838.052655] ? syscall_return_slowpath+0x30f/0x5c0 [ 838.057568] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 838.062915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 838.067738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.072905] RIP: 0033:0x455a09 [ 838.076073] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 838.083768] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 838.091029] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 838.098281] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 08:45:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x808, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:38 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x4000000000000000]}}, 0x1c) 08:45:38 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:38 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000002b800"}, &(0x7f0000000140)=0x44) 08:45:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\t\x00'}, 0x2c) 08:45:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000400000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:38 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 838.105547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 838.112812] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000007 [ 838.174595] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 838.191423] IPVS: ftp: loaded support on port[0] = 21 [ 838.202722] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 838.221901] FAULT_INJECTION: forcing a failure. [ 838.221901] name failslab, interval 1, probability 0, space 0, times 0 [ 838.233245] CPU: 1 PID: 26326 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 838.240520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.249871] Call Trace: [ 838.252469] dump_stack+0x1b9/0x294 [ 838.256105] ? dump_stack_print_info.cold.2+0x52/0x52 [ 838.261306] ? print_usage_bug+0xc0/0xc0 [ 838.265380] should_fail.cold.4+0xa/0x1a [ 838.269454] ? fault_create_debugfs_attr+0x1f0/0x1f0 08:45:38 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:38 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x807, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 838.274570] ? graph_lock+0x170/0x170 [ 838.278377] ? find_held_lock+0x36/0x1c0 [ 838.282449] ? __lock_is_held+0xb5/0x140 [ 838.286531] ? check_same_owner+0x320/0x320 [ 838.290862] ? trace_hardirqs_on+0xd/0x10 [ 838.295020] ? rcu_note_context_switch+0x710/0x710 [ 838.299961] __should_failslab+0x124/0x180 [ 838.304205] should_failslab+0x9/0x14 [ 838.308012] __kmalloc_track_caller+0x2c4/0x760 [ 838.312682] ? pointer+0xa10/0xa10 [ 838.316228] ? print_usage_bug+0xc0/0xc0 [ 838.320295] ? kasprintf+0xa2/0xc0 08:45:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000600"}, 0x2c) [ 838.323842] kvasprintf+0xa9/0x130 [ 838.327386] ? bust_spinlocks+0xe0/0xe0 [ 838.331366] ? __lockdep_init_map+0x105/0x590 [ 838.335871] kasprintf+0xa2/0xc0 [ 838.339246] ? kvasprintf_const+0x190/0x190 [ 838.343576] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 838.346942] IPVS: ftp: loaded support on port[0] = 21 [ 838.348601] ieee80211_alloc_led_names+0x85/0x410 [ 838.348621] ieee80211_alloc_hw_nm+0x1b36/0x20d0 [ 838.348640] ? ieee80211_restart_work+0x1a0/0x1a0 [ 838.348656] ? __lock_acquire+0x7f5/0x5140 08:45:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x833, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:38 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 838.348673] ? __lock_acquire+0x7f5/0x5140 [ 838.376675] ? kasan_slab_alloc+0x12/0x20 [ 838.380828] ? kmem_cache_alloc+0x12e/0x760 [ 838.385149] ? __d_alloc+0xc0/0xd30 [ 838.388791] ? graph_lock+0x170/0x170 [ 838.392596] ? debug_check_no_locks_freed+0x310/0x310 [ 838.397792] ? __lock_acquire+0x7f5/0x5140 [ 838.400645] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 838.402028] ? print_usage_bug+0xc0/0xc0 [ 838.402045] ? find_held_lock+0x36/0x1c0 [ 838.402068] ? lock_downgrade+0x8e0/0x8e0 [ 838.402085] ? mark_held_locks+0xc9/0x160 08:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xf4010000]}}, 0x1c) [ 838.424075] ? kasan_check_read+0x11/0x20 [ 838.428235] ? __local_bh_enable_ip+0x161/0x230 [ 838.432910] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 838.438017] ? trace_hardirqs_on+0xd/0x10 [ 838.442170] ? __local_bh_enable_ip+0x161/0x230 [ 838.447453] mac80211_hwsim_new_radio+0x235/0x33b0 [ 838.452396] ? graph_lock+0x170/0x170 [ 838.456209] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 838.462362] ? lock_release+0xa10/0xa10 [ 838.466339] ? check_same_owner+0x320/0x320 [ 838.470668] ? rcu_note_context_switch+0x710/0x710 08:45:38 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00L\x00'}, 0x2c) 08:45:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x4305, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:38 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 838.475598] ? __lock_acquire+0x7f5/0x5140 [ 838.479841] ? __might_sleep+0x95/0x190 [ 838.483820] ? kasan_check_write+0x14/0x20 [ 838.488058] ? __mutex_lock+0x7d9/0x17f0 [ 838.492125] ? genl_rcv_msg+0x13a/0x170 [ 838.496102] ? __lock_acquire+0x7f5/0x5140 [ 838.500343] ? mutex_trylock+0x2a0/0x2a0 [ 838.504410] ? graph_lock+0x170/0x170 [ 838.508218] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 838.513415] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 838.518432] ? validate_nla+0x2d9/0x7b0 [ 838.522407] hwsim_new_radio_nl+0x7b8/0xa60 [ 838.526732] ? nla_parse+0x358/0x4a0 [ 838.530485] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 838.535753] ? __netlink_ns_capable+0x100/0x130 [ 838.540475] genl_family_rcv_msg+0x889/0x1120 [ 838.544976] ? genl_rcv+0x40/0x40 [ 838.548117] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 838.548431] ? lock_downgrade+0x8e0/0x8e0 [ 838.562517] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 838.567543] ? kasan_check_read+0x11/0x20 [ 838.571701] ? lock_acquire+0x1dc/0x520 [ 838.572663] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 838.575680] ? genl_rcv+0x19/0x40 [ 838.575709] genl_rcv_msg+0xc6/0x170 [ 838.575727] netlink_rcv_skb+0x172/0x440 [ 838.575747] ? genl_family_rcv_msg+0x1120/0x1120 [ 838.575764] ? netlink_ack+0xbc0/0xbc0 [ 838.601180] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 838.606380] ? netlink_skb_destructor+0x210/0x210 [ 838.611239] genl_rcv+0x28/0x40 [ 838.614519] netlink_unicast+0x58b/0x740 [ 838.618584] ? netlink_attachskb+0x970/0x970 08:45:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8848, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 838.622994] ? import_iovec+0x24b/0x420 [ 838.626976] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 838.632001] ? security_netlink_send+0x88/0xb0 [ 838.636589] netlink_sendmsg+0x9f0/0xfa0 [ 838.640660] ? netlink_unicast+0x740/0x740 [ 838.644905] ? security_socket_sendmsg+0x94/0xc0 [ 838.649665] ? netlink_unicast+0x740/0x740 [ 838.653904] sock_sendmsg+0xd5/0x120 [ 838.657625] ___sys_sendmsg+0x805/0x940 [ 838.661609] ? copy_msghdr_from_user+0x560/0x560 [ 838.666381] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 838.671920] ? proc_fail_nth_write+0x96/0x1f0 [ 838.676425] ? __fget_light+0x2ef/0x430 [ 838.681062] ? fget_raw+0x20/0x20 [ 838.684516] ? find_held_lock+0x36/0x1c0 [ 838.688593] ? kasan_check_write+0x14/0x20 [ 838.692843] ? wait_for_completion+0x870/0x870 [ 838.694454] IPVS: ftp: loaded support on port[0] = 21 [ 838.697438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.697455] ? sockfd_lookup_light+0xc5/0x160 [ 838.697474] __sys_sendmsg+0x115/0x270 [ 838.697491] ? __ia32_sys_shutdown+0x80/0x80 [ 838.697506] ? __sb_end_write+0xac/0xe0 [ 838.697524] ? fput+0x130/0x1a0 [ 838.723044] hrtimer: interrupt took 217080 ns [ 838.724919] ? ksys_write+0x1a6/0x250 [ 838.736473] __x64_sys_sendmsg+0x78/0xb0 [ 838.740541] do_syscall_64+0x1b1/0x800 [ 838.744431] ? finish_task_switch+0x1ca/0x840 [ 838.748932] ? syscall_return_slowpath+0x5c0/0x5c0 [ 838.753867] ? syscall_return_slowpath+0x30f/0x5c0 [ 838.755475] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 838.758801] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 838.758822] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:45:38 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000001d00"}, &(0x7f0000000140)=0x44) 08:45:38 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00z\x00'}, 0x2c) [ 838.758842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.758853] RIP: 0033:0x455a09 [ 838.758861] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 838.758876] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 838.758889] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 838.805237] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 838.812508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 838.819780] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000008 [ 838.939525] IPVS: ftp: loaded support on port[0] = 21 08:45:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5000000]}}, 0x1c) 08:45:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000200"}, 0x2c) 08:45:39 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000003f000"}, &(0x7f0000000140)=0x44) 08:45:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000010000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x802, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:39 executing program 0 (fault-call:3 fault-nth:9): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:39 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 839.052054] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 839.067645] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 839.076701] IPVS: ftp: loaded support on port[0] = 21 08:45:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000020000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8fc, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:39 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:39 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00t\x00'}, 0x2c) 08:45:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000002000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 839.260315] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 839.261978] IPVS: ftp: loaded support on port[0] = 21 [ 839.396714] FAULT_INJECTION: forcing a failure. [ 839.396714] name failslab, interval 1, probability 0, space 0, times 0 [ 839.408262] CPU: 0 PID: 26393 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 839.415542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.424902] Call Trace: [ 839.427501] dump_stack+0x1b9/0x294 [ 839.431143] ? dump_stack_print_info.cold.2+0x52/0x52 [ 839.436352] ? __save_stack_trace+0x7e/0xd0 [ 839.440692] should_fail.cold.4+0xa/0x1a [ 839.444768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 839.449879] ? save_stack+0x43/0xd0 [ 839.453589] ? kasan_kmalloc+0xc4/0xe0 [ 839.464182] ? __kmalloc_track_caller+0x14a/0x760 [ 839.469035] ? kvasprintf+0xa9/0x130 [ 839.472760] ? kasprintf+0xa2/0xc0 [ 839.476320] ? ieee80211_alloc_led_names+0x118/0x410 [ 839.481445] ? graph_lock+0x170/0x170 [ 839.485267] ? genl_rcv_msg+0xc6/0x170 [ 839.489177] ? netlink_rcv_skb+0x172/0x440 [ 839.493418] ? genl_rcv+0x28/0x40 [ 839.496880] ? netlink_unicast+0x58b/0x740 [ 839.501123] ? netlink_sendmsg+0x9f0/0xfa0 [ 839.505367] ? sock_sendmsg+0xd5/0x120 [ 839.509268] ? find_held_lock+0x36/0x1c0 [ 839.513348] ? __lock_is_held+0xb5/0x140 [ 839.517424] ? check_same_owner+0x320/0x320 [ 839.521748] ? rcu_note_context_switch+0x710/0x710 [ 839.526682] __should_failslab+0x124/0x180 [ 839.530921] should_failslab+0x9/0x14 [ 839.534724] __kmalloc_track_caller+0x2c4/0x760 [ 839.539397] ? pointer+0xa10/0xa10 [ 839.542940] ? print_usage_bug+0xc0/0xc0 [ 839.547001] ? kasprintf+0xa2/0xc0 [ 839.550544] kvasprintf+0xa9/0x130 [ 839.554084] ? bust_spinlocks+0xe0/0xe0 [ 839.558058] ? __lockdep_init_map+0x105/0x590 [ 839.562558] kasprintf+0xa2/0xc0 [ 839.565923] ? kvasprintf_const+0x190/0x190 [ 839.570316] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 839.575344] ieee80211_alloc_led_names+0x1ab/0x410 [ 839.580281] ieee80211_alloc_hw_nm+0x1b36/0x20d0 [ 839.585040] ? ieee80211_restart_work+0x1a0/0x1a0 [ 839.589886] ? __lock_acquire+0x7f5/0x5140 [ 839.594143] ? __lock_acquire+0x7f5/0x5140 [ 839.598396] ? kasan_slab_alloc+0x12/0x20 [ 839.602546] ? kmem_cache_alloc+0x12e/0x760 [ 839.606888] ? __d_alloc+0xc0/0xd30 [ 839.610518] ? d_alloc+0x8e/0x370 [ 839.613983] ? graph_lock+0x170/0x170 [ 839.617785] ? debug_check_no_locks_freed+0x310/0x310 [ 839.622976] ? __lock_acquire+0x7f5/0x5140 [ 839.627216] ? print_usage_bug+0xc0/0xc0 [ 839.631278] ? find_held_lock+0x36/0x1c0 [ 839.635347] ? lock_downgrade+0x8e0/0x8e0 [ 839.639500] ? mark_held_locks+0xc9/0x160 [ 839.643650] ? kasan_check_read+0x11/0x20 [ 839.647800] ? __local_bh_enable_ip+0x161/0x230 [ 839.652475] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 839.657575] ? trace_hardirqs_on+0xd/0x10 [ 839.661723] ? __local_bh_enable_ip+0x161/0x230 [ 839.666399] mac80211_hwsim_new_radio+0x235/0x33b0 [ 839.671327] ? graph_lock+0x170/0x170 [ 839.675137] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 839.681291] ? lock_release+0xa10/0xa10 [ 839.685265] ? check_same_owner+0x320/0x320 [ 839.689589] ? rcu_note_context_switch+0x710/0x710 [ 839.694515] ? __lock_acquire+0x7f5/0x5140 [ 839.698751] ? __might_sleep+0x95/0x190 [ 839.703178] ? kasan_check_write+0x14/0x20 [ 839.707416] ? __mutex_lock+0x7d9/0x17f0 [ 839.711476] ? genl_rcv_msg+0x13a/0x170 [ 839.715452] ? __lock_acquire+0x7f5/0x5140 [ 839.722231] ? mutex_trylock+0x2a0/0x2a0 [ 839.726291] ? graph_lock+0x170/0x170 [ 839.730094] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 839.737937] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 839.743033] ? validate_nla+0x2d9/0x7b0 [ 839.747027] hwsim_new_radio_nl+0x7b8/0xa60 [ 839.751364] ? nla_parse+0x358/0x4a0 [ 839.755080] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 839.760277] ? __netlink_ns_capable+0x100/0x130 [ 839.764953] genl_family_rcv_msg+0x889/0x1120 [ 839.769474] ? genl_rcv+0x40/0x40 [ 839.772950] ? lock_downgrade+0x8e0/0x8e0 [ 839.777103] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 839.782159] ? kasan_check_read+0x11/0x20 [ 839.786395] ? lock_acquire+0x1dc/0x520 [ 839.790365] ? genl_rcv+0x19/0x40 [ 839.793830] genl_rcv_msg+0xc6/0x170 [ 839.797544] netlink_rcv_skb+0x172/0x440 [ 839.801604] ? genl_family_rcv_msg+0x1120/0x1120 [ 839.806360] ? netlink_ack+0xbc0/0xbc0 [ 839.810246] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 839.815440] ? netlink_skb_destructor+0x210/0x210 [ 839.820287] genl_rcv+0x28/0x40 [ 839.823565] netlink_unicast+0x58b/0x740 [ 839.827628] ? netlink_attachskb+0x970/0x970 [ 839.832033] ? import_iovec+0x24b/0x420 [ 839.836012] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 839.841033] ? security_netlink_send+0x88/0xb0 [ 839.845646] netlink_sendmsg+0x9f0/0xfa0 [ 839.850232] ? netlink_unicast+0x740/0x740 [ 839.854471] ? security_socket_sendmsg+0x94/0xc0 [ 839.859326] ? netlink_unicast+0x740/0x740 [ 839.863571] sock_sendmsg+0xd5/0x120 [ 839.867284] ___sys_sendmsg+0x805/0x940 [ 839.871265] ? copy_msghdr_from_user+0x560/0x560 [ 839.876060] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 839.881597] ? proc_fail_nth_write+0x96/0x1f0 [ 839.886095] ? __fget_light+0x2ef/0x430 [ 839.890076] ? fget_raw+0x20/0x20 [ 839.893528] ? find_held_lock+0x36/0x1c0 [ 839.897598] ? kasan_check_write+0x14/0x20 [ 839.901855] ? wait_for_completion+0x870/0x870 [ 839.906447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 839.911982] ? sockfd_lookup_light+0xc5/0x160 [ 839.916478] __sys_sendmsg+0x115/0x270 [ 839.920385] ? __ia32_sys_shutdown+0x80/0x80 [ 839.924791] ? __sb_end_write+0xac/0xe0 [ 839.928769] ? fput+0x130/0x1a0 [ 839.932050] ? ksys_write+0x1a6/0x250 [ 839.935863] __x64_sys_sendmsg+0x78/0xb0 [ 839.939928] do_syscall_64+0x1b1/0x800 [ 839.943815] ? syscall_return_slowpath+0x5c0/0x5c0 [ 839.948746] ? syscall_return_slowpath+0x30f/0x5c0 [ 839.953681] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 839.959046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 839.963892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.969074] RIP: 0033:0x455a09 [ 839.972257] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 839.979968] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 839.987232] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 08:45:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:40 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000004003000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x85c, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 839.994497] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 840.001904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 840.009197] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000009 08:45:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfeef]}}, 0x1c) 08:45:40 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000500"}, 0x2c) 08:45:40 executing program 0 (fault-call:3 fault-nth:10): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:40 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000400"}, &(0x7f0000000140)=0x44) 08:45:40 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 840.083064] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 840.106777] IPVS: ftp: loaded support on port[0] = 21 08:45:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000003400000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:40 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00`\x00'}, 0x2c) 08:45:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe000000]}}, 0x1c) 08:45:40 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000007fffffff00000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 840.271799] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 840.306587] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 840.362080] FAULT_INJECTION: forcing a failure. [ 840.362080] name failslab, interval 1, probability 0, space 0, times 0 [ 840.373409] CPU: 0 PID: 26473 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 840.380688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.390045] Call Trace: [ 840.392649] dump_stack+0x1b9/0x294 [ 840.396286] ? dump_stack_print_info.cold.2+0x52/0x52 [ 840.401498] ? __save_stack_trace+0x7e/0xd0 [ 840.405850] should_fail.cold.4+0xa/0x1a [ 840.409919] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 840.415026] ? save_stack+0x43/0xd0 [ 840.418654] ? kasan_kmalloc+0xc4/0xe0 [ 840.422551] ? __kmalloc_track_caller+0x14a/0x760 [ 840.427396] ? kvasprintf+0xa9/0x130 [ 840.431115] ? kasprintf+0xa2/0xc0 [ 840.434661] ? ieee80211_alloc_led_names+0x1ab/0x410 [ 840.439771] ? graph_lock+0x170/0x170 [ 840.443577] ? genl_rcv_msg+0xc6/0x170 [ 840.447465] ? netlink_rcv_skb+0x172/0x440 [ 840.451704] ? genl_rcv+0x28/0x40 [ 840.455158] ? netlink_unicast+0x58b/0x740 [ 840.459394] ? netlink_sendmsg+0x9f0/0xfa0 [ 840.463633] ? sock_sendmsg+0xd5/0x120 [ 840.467526] ? find_held_lock+0x36/0x1c0 [ 840.471594] ? __lock_is_held+0xb5/0x140 [ 840.475674] ? check_same_owner+0x320/0x320 [ 840.480002] ? rcu_note_context_switch+0x710/0x710 [ 840.484939] __should_failslab+0x124/0x180 [ 840.489180] should_failslab+0x9/0x14 [ 840.492988] __kmalloc_track_caller+0x2c4/0x760 [ 840.497665] ? pointer+0xa10/0xa10 [ 840.501211] ? print_usage_bug+0xc0/0xc0 [ 840.505279] ? kasprintf+0xa2/0xc0 [ 840.508827] kvasprintf+0xa9/0x130 [ 840.512373] ? bust_spinlocks+0xe0/0xe0 [ 840.516355] ? __lockdep_init_map+0x105/0x590 [ 840.520865] kasprintf+0xa2/0xc0 [ 840.524245] ? kvasprintf_const+0x190/0x190 [ 840.528578] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 840.533611] ieee80211_alloc_led_names+0x240/0x410 [ 840.538549] ieee80211_alloc_hw_nm+0x1b36/0x20d0 [ 840.543315] ? ieee80211_restart_work+0x1a0/0x1a0 [ 840.548384] ? __lock_acquire+0x7f5/0x5140 [ 840.552635] ? __lock_acquire+0x7f5/0x5140 [ 840.556872] ? kasan_slab_alloc+0x12/0x20 [ 840.561033] ? kmem_cache_alloc+0x12e/0x760 [ 840.565376] ? __d_alloc+0xc0/0xd30 [ 840.569013] ? graph_lock+0x170/0x170 [ 840.572430] IPVS: ftp: loaded support on port[0] = 21 [ 840.572816] ? debug_check_no_locks_freed+0x310/0x310 [ 840.583178] ? __lock_acquire+0x7f5/0x5140 [ 840.587419] ? print_usage_bug+0xc0/0xc0 [ 840.591483] ? find_held_lock+0x36/0x1c0 [ 840.595559] ? lock_downgrade+0x8e0/0x8e0 [ 840.599714] ? mark_held_locks+0xc9/0x160 [ 840.603868] ? kasan_check_read+0x11/0x20 [ 840.608024] ? __local_bh_enable_ip+0x161/0x230 [ 840.612700] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 840.617809] ? trace_hardirqs_on+0xd/0x10 [ 840.622175] ? __local_bh_enable_ip+0x161/0x230 [ 840.626870] mac80211_hwsim_new_radio+0x235/0x33b0 [ 840.631803] ? graph_lock+0x170/0x170 [ 840.635631] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 840.641785] ? lock_release+0xa10/0xa10 [ 840.645763] ? check_same_owner+0x320/0x320 [ 840.650104] ? rcu_note_context_switch+0x710/0x710 [ 840.655038] ? __lock_acquire+0x7f5/0x5140 [ 840.659296] ? __might_sleep+0x95/0x190 [ 840.663428] ? kasan_check_write+0x14/0x20 [ 840.667672] ? __mutex_lock+0x7d9/0x17f0 [ 840.671738] ? genl_rcv_msg+0x13a/0x170 [ 840.675720] ? __lock_acquire+0x7f5/0x5140 [ 840.679961] ? mutex_trylock+0x2a0/0x2a0 [ 840.684023] ? graph_lock+0x170/0x170 [ 840.687836] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 840.693031] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 840.698065] ? validate_nla+0x2d9/0x7b0 [ 840.702051] hwsim_new_radio_nl+0x7b8/0xa60 [ 840.706408] ? nla_parse+0x358/0x4a0 [ 840.710129] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 840.715328] ? __netlink_ns_capable+0x100/0x130 [ 840.721177] genl_family_rcv_msg+0x889/0x1120 [ 840.725685] ? genl_rcv+0x40/0x40 [ 840.729145] ? lock_downgrade+0x8e0/0x8e0 [ 840.736294] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 840.741432] ? kasan_check_read+0x11/0x20 [ 840.745584] ? lock_acquire+0x1dc/0x520 [ 840.753926] ? genl_rcv+0x19/0x40 [ 840.757421] genl_rcv_msg+0xc6/0x170 [ 840.761138] netlink_rcv_skb+0x172/0x440 [ 840.765198] ? genl_family_rcv_msg+0x1120/0x1120 [ 840.770940] ? netlink_ack+0xbc0/0xbc0 [ 840.774891] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 840.780095] ? netlink_skb_destructor+0x210/0x210 [ 840.784943] genl_rcv+0x28/0x40 [ 840.788222] netlink_unicast+0x58b/0x740 [ 840.792291] ? netlink_attachskb+0x970/0x970 [ 840.796699] ? import_iovec+0x24b/0x420 [ 840.800678] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 840.805697] ? security_netlink_send+0x88/0xb0 [ 840.810282] netlink_sendmsg+0x9f0/0xfa0 [ 840.814352] ? netlink_unicast+0x740/0x740 [ 840.818593] ? security_socket_sendmsg+0x94/0xc0 [ 840.823609] ? netlink_unicast+0x740/0x740 [ 840.827872] sock_sendmsg+0xd5/0x120 [ 840.831594] ___sys_sendmsg+0x805/0x940 [ 840.835663] ? copy_msghdr_from_user+0x560/0x560 [ 840.840437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 840.845980] ? proc_fail_nth_write+0x96/0x1f0 [ 840.850487] ? __fget_light+0x2ef/0x430 [ 840.854471] ? fget_raw+0x20/0x20 [ 840.857936] ? find_held_lock+0x36/0x1c0 [ 840.862019] ? kasan_check_write+0x14/0x20 [ 840.866274] ? wait_for_completion+0x870/0x870 [ 840.870873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.876539] ? sockfd_lookup_light+0xc5/0x160 [ 840.881051] __sys_sendmsg+0x115/0x270 [ 840.884947] ? __ia32_sys_shutdown+0x80/0x80 [ 840.889363] ? __sb_end_write+0xac/0xe0 [ 840.893349] ? fput+0x130/0x1a0 [ 840.896632] ? ksys_write+0x1a6/0x250 [ 840.900455] __x64_sys_sendmsg+0x78/0xb0 [ 840.904528] do_syscall_64+0x1b1/0x800 [ 840.908421] ? finish_task_switch+0x1ca/0x840 [ 840.912923] ? syscall_return_slowpath+0x5c0/0x5c0 [ 840.917859] ? syscall_return_slowpath+0x30f/0x5c0 [ 840.922789] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 840.928141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 840.932970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.938141] RIP: 0033:0x455a09 [ 840.941322] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 840.949021] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 840.956297] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 840.963550] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 840.970812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 840.978072] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000a 08:45:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x600, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:41 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000000200"}, &(0x7f0000000140)=0x44) 08:45:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\n\x00'}, 0x2c) 08:45:41 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xcf00]}}, 0x1c) 08:45:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000002000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:41 executing program 0 (fault-call:3 fault-nth:11): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:41 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 841.075226] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 841.088393] IPVS: ftp: loaded support on port[0] = 21 [ 841.090651] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 841.114918] FAULT_INJECTION: forcing a failure. [ 841.114918] name failslab, interval 1, probability 0, space 0, times 0 [ 841.126298] CPU: 0 PID: 26511 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 841.133584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.142945] Call Trace: [ 841.145543] dump_stack+0x1b9/0x294 [ 841.149186] ? dump_stack_print_info.cold.2+0x52/0x52 [ 841.154392] ? ieee80211_roc_setup+0x3b7/0x510 [ 841.158985] ? ieee80211_mgmt_tx_cancel_wait+0x40/0x40 [ 841.164283] should_fail.cold.4+0xa/0x1a [ 841.168356] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.173471] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 841.178499] ? graph_lock+0x170/0x170 [ 841.182311] ? ieee80211_alloc_led_names+0x240/0x410 [ 841.187423] ? find_held_lock+0x36/0x1c0 [ 841.191498] ? __lock_is_held+0xb5/0x140 [ 841.195591] ? check_same_owner+0x320/0x320 [ 841.199922] ? graph_lock+0x170/0x170 [ 841.203735] ? rcu_note_context_switch+0x710/0x710 [ 841.208674] ? __lock_acquire+0x7f5/0x5140 [ 841.212927] __should_failslab+0x124/0x180 [ 841.217169] should_failslab+0x9/0x14 [ 841.220975] kmem_cache_alloc_trace+0x2cb/0x780 [ 841.225645] ? find_held_lock+0x36/0x1c0 [ 841.229724] device_create_groups_vargs+0xa7/0x270 [ 841.234668] device_create+0xd3/0x100 [ 841.238481] ? device_create_vargs+0x60/0x60 [ 841.242904] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 841.248019] ? trace_hardirqs_on+0xd/0x10 [ 841.252182] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 841.257122] ? graph_lock+0x170/0x170 [ 841.260943] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 841.267105] ? lock_release+0xa10/0xa10 [ 841.271092] ? check_same_owner+0x320/0x320 08:45:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8906, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:41 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:41 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\a\x00'}, 0x2c) 08:45:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xff000000]}}, 0x1c) [ 841.275427] ? rcu_note_context_switch+0x710/0x710 [ 841.280375] ? __lock_acquire+0x7f5/0x5140 [ 841.284622] ? __might_sleep+0x95/0x190 [ 841.288609] ? kasan_check_write+0x14/0x20 [ 841.292849] ? __mutex_lock+0x7d9/0x17f0 [ 841.296918] ? genl_rcv_msg+0x13a/0x170 [ 841.300897] ? __lock_acquire+0x7f5/0x5140 [ 841.305141] ? mutex_trylock+0x2a0/0x2a0 [ 841.309299] ? graph_lock+0x170/0x170 [ 841.310433] IPVS: ftp: loaded support on port[0] = 21 [ 841.313105] ? __sanitizer_cov_trace_switch+0x53/0x90 08:45:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x805, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 841.313124] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 841.313140] ? validate_nla+0x2d9/0x7b0 [ 841.313161] hwsim_new_radio_nl+0x7b8/0xa60 [ 841.313173] ? nla_parse+0x358/0x4a0 [ 841.313188] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 841.313208] ? __netlink_ns_capable+0x100/0x130 [ 841.313225] genl_family_rcv_msg+0x889/0x1120 [ 841.313243] ? genl_rcv+0x40/0x40 [ 841.358492] ? lock_downgrade+0x8e0/0x8e0 [ 841.362654] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 841.367683] ? kasan_check_read+0x11/0x20 [ 841.371842] ? lock_acquire+0x1dc/0x520 [ 841.375822] ? genl_rcv+0x19/0x40 [ 841.379300] genl_rcv_msg+0xc6/0x170 [ 841.383027] netlink_rcv_skb+0x172/0x440 [ 841.387095] ? genl_family_rcv_msg+0x1120/0x1120 [ 841.393767] ? netlink_ack+0xbc0/0xbc0 [ 841.397661] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 841.402860] ? netlink_skb_destructor+0x210/0x210 [ 841.407734] genl_rcv+0x28/0x40 [ 841.411022] netlink_unicast+0x58b/0x740 [ 841.415097] ? netlink_attachskb+0x970/0x970 [ 841.419537] ? import_iovec+0x24b/0x420 [ 841.423522] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 841.428544] ? security_netlink_send+0x88/0xb0 [ 841.433133] netlink_sendmsg+0x9f0/0xfa0 [ 841.437205] ? netlink_unicast+0x740/0x740 [ 841.441538] ? security_socket_sendmsg+0x94/0xc0 [ 841.446295] ? netlink_unicast+0x740/0x740 [ 841.450562] sock_sendmsg+0xd5/0x120 [ 841.454290] ___sys_sendmsg+0x805/0x940 [ 841.456914] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 841.458277] ? copy_msghdr_from_user+0x560/0x560 [ 841.458306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 841.458322] ? proc_fail_nth_write+0x96/0x1f0 [ 841.458340] ? __fget_light+0x2ef/0x430 [ 841.458357] ? fget_raw+0x20/0x20 [ 841.486783] ? find_held_lock+0x36/0x1c0 [ 841.490855] ? kasan_check_write+0x14/0x20 [ 841.495108] ? wait_for_completion+0x870/0x870 [ 841.499707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.505253] ? sockfd_lookup_light+0xc5/0x160 [ 841.509756] __sys_sendmsg+0x115/0x270 [ 841.513652] ? __ia32_sys_shutdown+0x80/0x80 [ 841.518070] ? __sb_end_write+0xac/0xe0 [ 841.522057] ? fput+0x130/0x1a0 [ 841.524149] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 841.525341] ? ksys_write+0x1a6/0x250 [ 841.525372] __x64_sys_sendmsg+0x78/0xb0 [ 841.543190] do_syscall_64+0x1b1/0x800 [ 841.547089] ? finish_task_switch+0x1ca/0x840 [ 841.551595] ? syscall_return_slowpath+0x5c0/0x5c0 [ 841.556532] ? syscall_return_slowpath+0x30f/0x5c0 [ 841.561561] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 841.566937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.571795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.577003] RIP: 0033:0x455a09 [ 841.580194] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 841.587912] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 841.595189] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 841.602485] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 841.609757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 841.617029] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000b 08:45:42 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x870, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000007fffffff0000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:42 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000010d00"}, 0x2c) 08:45:42 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572b80200"}, &(0x7f0000000140)=0x44) 08:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa000000]}}, 0x1c) 08:45:42 executing program 0 (fault-call:3 fault-nth:12): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 841.803996] IPVS: ftp: loaded support on port[0] = 21 [ 841.824929] FAULT_INJECTION: forcing a failure. [ 841.824929] name failslab, interval 1, probability 0, space 0, times 0 [ 841.836316] CPU: 1 PID: 26552 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 841.843596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.853051] Call Trace: [ 841.855646] dump_stack+0x1b9/0x294 [ 841.859287] ? dump_stack_print_info.cold.2+0x52/0x52 [ 841.864503] should_fail.cold.4+0xa/0x1a [ 841.868578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.873693] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 841.878722] ? __lockdep_init_map+0x105/0x590 [ 841.883259] ? graph_lock+0x170/0x170 [ 841.887075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.892616] ? put_dec_trunc8+0x273/0x300 [ 841.896769] ? find_held_lock+0x36/0x1c0 [ 841.900841] ? __lock_is_held+0xb5/0x140 [ 841.904921] ? check_same_owner+0x320/0x320 [ 841.909251] ? device_pm_sleep_init+0xe8/0x200 [ 841.913840] ? rcu_note_context_switch+0x710/0x710 [ 841.918783] __should_failslab+0x124/0x180 [ 841.923027] should_failslab+0x9/0x14 [ 841.926841] __kmalloc_track_caller+0x2c4/0x760 [ 841.931522] ? pointer+0xa10/0xa10 [ 841.935081] ? kvasprintf_const+0x67/0x190 [ 841.939335] kvasprintf+0xa9/0x130 [ 841.942887] ? bust_spinlocks+0xe0/0xe0 [ 841.944877] IPVS: ftp: loaded support on port[0] = 21 [ 841.946888] ? rcu_read_lock_sched_held+0x108/0x120 [ 841.946908] kvasprintf_const+0x67/0x190 [ 841.946928] kobject_set_name_vargs+0x5b/0x150 [ 841.946950] device_create_groups_vargs+0x1ce/0x270 [ 841.970769] device_create+0xd3/0x100 [ 841.974578] ? device_create_vargs+0x60/0x60 [ 841.978998] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 841.984104] ? trace_hardirqs_on+0xd/0x10 [ 841.988264] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 841.993199] ? graph_lock+0x170/0x170 [ 841.997014] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 841.997551] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 842.003174] ? lock_release+0xa10/0xa10 [ 842.003192] ? check_same_owner+0x320/0x320 [ 842.003208] ? rcu_note_context_switch+0x710/0x710 [ 842.003224] ? __lock_acquire+0x7f5/0x5140 [ 842.015303] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 842.017112] ? __might_sleep+0x95/0x190 [ 842.017133] ? kasan_check_write+0x14/0x20 [ 842.017150] ? __mutex_lock+0x7d9/0x17f0 [ 842.017167] ? genl_rcv_msg+0x13a/0x170 [ 842.052482] ? __lock_acquire+0x7f5/0x5140 [ 842.056731] ? mutex_trylock+0x2a0/0x2a0 [ 842.060799] ? graph_lock+0x170/0x170 [ 842.064635] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 842.069839] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.074867] ? validate_nla+0x2d9/0x7b0 [ 842.078854] hwsim_new_radio_nl+0x7b8/0xa60 [ 842.083183] ? nla_parse+0x358/0x4a0 [ 842.086905] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 842.092108] ? __netlink_ns_capable+0x100/0x130 [ 842.096795] genl_family_rcv_msg+0x889/0x1120 [ 842.101324] ? genl_rcv+0x40/0x40 [ 842.104785] ? lock_downgrade+0x8e0/0x8e0 [ 842.108942] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.113978] ? kasan_check_read+0x11/0x20 [ 842.118137] ? lock_acquire+0x1dc/0x520 [ 842.122113] ? genl_rcv+0x19/0x40 [ 842.125582] genl_rcv_msg+0xc6/0x170 [ 842.129304] netlink_rcv_skb+0x172/0x440 [ 842.133373] ? genl_family_rcv_msg+0x1120/0x1120 [ 842.138134] ? netlink_ack+0xbc0/0xbc0 [ 842.142031] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 842.147254] ? netlink_skb_destructor+0x210/0x210 [ 842.152111] genl_rcv+0x28/0x40 [ 842.155402] netlink_unicast+0x58b/0x740 [ 842.159475] ? netlink_attachskb+0x970/0x970 [ 842.163889] ? import_iovec+0x24b/0x420 [ 842.167873] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.168907] IPVS: ftp: loaded support on port[0] = 21 [ 842.173237] ? security_netlink_send+0x88/0xb0 [ 842.173257] netlink_sendmsg+0x9f0/0xfa0 [ 842.173278] ? netlink_unicast+0x740/0x740 [ 842.173295] ? security_socket_sendmsg+0x94/0xc0 [ 842.173308] ? netlink_unicast+0x740/0x740 [ 842.173324] sock_sendmsg+0xd5/0x120 [ 842.173342] ___sys_sendmsg+0x805/0x940 [ 842.208005] ? copy_msghdr_from_user+0x560/0x560 [ 842.212786] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 842.218335] ? proc_fail_nth_write+0x96/0x1f0 [ 842.222839] ? __fget_light+0x2ef/0x430 [ 842.226822] ? fget_raw+0x20/0x20 [ 842.230283] ? find_held_lock+0x36/0x1c0 [ 842.234356] ? kasan_check_write+0x14/0x20 [ 842.238607] ? wait_for_completion+0x870/0x870 [ 842.243208] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 842.248751] ? sockfd_lookup_light+0xc5/0x160 [ 842.253259] __sys_sendmsg+0x115/0x270 [ 842.257175] ? __ia32_sys_shutdown+0x80/0x80 [ 842.261591] ? __sb_end_write+0xac/0xe0 [ 842.265577] ? fput+0x130/0x1a0 [ 842.268866] ? ksys_write+0x1a6/0x250 [ 842.272692] __x64_sys_sendmsg+0x78/0xb0 [ 842.276768] do_syscall_64+0x1b1/0x800 [ 842.280669] ? finish_task_switch+0x1ca/0x840 [ 842.285176] ? syscall_return_slowpath+0x5c0/0x5c0 [ 842.290136] ? syscall_return_slowpath+0x30f/0x5c0 [ 842.295082] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 842.300469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.305329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.309663] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 842.310517] RIP: 0033:0x455a09 08:45:42 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000000500"}, 0x2c) 08:45:42 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572d80300"}, &(0x7f0000000140)=0x44) 08:45:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x80b, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:42 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x50000]}}, 0x1c) 08:45:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 842.310526] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 842.331374] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 842.338651] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 842.345928] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 842.353209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 842.360577] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000c [ 842.392388] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 842.484535] IPVS: ftp: loaded support on port[0] = 21 08:45:42 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:42 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000040000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:42 executing program 0 (fault-call:3 fault-nth:13): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x804, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5000]}}, 0x1c) 08:45:42 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000600"}, 0x2c) 08:45:42 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000018800"}, &(0x7f0000000140)=0x44) [ 842.608574] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 842.612083] FAULT_INJECTION: forcing a failure. [ 842.612083] name failslab, interval 1, probability 0, space 0, times 0 [ 842.619491] IPVS: ftp: loaded support on port[0] = 21 [ 842.625616] CPU: 0 PID: 26619 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 842.625625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.625630] Call Trace: [ 842.625651] dump_stack+0x1b9/0x294 [ 842.625670] ? dump_stack_print_info.cold.2+0x52/0x52 [ 842.625689] ? is_bpf_text_address+0xd7/0x170 [ 842.663415] ? kernel_text_address+0x79/0xf0 [ 842.667839] should_fail.cold.4+0xa/0x1a [ 842.671918] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 842.677040] ? graph_lock+0x170/0x170 [ 842.680848] ? save_stack+0xa9/0xd0 [ 842.684486] ? save_stack+0x43/0xd0 [ 842.688119] ? kasan_kmalloc+0xc4/0xe0 [ 842.692137] ? find_held_lock+0x36/0x1c0 [ 842.696298] ? __lock_is_held+0xb5/0x140 [ 842.700379] ? check_same_owner+0x320/0x320 [ 842.704704] ? put_dec+0xf0/0xf0 08:45:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000300"}, 0x2c) 08:45:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 842.708083] ? rcu_note_context_switch+0x710/0x710 [ 842.713028] __should_failslab+0x124/0x180 [ 842.721344] should_failslab+0x9/0x14 [ 842.725160] kmem_cache_alloc_trace+0x2cb/0x780 [ 842.729839] ? refcount_add_not_zero+0x320/0x320 [ 842.740192] device_private_init+0x98/0x230 [ 842.746164] ? virtual_device_parent+0x60/0x60 [ 842.750784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 08:45:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8035, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 842.756368] ? refcount_inc+0x29/0x70 [ 842.760174] device_add+0xe98/0x16d0 [ 842.763922] ? device_private_init+0x230/0x230 [ 842.768523] ? kfree+0x1e9/0x260 [ 842.771907] ? kfree_const+0x5e/0x70 [ 842.775637] device_create_groups_vargs+0x1ff/0x270 [ 842.780694] device_create+0xd3/0x100 [ 842.784504] ? device_create_vargs+0x60/0x60 [ 842.788924] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 842.794032] ? trace_hardirqs_on+0xd/0x10 [ 842.798196] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 842.803165] ? graph_lock+0x170/0x170 08:45:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 842.806987] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 842.813140] ? lock_release+0xa10/0xa10 [ 842.817126] ? check_same_owner+0x320/0x320 [ 842.821458] ? rcu_note_context_switch+0x710/0x710 [ 842.826400] ? __lock_acquire+0x7f5/0x5140 [ 842.827970] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 842.830642] ? __might_sleep+0x95/0x190 [ 842.830665] ? kasan_check_write+0x14/0x20 [ 842.830683] ? __mutex_lock+0x7d9/0x17f0 [ 842.830700] ? genl_rcv_msg+0x13a/0x170 [ 842.830717] ? __lock_acquire+0x7f5/0x5140 [ 842.830732] ? mutex_trylock+0x2a0/0x2a0 [ 842.830748] ? graph_lock+0x170/0x170 [ 842.864855] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 842.870099] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.875127] ? validate_nla+0x2d9/0x7b0 [ 842.879110] hwsim_new_radio_nl+0x7b8/0xa60 [ 842.883438] ? nla_parse+0x358/0x4a0 [ 842.887159] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 842.892360] ? __netlink_ns_capable+0x100/0x130 [ 842.897040] genl_family_rcv_msg+0x889/0x1120 [ 842.901544] ? genl_rcv+0x40/0x40 [ 842.904999] ? lock_downgrade+0x8e0/0x8e0 08:45:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000300"}, 0x2c) 08:45:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x8847, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 842.909153] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.914182] ? kasan_check_read+0x11/0x20 [ 842.918353] ? lock_acquire+0x1dc/0x520 [ 842.922331] ? genl_rcv+0x19/0x40 [ 842.925806] genl_rcv_msg+0xc6/0x170 [ 842.929524] netlink_rcv_skb+0x172/0x440 [ 842.933591] ? genl_family_rcv_msg+0x1120/0x1120 [ 842.938353] ? netlink_ack+0xbc0/0xbc0 [ 842.942251] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 842.947452] ? netlink_skb_destructor+0x210/0x210 [ 842.952303] genl_rcv+0x28/0x40 [ 842.955585] netlink_unicast+0x58b/0x740 08:45:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 842.959652] ? netlink_attachskb+0x970/0x970 [ 842.964064] ? import_iovec+0x24b/0x420 [ 842.965502] IPVS: ftp: loaded support on port[0] = 21 [ 842.968041] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 842.968057] ? security_netlink_send+0x88/0xb0 [ 842.968075] netlink_sendmsg+0x9f0/0xfa0 [ 842.968095] ? netlink_unicast+0x740/0x740 [ 842.968111] ? security_socket_sendmsg+0x94/0xc0 [ 842.968127] ? netlink_unicast+0x740/0x740 [ 843.000125] sock_sendmsg+0xd5/0x120 [ 843.003848] ___sys_sendmsg+0x805/0x940 08:45:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) [ 843.007840] ? copy_msghdr_from_user+0x560/0x560 [ 843.012211] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 843.018431] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 843.018448] ? proc_fail_nth_write+0x96/0x1f0 [ 843.018465] ? __fget_light+0x2ef/0x430 [ 843.018479] ? fget_raw+0x20/0x20 [ 843.018492] ? find_held_lock+0x36/0x1c0 [ 843.018513] ? kasan_check_write+0x14/0x20 [ 843.018535] ? wait_for_completion+0x870/0x870 [ 843.054415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.059960] ? sockfd_lookup_light+0xc5/0x160 08:45:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x500, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 843.064466] __sys_sendmsg+0x115/0x270 [ 843.068361] ? __ia32_sys_shutdown+0x80/0x80 [ 843.072775] ? __sb_end_write+0xac/0xe0 [ 843.076758] ? fput+0x130/0x1a0 [ 843.080044] ? ksys_write+0x1a6/0x250 [ 843.083870] __x64_sys_sendmsg+0x78/0xb0 [ 843.088105] do_syscall_64+0x1b1/0x800 [ 843.092009] ? finish_task_switch+0x1ca/0x840 [ 843.096520] ? syscall_return_slowpath+0x5c0/0x5c0 [ 843.101453] ? syscall_return_slowpath+0x30f/0x5c0 [ 843.106477] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 843.111858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 843.116799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.121987] RIP: 0033:0x455a09 [ 843.125176] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.132890] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 843.140162] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 843.147437] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 843.154708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 08:45:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000020000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 843.161978] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000d [ 843.178286] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100008400"}, 0x2c) 08:45:43 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b0000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000010000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x803, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:43 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657201f600"}, &(0x7f0000000140)=0x44) 08:45:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd000000000000000]}}, 0x1c) 08:45:43 executing program 0 (fault-call:3 fault-nth:14): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 843.408769] FAULT_INJECTION: forcing a failure. [ 843.408769] name failslab, interval 1, probability 0, space 0, times 0 [ 843.420101] CPU: 0 PID: 26674 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 843.426447] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 843.427374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.427380] Call Trace: [ 843.427403] dump_stack+0x1b9/0x294 [ 843.427423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 843.427441] ? is_bpf_text_address+0xd7/0x170 08:45:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:43 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00h\x00'}, 0x2c) [ 843.427461] ? kernel_text_address+0x79/0xf0 [ 843.462661] should_fail.cold.4+0xa/0x1a [ 843.466738] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.471854] ? graph_lock+0x170/0x170 [ 843.475658] ? save_stack+0xa9/0xd0 [ 843.479291] ? save_stack+0x43/0xd0 [ 843.482925] ? kasan_kmalloc+0xc4/0xe0 [ 843.486847] ? find_held_lock+0x36/0x1c0 [ 843.490918] ? __lock_is_held+0xb5/0x140 [ 843.494991] ? check_same_owner+0x320/0x320 [ 843.499318] ? put_dec+0xf0/0xf0 [ 843.502694] ? rcu_note_context_switch+0x710/0x710 [ 843.507634] __should_failslab+0x124/0x180 [ 843.511879] should_failslab+0x9/0x14 [ 843.515694] kmem_cache_alloc_trace+0x2cb/0x780 [ 843.520369] ? refcount_add_not_zero+0x320/0x320 [ 843.525137] device_private_init+0x98/0x230 [ 843.529466] ? virtual_device_parent+0x60/0x60 [ 843.534059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 843.539600] ? refcount_inc+0x29/0x70 [ 843.543409] device_add+0xe98/0x16d0 [ 843.546007] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 843.547128] ? device_private_init+0x230/0x230 08:45:43 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 843.547144] ? kfree+0x1e9/0x260 [ 843.547164] ? kfree_const+0x5e/0x70 [ 843.547181] device_create_groups_vargs+0x1ff/0x270 [ 843.547199] device_create+0xd3/0x100 [ 843.561145] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 843.564436] ? device_create_vargs+0x60/0x60 [ 843.564459] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 843.564475] ? trace_hardirqs_on+0xd/0x10 [ 843.564494] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 843.564508] ? graph_lock+0x170/0x170 08:45:44 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00c\x00'}, 0x2c) [ 843.564531] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 843.564547] ? lock_release+0xa10/0xa10 [ 843.601911] IPVS: ftp: loaded support on port[0] = 21 [ 843.605614] ? check_same_owner+0x320/0x320 [ 843.605636] ? rcu_note_context_switch+0x710/0x710 [ 843.605652] ? __lock_acquire+0x7f5/0x5140 [ 843.605670] ? __might_sleep+0x95/0x190 [ 843.605689] ? kasan_check_write+0x14/0x20 [ 843.605704] ? __mutex_lock+0x7d9/0x17f0 [ 843.605721] ? genl_rcv_msg+0x13a/0x170 [ 843.650610] ? __lock_acquire+0x7f5/0x5140 [ 843.654857] ? mutex_trylock+0x2a0/0x2a0 [ 843.658921] ? graph_lock+0x170/0x170 [ 843.662729] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 843.667926] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 843.672946] ? validate_nla+0x2d9/0x7b0 [ 843.676924] hwsim_new_radio_nl+0x7b8/0xa60 [ 843.681249] ? nla_parse+0x358/0x4a0 [ 843.684972] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 843.690176] ? __netlink_ns_capable+0x100/0x130 [ 843.694852] genl_family_rcv_msg+0x889/0x1120 [ 843.699354] ? genl_rcv+0x40/0x40 [ 843.702817] ? lock_downgrade+0x8e0/0x8e0 08:45:44 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 843.707107] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 843.712130] ? kasan_check_read+0x11/0x20 [ 843.721188] ? lock_acquire+0x1dc/0x520 [ 843.725172] ? genl_rcv+0x19/0x40 [ 843.728641] genl_rcv_msg+0xc6/0x170 [ 843.732359] netlink_rcv_skb+0x172/0x440 [ 843.737496] ? genl_family_rcv_msg+0x1120/0x1120 [ 843.742259] ? netlink_ack+0xbc0/0xbc0 [ 843.746152] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 843.751351] ? netlink_skb_destructor+0x210/0x210 [ 843.756216] genl_rcv+0x28/0x40 [ 843.759498] netlink_unicast+0x58b/0x740 [ 843.763564] ? netlink_attachskb+0x970/0x970 [ 843.767978] ? import_iovec+0x24b/0x420 [ 843.771960] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 843.776978] ? security_netlink_send+0x88/0xb0 [ 843.781575] netlink_sendmsg+0x9f0/0xfa0 [ 843.785646] ? netlink_unicast+0x740/0x740 [ 843.789883] ? security_socket_sendmsg+0x94/0xc0 [ 843.794638] ? netlink_unicast+0x740/0x740 [ 843.798876] sock_sendmsg+0xd5/0x120 [ 843.802597] ___sys_sendmsg+0x805/0x940 [ 843.806578] ? copy_msghdr_from_user+0x560/0x560 [ 843.811348] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 843.816886] ? proc_fail_nth_write+0x96/0x1f0 [ 843.821386] ? __fget_light+0x2ef/0x430 [ 843.825361] ? fget_raw+0x20/0x20 [ 843.828825] ? find_held_lock+0x36/0x1c0 [ 843.832900] ? kasan_check_write+0x14/0x20 [ 843.837146] ? wait_for_completion+0x870/0x870 [ 843.841743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.847757] ? sockfd_lookup_light+0xc5/0x160 [ 843.852261] __sys_sendmsg+0x115/0x270 [ 843.856154] ? __ia32_sys_shutdown+0x80/0x80 [ 843.860567] ? __sb_end_write+0xac/0xe0 [ 843.864545] ? fput+0x130/0x1a0 [ 843.867825] ? ksys_write+0x1a6/0x250 [ 843.871634] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 843.876485] __x64_sys_sendmsg+0x78/0xb0 [ 843.880555] do_syscall_64+0x1b1/0x800 [ 843.884446] ? finish_task_switch+0x1ca/0x840 [ 843.888943] ? syscall_return_slowpath+0x5c0/0x5c0 [ 843.893879] ? syscall_return_slowpath+0x30f/0x5c0 [ 843.898824] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 843.904194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 843.909044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.914235] RIP: 0033:0x455a09 [ 843.914465] IPVS: ftp: loaded support on port[0] = 21 [ 843.917414] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.917432] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 843.917441] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 843.917450] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 843.917458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 843.917467] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000e [ 843.991361] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:44 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x82c, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x50000000]}}, 0x1c) 08:45:44 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000004000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:44 executing program 0 (fault-call:3 fault-nth:15): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:44 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200840100"}, &(0x7f0000000140)=0x44) 08:45:44 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000400"}, 0x2c) [ 844.116594] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 844.124279] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 844.128616] FAULT_INJECTION: forcing a failure. [ 844.128616] name failslab, interval 1, probability 0, space 0, times 0 [ 844.145788] CPU: 0 PID: 26726 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 844.153064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.162419] Call Trace: [ 844.165017] dump_stack+0x1b9/0x294 [ 844.168659] ? dump_stack_print_info.cold.2+0x52/0x52 [ 844.173864] should_fail.cold.4+0xa/0x1a [ 844.177941] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 844.183060] ? graph_lock+0x170/0x170 [ 844.186879] ? find_held_lock+0x36/0x1c0 [ 844.190955] ? __lock_is_held+0xb5/0x140 [ 844.195040] ? check_same_owner+0x320/0x320 [ 844.199375] ? rcu_note_context_switch+0x710/0x710 [ 844.204313] ? check_same_owner+0x320/0x320 [ 844.208647] __should_failslab+0x124/0x180 [ 844.212888] should_failslab+0x9/0x14 [ 844.216703] __kmalloc_track_caller+0x2c4/0x760 [ 844.221388] ? debug_check_no_locks_freed+0x310/0x310 [ 844.226594] ? kasan_check_write+0x14/0x20 [ 844.230841] ? __mutex_lock+0x7d9/0x17f0 [ 844.234916] ? kstrdup_const+0x66/0x80 [ 844.238819] kstrdup+0x39/0x70 [ 844.242022] kstrdup_const+0x66/0x80 [ 844.245739] __kernfs_new_node+0xa8/0x580 [ 844.250070] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 844.254839] ? lock_downgrade+0x8e0/0x8e0 [ 844.258996] kernfs_new_node+0x80/0xf0 [ 844.262884] kernfs_create_dir_ns+0x3d/0x140 [ 844.267291] sysfs_create_dir_ns+0xbe/0x1d0 [ 844.271622] kobject_add_internal+0x354/0xac0 [ 844.276137] ? kobj_ns_type_registered+0x60/0x60 [ 844.280901] ? lock_downgrade+0x8e0/0x8e0 [ 844.285056] ? refcount_add_not_zero+0x320/0x320 [ 844.289819] ? kasan_check_read+0x11/0x20 [ 844.293975] kobject_add+0x13a/0x190 [ 844.297694] ? kset_create_and_add+0x190/0x190 [ 844.302295] ? mutex_unlock+0xd/0x10 [ 844.306020] device_add+0x3a5/0x16d0 [ 844.309744] ? device_private_init+0x230/0x230 [ 844.314336] ? kfree+0x1e9/0x260 08:45:44 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:44 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 844.317705] ? kfree_const+0x5e/0x70 [ 844.321423] device_create_groups_vargs+0x1ff/0x270 [ 844.326444] device_create+0xd3/0x100 [ 844.330246] ? device_create_vargs+0x60/0x60 [ 844.334667] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 844.339786] ? trace_hardirqs_on+0xd/0x10 [ 844.343946] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 844.348881] ? graph_lock+0x170/0x170 [ 844.352696] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 844.358855] ? lock_release+0xa10/0xa10 [ 844.362840] ? check_same_owner+0x320/0x320 [ 844.367172] ? rcu_note_context_switch+0x710/0x710 [ 844.372106] ? __lock_acquire+0x7f5/0x5140 [ 844.376348] ? __might_sleep+0x95/0x190 [ 844.380474] ? kasan_check_write+0x14/0x20 [ 844.384713] ? __mutex_lock+0x7d9/0x17f0 [ 844.388783] ? genl_rcv_msg+0x13a/0x170 [ 844.392767] ? __lock_acquire+0x7f5/0x5140 [ 844.397008] ? mutex_trylock+0x2a0/0x2a0 [ 844.401076] ? graph_lock+0x170/0x170 [ 844.404882] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 844.410079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:45:44 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc000000]}}, 0x1c) [ 844.415098] ? validate_nla+0x2d9/0x7b0 [ 844.419078] hwsim_new_radio_nl+0x7b8/0xa60 [ 844.423401] ? nla_parse+0x358/0x4a0 [ 844.427121] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 844.432323] ? __netlink_ns_capable+0x100/0x130 [ 844.437003] genl_family_rcv_msg+0x889/0x1120 [ 844.441507] ? genl_rcv+0x40/0x40 [ 844.444964] ? lock_downgrade+0x8e0/0x8e0 [ 844.449114] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 844.454142] ? kasan_check_read+0x11/0x20 [ 844.458297] ? lock_acquire+0x1dc/0x520 [ 844.462271] ? genl_rcv+0x19/0x40 08:45:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x4, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:44 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 844.464689] IPVS: ftp: loaded support on port[0] = 21 [ 844.465762] genl_rcv_msg+0xc6/0x170 [ 844.465780] netlink_rcv_skb+0x172/0x440 [ 844.478706] ? genl_family_rcv_msg+0x1120/0x1120 [ 844.483471] ? netlink_ack+0xbc0/0xbc0 [ 844.487365] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 844.492562] ? netlink_skb_destructor+0x210/0x210 [ 844.497416] genl_rcv+0x28/0x40 [ 844.500701] netlink_unicast+0x58b/0x740 [ 844.504830] ? netlink_attachskb+0x970/0x970 [ 844.509245] ? import_iovec+0x24b/0x420 [ 844.513225] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 844.518244] ? security_netlink_send+0x88/0xb0 [ 844.522834] netlink_sendmsg+0x9f0/0xfa0 [ 844.526909] ? netlink_unicast+0x740/0x740 [ 844.531151] ? security_socket_sendmsg+0x94/0xc0 [ 844.535912] ? netlink_unicast+0x740/0x740 [ 844.540149] sock_sendmsg+0xd5/0x120 [ 844.543868] ___sys_sendmsg+0x805/0x940 [ 844.547854] ? copy_msghdr_from_user+0x560/0x560 [ 844.552623] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 844.558162] ? proc_fail_nth_write+0x96/0x1f0 [ 844.562663] ? __fget_light+0x2ef/0x430 [ 844.566638] ? fget_raw+0x20/0x20 [ 844.570090] ? find_held_lock+0x36/0x1c0 [ 844.574158] ? kasan_check_write+0x14/0x20 [ 844.578403] ? wait_for_completion+0x870/0x870 [ 844.582998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.588536] ? sockfd_lookup_light+0xc5/0x160 [ 844.593039] __sys_sendmsg+0x115/0x270 [ 844.596932] ? __ia32_sys_shutdown+0x80/0x80 [ 844.601344] ? __sb_end_write+0xac/0xe0 [ 844.605324] ? fput+0x130/0x1a0 [ 844.608605] ? ksys_write+0x1a6/0x250 [ 844.612423] __x64_sys_sendmsg+0x78/0xb0 [ 844.616492] do_syscall_64+0x1b1/0x800 [ 844.620381] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 844.625228] ? syscall_return_slowpath+0x5c0/0x5c0 [ 844.630159] ? syscall_return_slowpath+0x30f/0x5c0 [ 844.635095] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 844.640463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.645308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.650489] RIP: 0033:0x455a09 [ 844.653674] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 844.661386] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 08:45:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00`\x00'}, 0x2c) [ 844.668663] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 844.675941] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 844.683215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 844.690490] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000000f [ 844.698271] kobject_add_internal failed for hwsim54 (error: -12 parent: mac80211_hwsim) 08:45:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000000000000000ffffffff000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 844.714188] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 844.754847] IPVS: ftp: loaded support on port[0] = 21 [ 844.769245] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:45 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:45 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000100000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:45 executing program 0 (fault-call:3 fault-nth:16): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71008f0400"}, 0x2c) 08:45:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x3]}}, 0x1c) 08:45:45 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00\x00z\x00'}, &(0x7f0000000140)=0x44) [ 844.998961] FAULT_INJECTION: forcing a failure. [ 844.998961] name failslab, interval 1, probability 0, space 0, times 0 [ 845.010289] CPU: 0 PID: 26785 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 845.017569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.026922] Call Trace: [ 845.029521] dump_stack+0x1b9/0x294 [ 845.033167] ? dump_stack_print_info.cold.2+0x52/0x52 [ 845.038370] ? __lock_acquire+0x7f5/0x5140 [ 845.042626] should_fail.cold.4+0xa/0x1a 08:45:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x2, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:45 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 845.046704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 845.051821] ? graph_lock+0x170/0x170 [ 845.055633] ? kasan_check_write+0x14/0x20 [ 845.059878] ? find_held_lock+0x36/0x1c0 [ 845.063950] ? __lock_is_held+0xb5/0x140 [ 845.068028] ? check_same_owner+0x320/0x320 [ 845.072362] ? rcu_note_context_switch+0x710/0x710 [ 845.077304] __should_failslab+0x124/0x180 [ 845.081543] should_failslab+0x9/0x14 [ 845.085353] kmem_cache_alloc+0x2af/0x760 [ 845.089515] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 845.095060] ? graph_lock+0x170/0x170 [ 845.098871] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 845.103894] __kernfs_new_node+0xe7/0x580 [ 845.106323] IPVS: ftp: loaded support on port[0] = 21 [ 845.108050] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 845.108069] ? find_held_lock+0x36/0x1c0 [ 845.108096] ? lock_downgrade+0x8e0/0x8e0 [ 845.108117] kernfs_new_node+0x80/0xf0 [ 845.108141] __kernfs_create_file+0x4d/0x330 [ 845.134640] sysfs_add_file_mode_ns+0x21a/0x560 [ 845.139320] sysfs_create_file_ns+0x8b/0xb0 [ 845.143648] device_create_file+0xf4/0x1e0 [ 845.147898] ? acpi_bind_one+0x8f0/0x8f0 [ 845.151969] device_add+0x3ec/0x16d0 [ 845.155701] ? device_private_init+0x230/0x230 [ 845.160288] ? kfree+0x1e9/0x260 [ 845.163665] ? kfree_const+0x5e/0x70 [ 845.167399] device_create_groups_vargs+0x1ff/0x270 [ 845.172422] device_create+0xd3/0x100 [ 845.176226] ? device_create_vargs+0x60/0x60 [ 845.180643] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 845.185751] ? trace_hardirqs_on+0xd/0x10 [ 845.189908] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 845.194842] ? graph_lock+0x170/0x170 08:45:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x3, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:45 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 845.198652] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 845.204813] ? lock_release+0xa10/0xa10 [ 845.208818] ? check_same_owner+0x320/0x320 [ 845.213145] ? rcu_note_context_switch+0x710/0x710 [ 845.218076] ? __lock_acquire+0x7f5/0x5140 [ 845.222318] ? __might_sleep+0x95/0x190 [ 845.226300] ? kasan_check_write+0x14/0x20 [ 845.230542] ? __mutex_lock+0x7d9/0x17f0 [ 845.234609] ? genl_rcv_msg+0x13a/0x170 [ 845.238589] ? __lock_acquire+0x7f5/0x5140 [ 845.242829] ? mutex_trylock+0x2a0/0x2a0 [ 845.246896] ? graph_lock+0x170/0x170 [ 845.250707] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 845.255901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 845.260921] ? validate_nla+0x2d9/0x7b0 [ 845.264906] hwsim_new_radio_nl+0x7b8/0xa60 [ 845.269227] ? nla_parse+0x358/0x4a0 [ 845.272950] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 845.278145] ? __netlink_ns_capable+0x100/0x130 [ 845.282823] genl_family_rcv_msg+0x889/0x1120 [ 845.287328] ? genl_rcv+0x40/0x40 [ 845.290789] ? lock_downgrade+0x8e0/0x8e0 [ 845.294945] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 845.299967] ? kasan_check_read+0x11/0x20 [ 845.304118] ? lock_acquire+0x1dc/0x520 [ 845.308094] ? genl_rcv+0x19/0x40 [ 845.311565] genl_rcv_msg+0xc6/0x170 [ 845.315286] netlink_rcv_skb+0x172/0x440 [ 845.319351] ? genl_family_rcv_msg+0x1120/0x1120 [ 845.321397] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 845.324104] ? netlink_ack+0xbc0/0xbc0 [ 845.324122] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 845.324142] ? netlink_skb_destructor+0x210/0x210 [ 845.324163] genl_rcv+0x28/0x40 08:45:45 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 845.346965] netlink_unicast+0x58b/0x740 [ 845.351294] ? netlink_attachskb+0x970/0x970 [ 845.355709] ? import_iovec+0x24b/0x420 [ 845.359699] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 845.364732] ? security_netlink_send+0x88/0xb0 [ 845.369325] netlink_sendmsg+0x9f0/0xfa0 [ 845.373406] ? netlink_unicast+0x740/0x740 [ 845.377650] ? security_socket_sendmsg+0x94/0xc0 [ 845.382409] ? netlink_unicast+0x740/0x740 [ 845.386647] sock_sendmsg+0xd5/0x120 [ 845.390372] ___sys_sendmsg+0x805/0x940 [ 845.394511] ? copy_msghdr_from_user+0x560/0x560 [ 845.399279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.404816] ? proc_fail_nth_write+0x96/0x1f0 [ 845.409315] ? __fget_light+0x2ef/0x430 [ 845.413298] ? fget_raw+0x20/0x20 [ 845.416763] ? find_held_lock+0x36/0x1c0 [ 845.420835] ? kasan_check_write+0x14/0x20 [ 845.425080] ? wait_for_completion+0x870/0x870 [ 845.429682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.435220] ? sockfd_lookup_light+0xc5/0x160 [ 845.439721] __sys_sendmsg+0x115/0x270 [ 845.443613] ? __ia32_sys_shutdown+0x80/0x80 08:45:45 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000200"}, 0x2c) 08:45:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x2000000000000]}}, 0x1c) [ 845.448021] ? __sb_end_write+0xac/0xe0 [ 845.452001] ? fput+0x130/0x1a0 [ 845.455280] ? ksys_write+0x1a6/0x250 [ 845.459094] __x64_sys_sendmsg+0x78/0xb0 [ 845.463159] do_syscall_64+0x1b1/0x800 [ 845.467050] ? finish_task_switch+0x1ca/0x840 [ 845.471808] ? syscall_return_slowpath+0x5c0/0x5c0 [ 845.476747] ? syscall_return_slowpath+0x30f/0x5c0 [ 845.481693] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 845.487067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.491919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.497106] RIP: 0033:0x455a09 08:45:45 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000100000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 845.500291] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 845.501317] IPVS: ftp: loaded support on port[0] = 21 [ 845.507994] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 845.508003] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 845.508011] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 845.508019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 845.508028] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000010 [ 845.606068] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 845.644391] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:46 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:46 executing program 0 (fault-call:3 fault-nth:17): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000001000000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:46 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71008400"}, 0x2c) 08:45:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfe800000]}}, 0x1c) 08:45:46 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000003d800"}, &(0x7f0000000140)=0x44) 08:45:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x8, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 845.921597] FAULT_INJECTION: forcing a failure. [ 845.921597] name failslab, interval 1, probability 0, space 0, times 0 [ 845.925889] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 845.932917] CPU: 0 PID: 26856 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 845.932931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.955284] Call Trace: [ 845.958035] dump_stack+0x1b9/0x294 [ 845.961700] ? dump_stack_print_info.cold.2+0x52/0x52 [ 845.966914] ? __lock_acquire+0x7f5/0x5140 08:45:46 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 845.971168] should_fail.cold.4+0xa/0x1a [ 845.975241] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 845.976258] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 845.980354] ? graph_lock+0x170/0x170 [ 845.980376] ? kasan_check_write+0x14/0x20 [ 845.998346] ? find_held_lock+0x36/0x1c0 [ 846.002414] ? __lock_is_held+0xb5/0x140 [ 846.006490] ? check_same_owner+0x320/0x320 [ 846.010821] ? rcu_note_context_switch+0x710/0x710 [ 846.015762] __should_failslab+0x124/0x180 08:45:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000400"}, 0x2c) [ 846.020001] should_failslab+0x9/0x14 [ 846.023808] kmem_cache_alloc+0x2af/0x760 [ 846.027963] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 846.033503] ? graph_lock+0x170/0x170 [ 846.037311] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 846.042337] __kernfs_new_node+0xe7/0x580 [ 846.046494] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 846.051257] ? find_held_lock+0x36/0x1c0 [ 846.055426] ? lock_downgrade+0x8e0/0x8e0 [ 846.059584] kernfs_new_node+0x80/0xf0 [ 846.063510] __kernfs_create_file+0x4d/0x330 08:45:46 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 846.067933] sysfs_add_file_mode_ns+0x21a/0x560 [ 846.072616] sysfs_create_file_ns+0x8b/0xb0 [ 846.076945] device_create_file+0xf4/0x1e0 [ 846.081185] ? acpi_bind_one+0x8f0/0x8f0 [ 846.085269] device_add+0x3ec/0x16d0 [ 846.089018] ? device_private_init+0x230/0x230 [ 846.093619] ? kfree+0x1e9/0x260 [ 846.095889] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 846.096988] ? kfree_const+0x5e/0x70 [ 846.097010] device_create_groups_vargs+0x1ff/0x270 [ 846.097030] device_create+0xd3/0x100 [ 846.097047] ? device_create_vargs+0x60/0x60 08:45:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000001100"}, 0x2c) [ 846.097070] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 846.097084] ? trace_hardirqs_on+0xd/0x10 [ 846.097106] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 846.133905] ? update_load_avg+0x2570/0x2570 [ 846.138334] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 846.144493] ? lock_release+0xa10/0xa10 [ 846.148472] ? check_same_owner+0x320/0x320 [ 846.152801] ? rcu_note_context_switch+0x710/0x710 [ 846.157742] ? __lock_acquire+0x7f5/0x5140 [ 846.161986] ? __might_sleep+0x95/0x190 [ 846.165981] ? kasan_check_write+0x14/0x20 [ 846.170233] ? __mutex_lock+0x7d9/0x17f0 [ 846.174301] ? genl_rcv_msg+0x13a/0x170 [ 846.178284] ? mutex_trylock+0x2a0/0x2a0 [ 846.182347] ? do_raw_spin_unlock+0x9e/0x2e0 [ 846.186765] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 846.191366] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 846.196567] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.201692] ? validate_nla+0x2d9/0x7b0 [ 846.205676] hwsim_new_radio_nl+0x7b8/0xa60 [ 846.210020] ? nla_parse+0x358/0x4a0 [ 846.213743] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 846.218943] ? __netlink_ns_capable+0x100/0x130 [ 846.223624] genl_family_rcv_msg+0x889/0x1120 [ 846.228128] ? genl_rcv+0x40/0x40 [ 846.231596] ? __sched_text_start+0x8/0x8 [ 846.235750] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.237475] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 846.240770] ? kasan_check_read+0x11/0x20 [ 846.240789] ? lock_acquire+0x1dc/0x520 [ 846.240803] ? genl_rcv+0x19/0x40 [ 846.240830] genl_rcv_msg+0xc6/0x170 [ 846.240848] netlink_rcv_skb+0x172/0x440 [ 846.261210] IPVS: ftp: loaded support on port[0] = 21 [ 846.261841] ? genl_family_rcv_msg+0x1120/0x1120 [ 846.261858] ? netlink_ack+0xbc0/0xbc0 [ 846.261872] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 846.261891] ? netlink_skb_destructor+0x210/0x210 [ 846.289752] genl_rcv+0x28/0x40 [ 846.293038] netlink_unicast+0x58b/0x740 [ 846.297108] ? netlink_attachskb+0x970/0x970 [ 846.301523] ? import_iovec+0x24b/0x420 [ 846.305504] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.310521] ? security_netlink_send+0x88/0xb0 [ 846.315111] netlink_sendmsg+0x9f0/0xfa0 [ 846.319181] ? netlink_unicast+0x740/0x740 [ 846.323423] ? security_socket_sendmsg+0x94/0xc0 [ 846.328178] ? netlink_unicast+0x740/0x740 [ 846.332417] sock_sendmsg+0xd5/0x120 [ 846.336136] ___sys_sendmsg+0x805/0x940 [ 846.340117] ? copy_msghdr_from_user+0x560/0x560 [ 846.344888] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 846.350429] ? proc_fail_nth_write+0x96/0x1f0 [ 846.354934] ? __fget_light+0x2ef/0x430 [ 846.358910] ? fget_raw+0x20/0x20 [ 846.362365] ? find_held_lock+0x36/0x1c0 [ 846.366438] ? kasan_check_write+0x14/0x20 [ 846.370682] ? wait_for_completion+0x870/0x870 [ 846.375277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 846.380817] ? sockfd_lookup_light+0xc5/0x160 [ 846.385329] __sys_sendmsg+0x115/0x270 [ 846.389221] ? __ia32_sys_shutdown+0x80/0x80 [ 846.393634] ? __sb_end_write+0xac/0xe0 [ 846.395471] IPVS: ftp: loaded support on port[0] = 21 [ 846.397608] ? fput+0x130/0x1a0 [ 846.397624] ? ksys_write+0x1a6/0x250 [ 846.397653] __x64_sys_sendmsg+0x78/0xb0 [ 846.397671] do_syscall_64+0x1b1/0x800 [ 846.397691] ? finish_task_switch+0x1ca/0x840 [ 846.422633] ? syscall_return_slowpath+0x5c0/0x5c0 [ 846.427580] ? syscall_return_slowpath+0x30f/0x5c0 [ 846.432526] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 846.437904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 846.442759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.447946] RIP: 0033:0x455a09 [ 846.451132] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 846.458846] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 846.466112] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 846.473384] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 846.480650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 846.487923] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000011 08:45:46 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5455010000000000]}}, 0x1c) 08:45:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00H\x00'}, 0x2c) 08:45:46 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000200"}, &(0x7f0000000140)=0x44) 08:45:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3a, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:46 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:46 executing program 0 (fault-call:3 fault-nth:18): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000040030000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 846.610187] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 846.621146] FAULT_INJECTION: forcing a failure. [ 846.621146] name failslab, interval 1, probability 0, space 0, times 0 [ 846.630577] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 846.632542] CPU: 1 PID: 26910 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 846.643963] IPVS: ftp: loaded support on port[0] = 21 [ 846.649665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.649672] Call Trace: [ 846.649694] dump_stack+0x1b9/0x294 [ 846.649713] ? dump_stack_print_info.cold.2+0x52/0x52 [ 846.649732] ? mutex_trylock+0x2a0/0x2a0 [ 846.649750] should_fail.cold.4+0xa/0x1a [ 846.649768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 846.649788] ? graph_lock+0x170/0x170 [ 846.649803] ? find_held_lock+0x36/0x1c0 [ 846.697587] ? find_held_lock+0x36/0x1c0 [ 846.701659] ? __lock_is_held+0xb5/0x140 [ 846.705738] ? check_same_owner+0x320/0x320 [ 846.710066] ? graph_lock+0x170/0x170 [ 846.713870] ? rcu_note_context_switch+0x710/0x710 [ 846.718804] ? kasan_check_write+0x14/0x20 [ 846.723050] __should_failslab+0x124/0x180 [ 846.727286] should_failslab+0x9/0x14 [ 846.731093] kmem_cache_alloc+0x2af/0x760 [ 846.735250] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 846.740269] __kernfs_new_node+0xe7/0x580 [ 846.744425] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 846.749188] ? lock_downgrade+0x8e0/0x8e0 [ 846.753352] ? kasan_check_read+0x11/0x20 [ 846.757508] ? do_raw_spin_unlock+0x9e/0x2e0 [ 846.761925] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 846.766511] kernfs_new_node+0x80/0xf0 [ 846.770405] kernfs_create_link+0x33/0x180 [ 846.774645] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 846.779923] sysfs_create_link+0x65/0xc0 [ 846.783993] device_add+0x481/0x16d0 [ 846.787714] ? device_private_init+0x230/0x230 [ 846.792302] ? kfree+0x1e9/0x260 [ 846.795679] ? kfree_const+0x5e/0x70 [ 846.799402] device_create_groups_vargs+0x1ff/0x270 [ 846.804422] device_create+0xd3/0x100 [ 846.807156] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 846.808224] ? device_create_vargs+0x60/0x60 [ 846.808247] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 846.808263] ? trace_hardirqs_on+0xd/0x10 [ 846.808283] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 846.808297] ? graph_lock+0x170/0x170 [ 846.808319] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 846.808336] ? lock_release+0xa10/0xa10 [ 846.846613] ? check_same_owner+0x320/0x320 [ 846.850950] ? rcu_note_context_switch+0x710/0x710 [ 846.855889] ? __lock_acquire+0x7f5/0x5140 08:45:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100048f00"}, 0x2c) [ 846.858944] IPVS: ftp: loaded support on port[0] = 21 [ 846.860210] ? __might_sleep+0x95/0x190 [ 846.860232] ? kasan_check_write+0x14/0x20 [ 846.860251] ? __mutex_lock+0x7d9/0x17f0 [ 846.860266] ? genl_rcv_msg+0x13a/0x170 [ 846.860284] ? __lock_acquire+0x7f5/0x5140 [ 846.885881] ? mutex_trylock+0x2a0/0x2a0 [ 846.889948] ? graph_lock+0x170/0x170 [ 846.893763] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 846.898958] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.903980] ? validate_nla+0x2d9/0x7b0 08:45:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x103080]}}, 0x1c) 08:45:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00h\x00'}, 0x2c) 08:45:47 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 846.907960] hwsim_new_radio_nl+0x7b8/0xa60 [ 846.912283] ? nla_parse+0x358/0x4a0 [ 846.916004] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 846.921232] ? __netlink_ns_capable+0x100/0x130 [ 846.925912] genl_family_rcv_msg+0x889/0x1120 [ 846.930419] ? genl_rcv+0x40/0x40 [ 846.933880] ? lock_downgrade+0x8e0/0x8e0 [ 846.938037] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 846.943065] ? kasan_check_read+0x11/0x20 [ 846.947220] ? lock_acquire+0x1dc/0x520 [ 846.951200] ? genl_rcv+0x19/0x40 [ 846.954675] genl_rcv_msg+0xc6/0x170 [ 846.958391] netlink_rcv_skb+0x172/0x440 [ 846.962454] ? genl_family_rcv_msg+0x1120/0x1120 [ 846.967217] ? netlink_ack+0xbc0/0xbc0 [ 846.971111] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 846.976312] ? netlink_skb_destructor+0x210/0x210 [ 846.981167] genl_rcv+0x28/0x40 [ 846.984447] netlink_unicast+0x58b/0x740 [ 846.988516] ? netlink_attachskb+0x970/0x970 [ 846.992930] ? import_iovec+0x24b/0x420 [ 846.996910] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 847.001931] ? security_netlink_send+0x88/0xb0 [ 847.006525] netlink_sendmsg+0x9f0/0xfa0 [ 847.010599] ? netlink_unicast+0x740/0x740 [ 847.014845] ? security_socket_sendmsg+0x94/0xc0 [ 847.019600] ? netlink_unicast+0x740/0x740 [ 847.023839] sock_sendmsg+0xd5/0x120 [ 847.027563] ___sys_sendmsg+0x805/0x940 [ 847.031550] ? copy_msghdr_from_user+0x560/0x560 [ 847.036321] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 847.041865] ? proc_fail_nth_write+0x96/0x1f0 [ 847.046371] ? __fget_light+0x2ef/0x430 [ 847.050344] ? fget_raw+0x20/0x20 [ 847.053798] ? find_held_lock+0x36/0x1c0 [ 847.057876] ? kasan_check_write+0x14/0x20 [ 847.062124] ? wait_for_completion+0x870/0x870 [ 847.066117] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 847.066715] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.066733] ? sockfd_lookup_light+0xc5/0x160 [ 847.082374] __sys_sendmsg+0x115/0x270 [ 847.086273] ? __ia32_sys_shutdown+0x80/0x80 [ 847.090693] ? __sb_end_write+0xac/0xe0 [ 847.094673] ? fput+0x130/0x1a0 [ 847.097954] ? ksys_write+0x1a6/0x250 [ 847.101771] __x64_sys_sendmsg+0x78/0xb0 [ 847.105840] do_syscall_64+0x1b1/0x800 [ 847.109743] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 847.114598] ? syscall_return_slowpath+0x5c0/0x5c0 [ 847.119535] ? syscall_return_slowpath+0x30f/0x5c0 [ 847.124477] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 847.129851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.134708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.139899] RIP: 0033:0x455a09 [ 847.143091] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 847.150802] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 08:45:47 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x6, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:47 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:47 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000001f600"}, &(0x7f0000000140)=0x44) 08:45:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000200000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 847.158076] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 847.165348] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 847.172623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 847.179898] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000012 08:45:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa20c892500000000]}}, 0x1c) 08:45:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000007fffffff00"}, 0x2c) 08:45:47 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 847.329431] IPVS: ftp: loaded support on port[0] = 21 [ 847.351527] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 847.402776] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 847.524464] IPVS: ftp: loaded support on port[0] = 21 08:45:47 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000400000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfc, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:47 executing program 0 (fault-call:3 fault-nth:19): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:47 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x2c) 08:45:47 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:47 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00\x00^\x00'}, &(0x7f0000000140)=0x44) 08:45:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xcd000000]}}, 0x1c) [ 847.619618] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 847.636480] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 847.637335] FAULT_INJECTION: forcing a failure. [ 847.637335] name failslab, interval 1, probability 0, space 0, times 0 [ 847.657841] CPU: 1 PID: 26980 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 847.665120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.674476] Call Trace: [ 847.677078] dump_stack+0x1b9/0x294 [ 847.680723] ? dump_stack_print_info.cold.2+0x52/0x52 [ 847.685932] ? __might_sleep+0x95/0x190 [ 847.689926] should_fail.cold.4+0xa/0x1a [ 847.694008] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 847.699165] ? mutex_trylock+0x2a0/0x2a0 [ 847.703235] ? graph_lock+0x170/0x170 [ 847.707048] ? __mutex_lock+0x7d9/0x17f0 [ 847.711125] ? find_held_lock+0x36/0x1c0 [ 847.715201] ? __lock_is_held+0xb5/0x140 [ 847.719289] ? check_same_owner+0x320/0x320 [ 847.723642] ? rcu_note_context_switch+0x710/0x710 [ 847.728585] __should_failslab+0x124/0x180 [ 847.732830] should_failslab+0x9/0x14 [ 847.736636] __kmalloc_track_caller+0x2c4/0x760 [ 847.741309] ? graph_lock+0x170/0x170 [ 847.745107] ? graph_lock+0x170/0x170 [ 847.748912] ? kstrdup_const+0x66/0x80 [ 847.752805] kstrdup+0x39/0x70 [ 847.756002] kstrdup_const+0x66/0x80 [ 847.759725] __kernfs_new_node+0xa8/0x580 [ 847.763883] ? kernfs_dop_revalidate+0x3c0/0x3c0 08:45:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x2000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:48 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:48 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) [ 847.767395] IPVS: ftp: loaded support on port[0] = 21 [ 847.768641] ? lock_downgrade+0x8e0/0x8e0 [ 847.768661] ? kasan_check_read+0x11/0x20 [ 847.768674] ? do_raw_spin_unlock+0x9e/0x2e0 [ 847.768687] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 847.768704] kernfs_new_node+0x80/0xf0 [ 847.768719] kernfs_create_link+0x33/0x180 [ 847.768732] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 847.768744] sysfs_create_link+0x65/0xc0 [ 847.768758] device_add+0x7a0/0x16d0 [ 847.768774] ? device_private_init+0x230/0x230 [ 847.768784] ? kfree+0x1e9/0x260 [ 847.768799] ? kfree_const+0x5e/0x70 [ 847.768814] device_create_groups_vargs+0x1ff/0x270 [ 847.768828] device_create+0xd3/0x100 [ 847.768840] ? device_create_vargs+0x60/0x60 [ 847.768857] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 847.768868] ? trace_hardirqs_on+0xd/0x10 [ 847.768882] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 847.768893] ? graph_lock+0x170/0x170 [ 847.768912] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 847.768926] ? lock_release+0xa10/0xa10 [ 847.768939] ? check_same_owner+0x320/0x320 [ 847.768961] ? rcu_note_context_switch+0x710/0x710 [ 847.768972] ? __lock_acquire+0x7f5/0x5140 [ 847.768986] ? __might_sleep+0x95/0x190 [ 847.769000] ? kasan_check_write+0x14/0x20 [ 847.769013] ? __mutex_lock+0x7d9/0x17f0 [ 847.769027] ? genl_rcv_msg+0x13a/0x170 [ 847.769040] ? __lock_acquire+0x7f5/0x5140 [ 847.769053] ? mutex_trylock+0x2a0/0x2a0 [ 847.769064] ? graph_lock+0x170/0x170 [ 847.769079] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 847.769092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 847.769105] ? validate_nla+0x2d9/0x7b0 [ 847.769118] hwsim_new_radio_nl+0x7b8/0xa60 [ 847.769128] ? nla_parse+0x358/0x4a0 [ 847.769141] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 847.769158] ? __netlink_ns_capable+0x100/0x130 [ 847.769173] genl_family_rcv_msg+0x889/0x1120 [ 847.769188] ? genl_rcv+0x40/0x40 [ 847.769199] ? lock_downgrade+0x8e0/0x8e0 [ 847.769211] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 847.769226] ? kasan_check_read+0x11/0x20 [ 847.769239] ? lock_acquire+0x1dc/0x520 [ 847.769249] ? genl_rcv+0x19/0x40 [ 847.769270] genl_rcv_msg+0xc6/0x170 [ 847.769283] netlink_rcv_skb+0x172/0x440 [ 847.769294] ? genl_family_rcv_msg+0x1120/0x1120 [ 847.769306] ? netlink_ack+0xbc0/0xbc0 [ 847.769318] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 847.769332] ? netlink_skb_destructor+0x210/0x210 [ 847.769347] genl_rcv+0x28/0x40 [ 847.769357] netlink_unicast+0x58b/0x740 [ 847.769373] ? netlink_attachskb+0x970/0x970 [ 847.769384] ? import_iovec+0x24b/0x420 [ 847.769398] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:45:48 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00H\x00'}, 0x2c) 08:45:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xeffe]}}, 0x1c) [ 847.769410] ? security_netlink_send+0x88/0xb0 [ 847.769423] netlink_sendmsg+0x9f0/0xfa0 [ 847.769438] ? netlink_unicast+0x740/0x740 [ 847.769452] ? security_socket_sendmsg+0x94/0xc0 [ 847.769461] ? netlink_unicast+0x740/0x740 [ 847.769475] sock_sendmsg+0xd5/0x120 [ 847.769488] ___sys_sendmsg+0x805/0x940 [ 847.769504] ? copy_msghdr_from_user+0x560/0x560 [ 847.769523] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 847.769536] ? proc_fail_nth_write+0x96/0x1f0 [ 847.769549] ? __fget_light+0x2ef/0x430 [ 847.769561] ? fget_raw+0x20/0x20 08:45:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb8ff000000000000]}}, 0x1c) [ 847.769570] ? find_held_lock+0x36/0x1c0 [ 847.769585] ? kasan_check_write+0x14/0x20 [ 847.769601] ? wait_for_completion+0x870/0x870 [ 847.769619] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.769630] ? sockfd_lookup_light+0xc5/0x160 [ 847.769643] __sys_sendmsg+0x115/0x270 [ 847.769656] ? __ia32_sys_shutdown+0x80/0x80 [ 847.769679] ? __sb_end_write+0xac/0xe0 [ 847.769692] ? fput+0x130/0x1a0 [ 847.769704] ? ksys_write+0x1a6/0x250 [ 847.769722] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 847.769737] __x64_sys_sendmsg+0x78/0xb0 [ 847.769750] do_syscall_64+0x1b1/0x800 [ 847.769762] ? finish_task_switch+0x1ca/0x840 [ 847.769775] ? syscall_return_slowpath+0x5c0/0x5c0 [ 847.769788] ? syscall_return_slowpath+0x30f/0x5c0 [ 847.769803] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 847.769818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.769835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.769844] RIP: 0033:0x455a09 [ 847.769851] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 847.769865] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 847.769872] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 847.769879] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 847.769886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 847.769893] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000013 [ 848.188617] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 848.205242] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 848.256740] IPVS: ftp: loaded support on port[0] = 21 08:45:48 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x4000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:48 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:48 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00L\x00'}, 0x2c) 08:45:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000020000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc]}}, 0x1c) 08:45:48 executing program 0 (fault-call:3 fault-nth:20): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:48 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200022900"}, &(0x7f0000000140)=0x44) [ 848.485085] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 848.497860] FAULT_INJECTION: forcing a failure. [ 848.497860] name failslab, interval 1, probability 0, space 0, times 0 [ 848.509345] CPU: 0 PID: 27034 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 848.513941] IPVS: ftp: loaded support on port[0] = 21 [ 848.516633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.516639] Call Trace: [ 848.516660] dump_stack+0x1b9/0x294 [ 848.516677] ? dump_stack_print_info.cold.2+0x52/0x52 [ 848.516701] should_fail.cold.4+0xa/0x1a [ 848.546649] ? __kmalloc_track_caller+0x14a/0x760 [ 848.551513] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 848.556645] ? device_create_groups_vargs+0x1ff/0x270 [ 848.561844] ? device_create+0xd3/0x100 [ 848.565828] ? mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 848.570941] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 848.575442] ? genl_family_rcv_msg+0x889/0x1120 [ 848.580118] ? genl_rcv_msg+0xc6/0x170 [ 848.584010] ? netlink_rcv_skb+0x172/0x440 [ 848.588267] ? graph_lock+0x170/0x170 [ 848.592076] ? ___sys_sendmsg+0x805/0x940 [ 848.596234] ? __sys_sendmsg+0x115/0x270 [ 848.600299] ? __x64_sys_sendmsg+0x78/0xb0 [ 848.604540] ? do_syscall_64+0x1b1/0x800 [ 848.608606] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.614079] ? find_held_lock+0x36/0x1c0 [ 848.618179] ? __lock_is_held+0xb5/0x140 [ 848.622260] ? check_same_owner+0x320/0x320 [ 848.626593] ? rcu_note_context_switch+0x710/0x710 [ 848.631527] ? rcu_read_lock_sched_held+0x108/0x120 [ 848.636551] __should_failslab+0x124/0x180 [ 848.640786] should_failslab+0x9/0x14 [ 848.644592] kmem_cache_alloc+0x2af/0x760 [ 848.648743] ? memcpy+0x45/0x50 [ 848.652033] ? kstrdup+0x59/0x70 [ 848.655415] __kernfs_new_node+0xe7/0x580 [ 848.659573] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 848.664341] ? lock_downgrade+0x8e0/0x8e0 [ 848.668508] ? kasan_check_read+0x11/0x20 [ 848.672661] ? do_raw_spin_unlock+0x9e/0x2e0 [ 848.677076] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 848.681667] kernfs_new_node+0x80/0xf0 08:45:48 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x800000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:49 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x91ffffff00000000]}}, 0x1c) [ 848.685564] kernfs_create_link+0x33/0x180 [ 848.689804] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 848.695087] sysfs_create_link+0x65/0xc0 [ 848.699160] device_add+0x7a0/0x16d0 [ 848.702890] ? device_private_init+0x230/0x230 [ 848.707480] ? kfree+0x1e9/0x260 [ 848.710854] ? kfree_const+0x5e/0x70 [ 848.714584] device_create_groups_vargs+0x1ff/0x270 [ 848.724017] device_create+0xd3/0x100 [ 848.727842] ? device_create_vargs+0x60/0x60 08:45:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00`\x00'}, 0x2c) [ 848.732278] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 848.740659] ? trace_hardirqs_on+0xd/0x10 [ 848.744824] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 848.749763] ? graph_lock+0x170/0x170 [ 848.753573] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 848.759725] ? lock_release+0xa10/0xa10 [ 848.763704] ? check_same_owner+0x320/0x320 [ 848.768038] ? rcu_note_context_switch+0x710/0x710 [ 848.772972] ? __lock_acquire+0x7f5/0x5140 [ 848.777217] ? __might_sleep+0x95/0x190 [ 848.781203] ? kasan_check_write+0x14/0x20 [ 848.785441] ? __mutex_lock+0x7d9/0x17f0 [ 848.789267] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 848.789505] ? genl_rcv_msg+0x13a/0x170 [ 848.789523] ? __lock_acquire+0x7f5/0x5140 [ 848.808761] ? mutex_trylock+0x2a0/0x2a0 [ 848.812870] ? graph_lock+0x170/0x170 [ 848.816681] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 848.818315] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 848.821874] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.821891] ? validate_nla+0x2d9/0x7b0 08:45:49 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 848.821911] hwsim_new_radio_nl+0x7b8/0xa60 [ 848.821925] ? nla_parse+0x358/0x4a0 [ 848.821942] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 848.821964] ? __netlink_ns_capable+0x100/0x130 [ 848.821983] genl_family_rcv_msg+0x889/0x1120 [ 848.822000] ? genl_rcv+0x40/0x40 [ 848.822020] ? lock_downgrade+0x8e0/0x8e0 [ 848.866475] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.871506] ? kasan_check_read+0x11/0x20 [ 848.875664] ? lock_acquire+0x1dc/0x520 [ 848.879645] ? genl_rcv+0x19/0x40 [ 848.883149] genl_rcv_msg+0xc6/0x170 [ 848.886883] netlink_rcv_skb+0x172/0x440 [ 848.890947] ? genl_family_rcv_msg+0x1120/0x1120 [ 848.895714] ? netlink_ack+0xbc0/0xbc0 [ 848.899619] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 848.904821] ? netlink_skb_destructor+0x210/0x210 [ 848.909676] genl_rcv+0x28/0x40 [ 848.912961] netlink_unicast+0x58b/0x740 [ 848.917035] ? netlink_attachskb+0x970/0x970 [ 848.921452] ? import_iovec+0x24b/0x420 [ 848.925440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 848.929646] IPVS: ftp: loaded support on port[0] = 21 [ 848.930474] ? security_netlink_send+0x88/0xb0 [ 848.930505] netlink_sendmsg+0x9f0/0xfa0 [ 848.930531] ? netlink_unicast+0x740/0x740 [ 848.930548] ? security_socket_sendmsg+0x94/0xc0 [ 848.930571] ? netlink_unicast+0x740/0x740 [ 848.930589] sock_sendmsg+0xd5/0x120 [ 848.961380] ___sys_sendmsg+0x805/0x940 [ 848.965373] ? copy_msghdr_from_user+0x560/0x560 [ 848.970149] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 848.975696] ? proc_fail_nth_write+0x96/0x1f0 [ 848.980211] ? __fget_light+0x2ef/0x430 [ 848.984192] ? fget_raw+0x20/0x20 [ 848.987652] ? find_held_lock+0x36/0x1c0 [ 848.991720] ? kasan_check_write+0x14/0x20 [ 848.995973] ? wait_for_completion+0x870/0x870 [ 849.000572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.006116] ? sockfd_lookup_light+0xc5/0x160 [ 849.010619] __sys_sendmsg+0x115/0x270 [ 849.014519] ? __ia32_sys_shutdown+0x80/0x80 [ 849.018948] ? __sb_end_write+0xac/0xe0 [ 849.022933] ? fput+0x130/0x1a0 [ 849.026221] ? ksys_write+0x1a6/0x250 [ 849.030052] __x64_sys_sendmsg+0x78/0xb0 [ 849.034122] do_syscall_64+0x1b1/0x800 [ 849.038022] ? syscall_return_slowpath+0x5c0/0x5c0 [ 849.042976] ? syscall_return_slowpath+0x30f/0x5c0 [ 849.047921] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 849.053336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.058216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.063435] RIP: 0033:0x455a09 [ 849.066627] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 849.074491] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 849.081800] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 849.089093] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 849.096378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 849.103662] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000014 08:45:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71007fffffff00"}, 0x2c) 08:45:49 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:49 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x4000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffb8]}}, 0x1c) 08:45:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000001000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:49 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200ec0300"}, &(0x7f0000000140)=0x44) 08:45:49 executing program 0 (fault-call:3 fault-nth:21): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 849.243133] FAULT_INJECTION: forcing a failure. [ 849.243133] name failslab, interval 1, probability 0, space 0, times 0 [ 849.245293] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 849.254467] CPU: 0 PID: 27077 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 849.254478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.254483] Call Trace: [ 849.254508] dump_stack+0x1b9/0x294 [ 849.254526] ? dump_stack_print_info.cold.2+0x52/0x52 [ 849.254553] should_fail.cold.4+0xa/0x1a 08:45:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb]}}, 0x1c) 08:45:49 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 849.254577] ? __kmalloc_track_caller+0x14a/0x760 [ 849.254598] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 849.254619] ? device_create_groups_vargs+0x1ff/0x270 [ 849.254638] ? device_create+0xd3/0x100 [ 849.254653] ? mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 849.254671] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 849.286542] IPVS: ftp: loaded support on port[0] = 21 [ 849.288277] ? genl_family_rcv_msg+0x889/0x1120 [ 849.288292] ? genl_rcv_msg+0xc6/0x170 [ 849.288309] ? netlink_rcv_skb+0x172/0x440 [ 849.338952] ? graph_lock+0x170/0x170 08:45:49 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00L\x00'}, 0x2c) [ 849.342758] ? ___sys_sendmsg+0x805/0x940 [ 849.346911] ? __sys_sendmsg+0x115/0x270 [ 849.351067] ? __x64_sys_sendmsg+0x78/0xb0 [ 849.355311] ? do_syscall_64+0x1b1/0x800 [ 849.359544] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.365027] ? find_held_lock+0x36/0x1c0 [ 849.369101] ? __lock_is_held+0xb5/0x140 [ 849.373178] ? check_same_owner+0x320/0x320 [ 849.377513] ? rcu_note_context_switch+0x710/0x710 [ 849.382536] ? rcu_read_lock_sched_held+0x108/0x120 [ 849.387568] __should_failslab+0x124/0x180 [ 849.391813] should_failslab+0x9/0x14 [ 849.395717] kmem_cache_alloc+0x2af/0x760 [ 849.399871] ? memcpy+0x45/0x50 [ 849.403173] ? kstrdup+0x59/0x70 [ 849.406562] __kernfs_new_node+0xe7/0x580 [ 849.413944] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 849.418722] ? lock_downgrade+0x8e0/0x8e0 [ 849.422894] ? kasan_check_read+0x11/0x20 [ 849.427058] ? do_raw_spin_unlock+0x9e/0x2e0 [ 849.431484] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 849.436091] kernfs_new_node+0x80/0xf0 [ 849.440024] kernfs_create_link+0x33/0x180 [ 849.444291] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 849.449593] sysfs_create_link+0x65/0xc0 [ 849.452964] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 849.453667] device_add+0x7a0/0x16d0 [ 849.453686] ? device_private_init+0x230/0x230 [ 849.453707] ? kfree+0x1e9/0x260 [ 849.471003] ? kfree_const+0x5e/0x70 [ 849.474835] device_create_groups_vargs+0x1ff/0x270 [ 849.479884] device_create+0xd3/0x100 [ 849.483734] ? device_create_vargs+0x60/0x60 [ 849.488164] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 08:45:49 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 849.493281] ? trace_hardirqs_on+0xd/0x10 [ 849.497458] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 849.502410] ? graph_lock+0x170/0x170 [ 849.506247] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 849.512422] ? lock_release+0xa10/0xa10 [ 849.516428] ? check_same_owner+0x320/0x320 [ 849.520767] ? rcu_note_context_switch+0x710/0x710 [ 849.525720] ? __lock_acquire+0x7f5/0x5140 [ 849.529975] ? __might_sleep+0x95/0x190 [ 849.533968] ? kasan_check_write+0x14/0x20 [ 849.538212] ? __mutex_lock+0x7d9/0x17f0 [ 849.542283] ? genl_rcv_msg+0x13a/0x170 [ 849.546277] ? __lock_acquire+0x7f5/0x5140 [ 849.550532] ? mutex_trylock+0x2a0/0x2a0 [ 849.554598] ? graph_lock+0x170/0x170 [ 849.558414] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 849.563615] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 849.568645] ? validate_nla+0x2d9/0x7b0 [ 849.572639] hwsim_new_radio_nl+0x7b8/0xa60 [ 849.576976] ? nla_parse+0x358/0x4a0 [ 849.580706] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 849.585932] ? __netlink_ns_capable+0x100/0x130 [ 849.590625] genl_family_rcv_msg+0x889/0x1120 [ 849.595146] ? genl_rcv+0x40/0x40 [ 849.598620] ? lock_downgrade+0x8e0/0x8e0 [ 849.602792] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 849.607838] ? kasan_check_read+0x11/0x20 [ 849.612009] ? lock_acquire+0x1dc/0x520 [ 849.616002] ? genl_rcv+0x19/0x40 [ 849.619481] genl_rcv_msg+0xc6/0x170 [ 849.623217] netlink_rcv_skb+0x172/0x440 [ 849.627299] ? genl_family_rcv_msg+0x1120/0x1120 [ 849.632070] ? netlink_ack+0xbc0/0xbc0 [ 849.636147] ? rcu_bh_force_quiescent_state+0x20/0x20 08:45:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x2c) 08:45:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 849.641230] IPVS: ftp: loaded support on port[0] = 21 [ 849.641354] ? netlink_skb_destructor+0x210/0x210 [ 849.641376] genl_rcv+0x28/0x40 [ 849.641397] netlink_unicast+0x58b/0x740 [ 849.658870] ? netlink_attachskb+0x970/0x970 [ 849.663304] ? import_iovec+0x24b/0x420 [ 849.667462] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 849.672543] ? security_netlink_send+0x88/0xb0 [ 849.677173] netlink_sendmsg+0x9f0/0xfa0 [ 849.681296] ? netlink_unicast+0x740/0x740 [ 849.685564] ? security_socket_sendmsg+0x94/0xc0 [ 849.690359] ? netlink_unicast+0x740/0x740 08:45:50 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 849.694625] sock_sendmsg+0xd5/0x120 [ 849.698368] ___sys_sendmsg+0x805/0x940 [ 849.702893] ? copy_msghdr_from_user+0x560/0x560 [ 849.707682] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 849.713458] ? proc_fail_nth_write+0x96/0x1f0 [ 849.725812] ? __fget_light+0x2ef/0x430 [ 849.729816] ? fget_raw+0x20/0x20 [ 849.735096] ? find_held_lock+0x36/0x1c0 [ 849.739207] ? kasan_check_write+0x14/0x20 [ 849.743473] ? wait_for_completion+0x870/0x870 [ 849.748087] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.753738] ? sockfd_lookup_light+0xc5/0x160 [ 849.758266] __sys_sendmsg+0x115/0x270 [ 849.762183] ? __ia32_sys_shutdown+0x80/0x80 [ 849.766610] ? __sb_end_write+0xac/0xe0 [ 849.770625] ? fput+0x130/0x1a0 [ 849.773947] ? ksys_write+0x1a6/0x250 [ 849.777782] __x64_sys_sendmsg+0x78/0xb0 [ 849.782048] do_syscall_64+0x1b1/0x800 [ 849.785954] ? finish_task_switch+0x1ca/0x840 [ 849.790469] ? syscall_return_slowpath+0x5c0/0x5c0 [ 849.795424] ? syscall_return_slowpath+0x30f/0x5c0 [ 849.800490] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 849.805887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.810761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.816283] RIP: 0033:0x455a09 [ 849.819482] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 849.827210] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 849.834634] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 08:45:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000400000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 849.842031] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 849.850775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 849.858072] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000015 08:45:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 849.900945] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:50 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb000000]}}, 0x1c) 08:45:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000000300"}, 0x2c) 08:45:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000020000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:50 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200f60100"}, &(0x7f0000000140)=0x44) 08:45:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:50 executing program 0 (fault-call:3 fault-nth:22): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x7f000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 850.143699] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 850.145255] IPVS: ftp: loaded support on port[0] = 21 [ 850.169269] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 850.201082] FAULT_INJECTION: forcing a failure. [ 850.201082] name failslab, interval 1, probability 0, space 0, times 0 [ 850.212559] CPU: 0 PID: 27153 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 850.219853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.229225] Call Trace: [ 850.231847] dump_stack+0x1b9/0x294 [ 850.235500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 850.240814] should_fail.cold.4+0xa/0x1a [ 850.245031] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 850.250157] ? lock_release+0xa10/0xa10 [ 850.254153] ? check_same_owner+0x320/0x320 [ 850.258497] ? graph_lock+0x170/0x170 [ 850.262365] ? rcu_note_context_switch+0x710/0x710 [ 850.267344] ? find_held_lock+0x36/0x1c0 [ 850.271457] ? find_held_lock+0x36/0x1c0 [ 850.275670] ? __lock_is_held+0xb5/0x140 [ 850.279776] ? check_same_owner+0x320/0x320 [ 850.284117] ? rcu_note_context_switch+0x710/0x710 [ 850.289062] __should_failslab+0x124/0x180 [ 850.293314] should_failslab+0x9/0x14 [ 850.297149] kmem_cache_alloc+0x2af/0x760 08:45:50 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 850.301391] ? kasan_check_write+0x14/0x20 [ 850.305648] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 850.310729] __kernfs_new_node+0xe7/0x580 [ 850.314904] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 850.319702] ? kasan_check_write+0x14/0x20 [ 850.323965] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 850.328913] ? graph_lock+0x170/0x170 [ 850.332743] ? wait_for_completion+0x870/0x870 [ 850.337355] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 850.342929] kernfs_new_node+0x80/0xf0 [ 850.346847] __kernfs_create_file+0x4d/0x330 08:45:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00c\x00'}, 0x2c) [ 850.351314] sysfs_add_file_mode_ns+0x21a/0x560 [ 850.356054] sysfs_add_file+0x4e/0x60 [ 850.359889] sysfs_merge_group+0xfa/0x230 [ 850.364082] dpm_sysfs_add+0x161/0x210 [ 850.367998] device_add+0xa11/0x16d0 [ 850.371784] ? device_private_init+0x230/0x230 [ 850.376402] ? kfree+0x1e9/0x260 [ 850.379827] ? kfree_const+0x5e/0x70 [ 850.383591] device_create_groups_vargs+0x1ff/0x270 [ 850.389158] device_create+0xd3/0x100 [ 850.393273] ? device_create_vargs+0x60/0x60 [ 850.397729] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 850.398804] IPVS: ftp: loaded support on port[0] = 21 [ 850.403324] ? trace_hardirqs_on+0xd/0x10 [ 850.403351] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 850.403395] ? graph_lock+0x170/0x170 [ 850.403416] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 850.403431] ? lock_release+0xa10/0xa10 [ 850.403447] ? check_same_owner+0x320/0x320 [ 850.403492] ? rcu_note_context_switch+0x710/0x710 [ 850.441301] ? __lock_acquire+0x7f5/0x5140 [ 850.445769] ? __might_sleep+0x95/0x190 08:45:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xcd]}}, 0x1c) [ 850.450494] ? kasan_check_write+0x14/0x20 [ 850.454767] ? __mutex_lock+0x7d9/0x17f0 [ 850.458865] ? genl_rcv_msg+0x13a/0x170 [ 850.462954] ? __lock_acquire+0x7f5/0x5140 [ 850.467290] ? mutex_trylock+0x2a0/0x2a0 [ 850.471554] ? graph_lock+0x170/0x170 [ 850.475291] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 850.475413] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 850.475434] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 850.491277] ? validate_nla+0x2d9/0x7b0 [ 850.495333] hwsim_new_radio_nl+0x7b8/0xa60 08:45:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x5c00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 850.499698] ? nla_parse+0x358/0x4a0 [ 850.503450] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 850.508771] ? __netlink_ns_capable+0x100/0x130 [ 850.513468] genl_family_rcv_msg+0x889/0x1120 [ 850.518006] ? genl_rcv+0x40/0x40 [ 850.521492] ? lock_downgrade+0x8e0/0x8e0 [ 850.525671] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 850.530746] ? kasan_check_read+0x11/0x20 [ 850.534946] ? lock_acquire+0x1dc/0x520 [ 850.538942] ? genl_rcv+0x19/0x40 [ 850.542433] genl_rcv_msg+0xc6/0x170 [ 850.546184] netlink_rcv_skb+0x172/0x440 [ 850.550276] ? genl_family_rcv_msg+0x1120/0x1120 [ 850.555049] ? netlink_ack+0xbc0/0xbc0 [ 850.558955] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 850.564190] ? netlink_skb_destructor+0x210/0x210 [ 850.569104] genl_rcv+0x28/0x40 [ 850.572418] netlink_unicast+0x58b/0x740 [ 850.576681] ? netlink_attachskb+0x970/0x970 [ 850.581104] ? import_iovec+0x24b/0x420 [ 850.585092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 850.590157] ? security_netlink_send+0x88/0xb0 [ 850.594844] netlink_sendmsg+0x9f0/0xfa0 [ 850.598928] ? netlink_unicast+0x740/0x740 08:45:50 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00h\x00'}, 0x2c) [ 850.603185] ? security_socket_sendmsg+0x94/0xc0 [ 850.608051] ? netlink_unicast+0x740/0x740 [ 850.612309] sock_sendmsg+0xd5/0x120 [ 850.616043] ___sys_sendmsg+0x805/0x940 [ 850.620045] ? copy_msghdr_from_user+0x560/0x560 [ 850.624842] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 850.630423] ? proc_fail_nth_write+0x96/0x1f0 [ 850.634937] ? __fget_light+0x2ef/0x430 [ 850.638943] ? fget_raw+0x20/0x20 [ 850.642421] ? find_held_lock+0x36/0x1c0 [ 850.646530] ? kasan_check_write+0x14/0x20 [ 850.650833] ? wait_for_completion+0x870/0x870 [ 850.655565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.661134] ? sockfd_lookup_light+0xc5/0x160 [ 850.665652] __sys_sendmsg+0x115/0x270 [ 850.669576] ? __ia32_sys_shutdown+0x80/0x80 [ 850.674014] ? __sb_end_write+0xac/0xe0 [ 850.678065] ? fput+0x130/0x1a0 [ 850.681386] ? ksys_write+0x1a6/0x250 [ 850.685230] __x64_sys_sendmsg+0x78/0xb0 [ 850.689404] do_syscall_64+0x1b1/0x800 [ 850.693326] ? finish_task_switch+0x1ca/0x840 [ 850.697909] ? syscall_return_slowpath+0x5c0/0x5c0 [ 850.702871] ? syscall_return_slowpath+0x30f/0x5c0 [ 850.707860] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 850.713276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 850.721186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.726425] RIP: 0033:0x455a09 [ 850.733998] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 850.741773] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 850.751325] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 850.753598] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 850.759056] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 850.759065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 850.759072] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000016 08:45:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x600, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x8030100000000000]}}, 0x1c) 08:45:51 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200f00300"}, &(0x7f0000000140)=0x44) 08:45:51 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:51 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:51 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000001100"}, 0x2c) 08:45:51 executing program 0 (fault-call:3 fault-nth:23): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000007fffffff00000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 850.960643] FAULT_INJECTION: forcing a failure. [ 850.960643] name failslab, interval 1, probability 0, space 0, times 0 [ 850.964576] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 850.972735] CPU: 0 PID: 27190 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 850.990082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.000887] Call Trace: [ 851.003661] dump_stack+0x1b9/0x294 08:45:51 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 851.007350] ? dump_stack_print_info.cold.2+0x52/0x52 [ 851.012684] ? print_usage_bug+0xc0/0xc0 [ 851.016847] should_fail.cold.4+0xa/0x1a [ 851.021891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 851.027221] ? print_usage_bug+0xc0/0xc0 [ 851.031351] ? debug_check_no_locks_freed+0x310/0x310 [ 851.036606] ? __lock_acquire+0x7f5/0x5140 [ 851.040891] ? graph_lock+0x170/0x170 [ 851.044744] ? find_held_lock+0x36/0x1c0 [ 851.048873] ? graph_lock+0x170/0x170 [ 851.052740] ? debug_check_no_locks_freed+0x310/0x310 [ 851.058013] ? print_usage_bug+0xc0/0xc0 [ 851.062123] __should_failslab+0x124/0x180 [ 851.066404] should_failslab+0x9/0x14 [ 851.070243] kmem_cache_alloc+0x47/0x760 [ 851.074357] ? lock_downgrade+0x8e0/0x8e0 [ 851.078541] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 851.079260] IPVS: ftp: loaded support on port[0] = 21 [ 851.084291] idr_get_free+0x891/0x10a0 [ 851.084323] ? radix_tree_clear_tags+0xc0/0xc0 [ 851.084343] ? unwind_get_return_address+0x61/0xa0 [ 851.084364] ? __save_stack_trace+0x7e/0xd0 [ 851.084397] ? save_stack+0xa9/0xd0 [ 851.111015] ? save_stack+0x43/0xd0 [ 851.114669] ? kasan_kmalloc+0xc4/0xe0 [ 851.118577] ? kasan_slab_alloc+0x12/0x20 [ 851.122757] ? kmem_cache_alloc+0x12e/0x760 [ 851.127107] ? __kernfs_new_node+0xe7/0x580 [ 851.131464] ? kernfs_new_node+0x80/0xf0 [ 851.135565] ? __kernfs_create_file+0x4d/0x330 [ 851.140191] ? sysfs_add_file_mode_ns+0x21a/0x560 [ 851.145080] ? sysfs_add_file+0x4e/0x60 [ 851.149080] ? sysfs_merge_group+0xfa/0x230 [ 851.153520] ? device_add+0xa11/0x16d0 [ 851.157513] ? device_create_groups_vargs+0x1ff/0x270 [ 851.162717] ? device_create+0xd3/0x100 [ 851.166719] ? mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 851.171806] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 851.176325] ? genl_family_rcv_msg+0x889/0x1120 [ 851.181061] ? genl_rcv_msg+0xc6/0x170 [ 851.185059] ? genl_rcv+0x28/0x40 [ 851.188543] ? netlink_unicast+0x58b/0x740 [ 851.192787] ? netlink_sendmsg+0x9f0/0xfa0 [ 851.197021] ? sock_sendmsg+0xd5/0x120 [ 851.200895] ? ___sys_sendmsg+0x805/0x940 [ 851.205034] ? __sys_sendmsg+0x115/0x270 [ 851.209212] ? __x64_sys_sendmsg+0x78/0xb0 [ 851.213439] ? do_syscall_64+0x1b1/0x800 [ 851.217488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.222857] idr_alloc_u32+0x1f9/0x3d0 [ 851.226745] ? __fprop_inc_percpu_max+0x2c0/0x2c0 [ 851.231590] ? lock_acquire+0x1dc/0x520 [ 851.235649] ? __kernfs_new_node+0x10e/0x580 [ 851.240050] ? __lock_is_held+0xb5/0x140 [ 851.244122] idr_alloc_cyclic+0x167/0x340 [ 851.248259] ? idr_alloc+0x1a0/0x1a0 [ 851.251961] ? kasan_check_write+0x14/0x20 [ 851.256190] ? do_raw_spin_lock+0xc1/0x200 [ 851.260415] __kernfs_new_node+0x1a3/0x580 [ 851.264639] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 851.269386] ? kasan_check_write+0x14/0x20 [ 851.273625] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 851.278543] ? graph_lock+0x170/0x170 [ 851.282334] ? wait_for_completion+0x870/0x870 [ 851.286907] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 851.292436] kernfs_new_node+0x80/0xf0 [ 851.296314] __kernfs_create_file+0x4d/0x330 [ 851.300725] sysfs_add_file_mode_ns+0x21a/0x560 [ 851.305390] sysfs_add_file+0x4e/0x60 [ 851.309180] sysfs_merge_group+0xfa/0x230 [ 851.313331] dpm_sysfs_add+0x161/0x210 [ 851.317225] device_add+0xa11/0x16d0 [ 851.320932] ? device_private_init+0x230/0x230 [ 851.325539] ? kfree+0x1e9/0x260 [ 851.329009] ? kfree_const+0x5e/0x70 [ 851.332745] device_create_groups_vargs+0x1ff/0x270 [ 851.337759] device_create+0xd3/0x100 [ 851.341553] ? device_create_vargs+0x60/0x60 [ 851.345960] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 851.351055] ? trace_hardirqs_on+0xd/0x10 [ 851.355205] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 851.360127] ? graph_lock+0x170/0x170 [ 851.363934] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 851.370070] ? lock_release+0xa10/0xa10 [ 851.374041] ? check_same_owner+0x320/0x320 [ 851.378361] ? rcu_note_context_switch+0x710/0x710 [ 851.383281] ? __lock_acquire+0x7f5/0x5140 [ 851.387512] ? __might_sleep+0x95/0x190 [ 851.391480] ? kasan_check_write+0x14/0x20 [ 851.395731] ? __mutex_lock+0x7d9/0x17f0 [ 851.399801] ? genl_rcv_msg+0x13a/0x170 [ 851.403765] ? __lock_acquire+0x7f5/0x5140 [ 851.407995] ? mutex_trylock+0x2a0/0x2a0 [ 851.412048] ? graph_lock+0x170/0x170 [ 851.415845] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 851.421036] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 851.426046] ? validate_nla+0x2d9/0x7b0 [ 851.430018] hwsim_new_radio_nl+0x7b8/0xa60 [ 851.434328] ? nla_parse+0x358/0x4a0 [ 851.438051] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 851.443231] ? __netlink_ns_capable+0x100/0x130 [ 851.447906] genl_family_rcv_msg+0x889/0x1120 [ 851.452396] ? genl_rcv+0x40/0x40 [ 851.455835] ? lock_downgrade+0x8e0/0x8e0 [ 851.459969] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 851.464975] ? kasan_check_read+0x11/0x20 [ 851.469113] ? lock_acquire+0x1dc/0x520 [ 851.473073] ? genl_rcv+0x19/0x40 [ 851.476522] genl_rcv_msg+0xc6/0x170 [ 851.480236] netlink_rcv_skb+0x172/0x440 [ 851.484297] ? genl_family_rcv_msg+0x1120/0x1120 [ 851.489042] ? netlink_ack+0xbc0/0xbc0 [ 851.492916] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 851.498093] ? netlink_skb_destructor+0x210/0x210 [ 851.502926] genl_rcv+0x28/0x40 [ 851.506195] netlink_unicast+0x58b/0x740 [ 851.510244] ? netlink_attachskb+0x970/0x970 [ 851.514648] ? import_iovec+0x24b/0x420 [ 851.518612] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 851.523622] ? security_netlink_send+0x88/0xb0 [ 851.528193] netlink_sendmsg+0x9f0/0xfa0 [ 851.532243] ? netlink_unicast+0x740/0x740 [ 851.536464] ? security_socket_sendmsg+0x94/0xc0 [ 851.541204] ? netlink_unicast+0x740/0x740 [ 851.545426] sock_sendmsg+0xd5/0x120 [ 851.549133] ___sys_sendmsg+0x805/0x940 [ 851.553097] ? copy_msghdr_from_user+0x560/0x560 [ 851.557846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 851.563368] ? proc_fail_nth_write+0x96/0x1f0 [ 851.567850] ? __fget_light+0x2ef/0x430 [ 851.571817] ? fget_raw+0x20/0x20 [ 851.575263] ? find_held_lock+0x36/0x1c0 [ 851.579330] ? kasan_check_write+0x14/0x20 [ 851.583996] ? wait_for_completion+0x870/0x870 [ 851.589974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.595499] ? sockfd_lookup_light+0xc5/0x160 [ 851.599992] __sys_sendmsg+0x115/0x270 [ 851.603876] ? __ia32_sys_shutdown+0x80/0x80 [ 851.608271] ? __sb_end_write+0xac/0xe0 [ 851.612254] ? fput+0x130/0x1a0 [ 851.615521] ? ksys_write+0x1a6/0x250 [ 851.619312] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 851.624152] __x64_sys_sendmsg+0x78/0xb0 [ 851.628211] do_syscall_64+0x1b1/0x800 [ 851.632087] ? finish_task_switch+0x1ca/0x840 [ 851.636575] ? syscall_return_slowpath+0x5c0/0x5c0 [ 851.641503] ? syscall_return_slowpath+0x30f/0x5c0 [ 851.646424] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 851.651777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 851.656633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.661902] RIP: 0033:0x455a09 [ 851.665074] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.672772] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 851.680031] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 851.687284] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 851.694536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 851.701977] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000017 08:45:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x400000000000000]}}, 0x1c) 08:45:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfeffffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:52 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000003400000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:52 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 851.801325] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x500000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:52 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) [ 851.843534] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:52 executing program 0 (fault-call:3 fault-nth:24): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 851.916981] IPVS: ftp: loaded support on port[0] = 21 08:45:52 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000d0100"}, 0x2c) 08:45:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000001000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 852.030216] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 852.049484] FAULT_INJECTION: forcing a failure. [ 852.049484] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 852.061347] CPU: 1 PID: 27246 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 852.068636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.077991] Call Trace: [ 852.080598] dump_stack+0x1b9/0x294 [ 852.084237] ? dump_stack_print_info.cold.2+0x52/0x52 [ 852.089432] ? graph_lock+0x170/0x170 [ 852.093239] ? find_held_lock+0x36/0x1c0 [ 852.097316] should_fail.cold.4+0xa/0x1a [ 852.101390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 852.106517] ? debug_check_no_locks_freed+0x310/0x310 [ 852.111734] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 852.117298] ? lock_release+0xa10/0xa10 [ 852.121297] ? check_same_owner+0x320/0x320 [ 852.125656] ? __might_sleep+0x95/0x190 [ 852.129672] ? kasan_check_write+0x14/0x20 [ 852.133960] ? __mutex_lock+0x7d9/0x17f0 [ 852.138071] ? graph_lock+0x170/0x170 [ 852.142042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 852.147643] ? should_fail+0x21b/0xbcd [ 852.151597] __alloc_pages_nodemask+0x34e/0xd70 [ 852.156320] ? __alloc_pages_slowpath+0x2db0/0x2db0 [ 852.161401] ? find_held_lock+0x36/0x1c0 [ 852.165534] ? __lock_is_held+0xb5/0x140 [ 852.169776] ? check_same_owner+0x320/0x320 [ 852.174149] ? kasan_check_write+0x14/0x20 [ 852.178412] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 852.183358] cache_grow_begin+0x6e/0x6c0 [ 852.187440] kmem_cache_alloc+0x689/0x760 [ 852.191595] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 852.196536] __kernfs_new_node+0xe7/0x580 [ 852.200686] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 852.205440] ? mutex_unlock+0xd/0x10 [ 852.209160] ? kernfs_activate+0x20e/0x2a0 [ 852.213397] ? kernfs_walk_and_get_ns+0x320/0x320 [ 852.218246] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 852.223790] ? kernfs_link_sibling+0x1d2/0x3b0 [ 852.228377] kernfs_new_node+0x80/0xf0 [ 852.232266] __kernfs_create_file+0x4d/0x330 [ 852.236677] sysfs_add_file_mode_ns+0x21a/0x560 [ 852.241346] sysfs_add_file+0x4e/0x60 [ 852.245148] sysfs_merge_group+0xfa/0x230 [ 852.249308] dpm_sysfs_add+0x161/0x210 [ 852.253196] device_add+0xa11/0x16d0 [ 852.256914] ? device_private_init+0x230/0x230 [ 852.261490] ? kfree+0x1e9/0x260 [ 852.264859] ? kfree_const+0x5e/0x70 [ 852.268582] device_create_groups_vargs+0x1ff/0x270 [ 852.273607] device_create+0xd3/0x100 [ 852.277409] ? device_create_vargs+0x60/0x60 [ 852.281825] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 852.286928] ? trace_hardirqs_on+0xd/0x10 [ 852.291097] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 852.296470] ? graph_lock+0x170/0x170 [ 852.300282] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 852.306528] ? lock_release+0xa10/0xa10 [ 852.310503] ? check_same_owner+0x320/0x320 [ 852.314826] ? rcu_note_context_switch+0x710/0x710 [ 852.319754] ? __lock_acquire+0x7f5/0x5140 [ 852.323990] ? __might_sleep+0x95/0x190 [ 852.327966] ? kasan_check_write+0x14/0x20 [ 852.332199] ? __mutex_lock+0x7d9/0x17f0 [ 852.336257] ? genl_rcv_msg+0x13a/0x170 [ 852.340230] ? __lock_acquire+0x7f5/0x5140 [ 852.344468] ? mutex_trylock+0x2a0/0x2a0 [ 852.348568] ? graph_lock+0x170/0x170 [ 852.352370] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 852.357566] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 852.362590] ? validate_nla+0x2d9/0x7b0 [ 852.366591] hwsim_new_radio_nl+0x7b8/0xa60 [ 852.370944] ? nla_parse+0x358/0x4a0 [ 852.374672] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 852.379876] ? __netlink_ns_capable+0x100/0x130 [ 852.384559] genl_family_rcv_msg+0x889/0x1120 [ 852.389061] ? genl_rcv+0x40/0x40 [ 852.392534] ? lock_downgrade+0x8e0/0x8e0 [ 852.396690] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 852.401715] ? kasan_check_read+0x11/0x20 [ 852.405865] ? lock_acquire+0x1dc/0x520 [ 852.409836] ? genl_rcv+0x19/0x40 [ 852.413301] genl_rcv_msg+0xc6/0x170 [ 852.417016] netlink_rcv_skb+0x172/0x440 [ 852.421077] ? genl_family_rcv_msg+0x1120/0x1120 [ 852.425832] ? netlink_ack+0xbc0/0xbc0 [ 852.429718] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 852.435547] ? netlink_skb_destructor+0x210/0x210 [ 852.440407] genl_rcv+0x28/0x40 [ 852.443689] netlink_unicast+0x58b/0x740 [ 852.447752] ? netlink_attachskb+0x970/0x970 [ 852.452162] ? import_iovec+0x24b/0x420 [ 852.456139] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 852.461154] ? security_netlink_send+0x88/0xb0 [ 852.465736] netlink_sendmsg+0x9f0/0xfa0 [ 852.469804] ? netlink_unicast+0x740/0x740 [ 852.474044] ? security_socket_sendmsg+0x94/0xc0 [ 852.478799] ? netlink_unicast+0x740/0x740 [ 852.483034] sock_sendmsg+0xd5/0x120 [ 852.486749] ___sys_sendmsg+0x805/0x940 [ 852.490726] ? copy_msghdr_from_user+0x560/0x560 [ 852.495490] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 852.501027] ? proc_fail_nth_write+0x96/0x1f0 [ 852.505526] ? __fget_light+0x2ef/0x430 [ 852.509518] ? fget_raw+0x20/0x20 [ 852.512975] ? find_held_lock+0x36/0x1c0 [ 852.517038] ? kasan_check_write+0x14/0x20 [ 852.521280] ? wait_for_completion+0x870/0x870 [ 852.525888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 852.531428] ? sockfd_lookup_light+0xc5/0x160 [ 852.535927] __sys_sendmsg+0x115/0x270 [ 852.539815] ? __ia32_sys_shutdown+0x80/0x80 [ 852.544243] ? __sb_end_write+0xac/0xe0 [ 852.548218] ? fput+0x130/0x1a0 [ 852.551497] ? ksys_write+0x1a6/0x250 [ 852.555312] __x64_sys_sendmsg+0x78/0xb0 [ 852.559376] do_syscall_64+0x1b1/0x800 [ 852.563264] ? syscall_return_slowpath+0x5c0/0x5c0 [ 852.568193] ? syscall_return_slowpath+0x30f/0x5c0 [ 852.573126] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 852.578497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 852.583344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 852.588527] RIP: 0033:0x455a09 [ 852.591712] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 852.599424] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 852.606690] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 852.613955] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 852.621223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 852.628489] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000018 08:45:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:55 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) 08:45:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x300000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x10]}}, 0x1c) 08:45:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000034000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:55 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x2c) 08:45:55 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572001d00"}, &(0x7f0000000140)=0x44) 08:45:55 executing program 0 (fault-call:3 fault-nth:25): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfc000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 854.972809] FAULT_INJECTION: forcing a failure. [ 854.972809] name failslab, interval 1, probability 0, space 0, times 0 [ 854.984321] CPU: 0 PID: 27272 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 854.991613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.000972] Call Trace: [ 855.003578] dump_stack+0x1b9/0x294 [ 855.007219] ? dump_stack_print_info.cold.2+0x52/0x52 [ 855.012425] ? __mutex_lock+0x7d9/0x17f0 [ 855.016508] should_fail.cold.4+0xa/0x1a 08:45:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd1]}}, 0x1c) 08:45:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xffffffffffffffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 855.020586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 855.025701] ? kasan_kmalloc+0xc4/0xe0 [ 855.029606] ? graph_lock+0x170/0x170 [ 855.033428] ? find_held_lock+0x36/0x1c0 [ 855.037508] ? __lock_is_held+0xb5/0x140 [ 855.041597] ? check_same_owner+0x320/0x320 [ 855.045932] ? kasan_check_write+0x14/0x20 [ 855.050183] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 855.055127] ? rcu_note_context_switch+0x710/0x710 [ 855.060073] __should_failslab+0x124/0x180 [ 855.064319] should_failslab+0x9/0x14 [ 855.068137] kmem_cache_alloc+0x2af/0x760 08:45:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x20000e000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 855.072301] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 855.077254] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 855.082288] __kernfs_new_node+0xe7/0x580 [ 855.086584] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 855.091377] ? mutex_unlock+0xd/0x10 [ 855.095108] ? kernfs_activate+0x20e/0x2a0 [ 855.099357] ? kernfs_walk_and_get_ns+0x320/0x320 [ 855.104212] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 855.109762] ? kernfs_link_sibling+0x1d2/0x3b0 [ 855.114365] kernfs_new_node+0x80/0xf0 [ 855.118269] __kernfs_create_file+0x4d/0x330 [ 855.122730] sysfs_add_file_mode_ns+0x21a/0x560 [ 855.127420] sysfs_add_file+0x4e/0x60 [ 855.131234] sysfs_merge_group+0xfa/0x230 [ 855.135399] dpm_sysfs_add+0x161/0x210 [ 855.139300] device_add+0xa11/0x16d0 [ 855.143038] ? device_private_init+0x230/0x230 [ 855.147631] ? kfree+0x1e9/0x260 [ 855.151013] ? kfree_const+0x5e/0x70 [ 855.154751] device_create_groups_vargs+0x1ff/0x270 [ 855.159781] device_create+0xd3/0x100 [ 855.163613] ? device_create_vargs+0x60/0x60 [ 855.168036] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 855.173150] ? trace_hardirqs_on+0xd/0x10 [ 855.177307] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 855.182242] ? graph_lock+0x170/0x170 [ 855.185478] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 855.186056] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 855.186075] ? lock_release+0xa10/0xa10 [ 855.201799] ? check_same_owner+0x320/0x320 [ 855.206141] ? rcu_note_context_switch+0x710/0x710 [ 855.214899] ? __lock_acquire+0x7f5/0x5140 [ 855.219148] ? __might_sleep+0x95/0x190 [ 855.223163] ? kasan_check_write+0x14/0x20 [ 855.227408] ? __mutex_lock+0x7d9/0x17f0 [ 855.231478] ? genl_rcv_msg+0x13a/0x170 [ 855.235464] ? __lock_acquire+0x7f5/0x5140 [ 855.239709] ? mutex_trylock+0x2a0/0x2a0 [ 855.243776] ? graph_lock+0x170/0x170 [ 855.247585] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 855.252783] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 855.257816] ? validate_nla+0x2d9/0x7b0 [ 855.261801] hwsim_new_radio_nl+0x7b8/0xa60 [ 855.266289] ? nla_parse+0x358/0x4a0 [ 855.270016] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 855.275220] ? __netlink_ns_capable+0x100/0x130 [ 855.279902] genl_family_rcv_msg+0x889/0x1120 [ 855.284409] ? genl_rcv+0x40/0x40 [ 855.287873] ? lock_downgrade+0x8e0/0x8e0 [ 855.287998] IPVS: ftp: loaded support on port[0] = 21 [ 855.292033] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 855.292057] ? kasan_check_read+0x11/0x20 [ 855.292076] ? lock_acquire+0x1dc/0x520 [ 855.292087] ? genl_rcv+0x19/0x40 [ 855.292110] genl_rcv_msg+0xc6/0x170 [ 855.317639] netlink_rcv_skb+0x172/0x440 [ 855.321712] ? genl_family_rcv_msg+0x1120/0x1120 [ 855.326481] ? netlink_ack+0xbc0/0xbc0 [ 855.330382] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 855.335582] ? netlink_skb_destructor+0x210/0x210 [ 855.340439] genl_rcv+0x28/0x40 [ 855.343729] netlink_unicast+0x58b/0x740 [ 855.347808] ? netlink_attachskb+0x970/0x970 [ 855.352242] ? import_iovec+0x24b/0x420 [ 855.356233] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 855.361261] ? security_netlink_send+0x88/0xb0 [ 855.365852] netlink_sendmsg+0x9f0/0xfa0 [ 855.369927] ? netlink_unicast+0x740/0x740 [ 855.374176] ? security_socket_sendmsg+0x94/0xc0 [ 855.378941] ? netlink_unicast+0x740/0x740 [ 855.383185] sock_sendmsg+0xd5/0x120 [ 855.386910] ___sys_sendmsg+0x805/0x940 [ 855.390458] IPVS: ftp: loaded support on port[0] = 21 [ 855.390896] ? copy_msghdr_from_user+0x560/0x560 [ 855.400839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 855.406413] ? proc_fail_nth_write+0x96/0x1f0 [ 855.410918] ? __fget_light+0x2ef/0x430 [ 855.414917] ? fget_raw+0x20/0x20 [ 855.418641] ? find_held_lock+0x36/0x1c0 [ 855.422718] ? kasan_check_write+0x14/0x20 [ 855.426968] ? wait_for_completion+0x870/0x870 [ 855.431569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 855.437110] ? sockfd_lookup_light+0xc5/0x160 [ 855.441629] __sys_sendmsg+0x115/0x270 [ 855.445529] ? __ia32_sys_shutdown+0x80/0x80 [ 855.449950] ? __sb_end_write+0xac/0xe0 [ 855.453937] ? fput+0x130/0x1a0 [ 855.457224] ? ksys_write+0x1a6/0x250 [ 855.461047] __x64_sys_sendmsg+0x78/0xb0 [ 855.465122] do_syscall_64+0x1b1/0x800 [ 855.469018] ? finish_task_switch+0x1ca/0x840 [ 855.473610] ? syscall_return_slowpath+0x5c0/0x5c0 [ 855.478549] ? syscall_return_slowpath+0x30f/0x5c0 [ 855.483493] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 855.488878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 855.493740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 855.498969] RIP: 0033:0x455a09 [ 855.502166] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 855.510495] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 855.517778] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 08:45:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd0]}}, 0x1c) 08:45:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x4000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:55 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:55 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:45:55 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000000400"}, 0x2c) 08:45:55 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000008000"}, &(0x7f0000000140)=0x44) 08:45:55 executing program 0 (fault-call:3 fault-nth:26): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:55 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000002000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 855.525068] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 855.532359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 855.539617] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000019 [ 855.582507] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 855.611960] IPVS: ftp: loaded support on port[0] = 21 [ 855.639517] FAULT_INJECTION: forcing a failure. [ 855.639517] name failslab, interval 1, probability 0, space 0, times 0 [ 855.650878] CPU: 1 PID: 27330 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 855.658161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.667524] Call Trace: [ 855.670123] dump_stack+0x1b9/0x294 [ 855.673769] ? dump_stack_print_info.cold.2+0x52/0x52 [ 855.678983] ? mutex_trylock+0x2a0/0x2a0 [ 855.683104] should_fail.cold.4+0xa/0x1a [ 855.687186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 855.692309] ? graph_lock+0x170/0x170 [ 855.696121] ? lock_downgrade+0x8e0/0x8e0 [ 855.700289] ? kasan_check_write+0x14/0x20 [ 855.704539] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 855.709481] ? find_held_lock+0x36/0x1c0 [ 855.713558] ? __lock_is_held+0xb5/0x140 [ 855.717645] ? check_same_owner+0x320/0x320 [ 855.721988] ? rcu_note_context_switch+0x710/0x710 [ 855.726937] __should_failslab+0x124/0x180 [ 855.731180] should_failslab+0x9/0x14 [ 855.734996] kmem_cache_alloc_trace+0x2cb/0x780 08:45:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x801004d100000000]}}, 0x1c) 08:45:56 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x4000000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b0000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 855.739683] ? device_create_file+0x1e0/0x1e0 [ 855.744278] kobject_uevent_env+0x20f/0x1110 [ 855.748707] ? device_pm_add+0x221/0x340 [ 855.752791] kobject_uevent+0x1f/0x30 [ 855.756604] device_add+0xb01/0x16d0 [ 855.760335] ? device_private_init+0x230/0x230 [ 855.764933] ? kfree+0x1e9/0x260 [ 855.768314] ? kfree_const+0x5e/0x70 [ 855.770112] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 855.772042] device_create_groups_vargs+0x1ff/0x270 08:45:56 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00h\x00'}, 0x2c) [ 855.772062] device_create+0xd3/0x100 [ 855.772080] ? device_create_vargs+0x60/0x60 [ 855.795256] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 855.800378] ? trace_hardirqs_on+0xd/0x10 [ 855.804543] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 855.809483] ? graph_lock+0x170/0x170 [ 855.813306] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 855.819463] ? lock_release+0xa10/0xa10 [ 855.823447] ? check_same_owner+0x320/0x320 [ 855.827786] ? rcu_note_context_switch+0x710/0x710 [ 855.832724] ? __lock_acquire+0x7f5/0x5140 08:45:56 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 855.836978] ? __might_sleep+0x95/0x190 [ 855.840965] ? kasan_check_write+0x14/0x20 [ 855.845212] ? __mutex_lock+0x7d9/0x17f0 [ 855.849289] ? genl_rcv_msg+0x13a/0x170 [ 855.853280] ? __lock_acquire+0x7f5/0x5140 [ 855.857527] ? mutex_trylock+0x2a0/0x2a0 [ 855.861603] ? graph_lock+0x170/0x170 [ 855.865419] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 855.870624] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 855.875649] ? validate_nla+0x2d9/0x7b0 [ 855.879642] hwsim_new_radio_nl+0x7b8/0xa60 [ 855.883968] ? nla_parse+0x358/0x4a0 [ 855.887695] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 855.890094] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 855.892897] ? __netlink_ns_capable+0x100/0x130 [ 855.892918] genl_family_rcv_msg+0x889/0x1120 [ 855.892938] ? genl_rcv+0x40/0x40 [ 855.892955] ? lock_downgrade+0x8e0/0x8e0 [ 855.892972] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 855.892992] ? kasan_check_read+0x11/0x20 [ 855.893017] ? lock_acquire+0x1dc/0x520 [ 855.928765] ? genl_rcv+0x19/0x40 [ 855.932243] genl_rcv_msg+0xc6/0x170 [ 855.935978] netlink_rcv_skb+0x172/0x440 [ 855.940051] ? genl_family_rcv_msg+0x1120/0x1120 [ 855.944822] ? netlink_ack+0xbc0/0xbc0 [ 855.948724] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 855.953929] ? netlink_skb_destructor+0x210/0x210 [ 855.958790] genl_rcv+0x28/0x40 [ 855.962077] netlink_unicast+0x58b/0x740 [ 855.966148] ? netlink_attachskb+0x970/0x970 [ 855.970563] ? import_iovec+0x24b/0x420 [ 855.974550] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 855.979573] ? security_netlink_send+0x88/0xb0 [ 855.980730] IPVS: ftp: loaded support on port[0] = 21 [ 855.984161] netlink_sendmsg+0x9f0/0xfa0 [ 855.984182] ? netlink_unicast+0x740/0x740 [ 855.984203] ? security_socket_sendmsg+0x94/0xc0 [ 855.984216] ? netlink_unicast+0x740/0x740 [ 855.984233] sock_sendmsg+0xd5/0x120 [ 855.984252] ___sys_sendmsg+0x805/0x940 [ 855.984269] ? copy_msghdr_from_user+0x560/0x560 [ 855.984292] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 856.024810] ? proc_fail_nth_write+0x96/0x1f0 [ 856.029328] ? __fget_light+0x2ef/0x430 [ 856.033313] ? fget_raw+0x20/0x20 [ 856.036776] ? find_held_lock+0x36/0x1c0 [ 856.040851] ? kasan_check_write+0x14/0x20 [ 856.045102] ? wait_for_completion+0x870/0x870 [ 856.049699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 856.055251] ? sockfd_lookup_light+0xc5/0x160 [ 856.059933] __sys_sendmsg+0x115/0x270 [ 856.063833] ? __ia32_sys_shutdown+0x80/0x80 [ 856.068254] ? __sb_end_write+0xac/0xe0 [ 856.072264] ? fput+0x130/0x1a0 [ 856.075555] ? ksys_write+0x1a6/0x250 [ 856.079381] __x64_sys_sendmsg+0x78/0xb0 [ 856.083627] do_syscall_64+0x1b1/0x800 [ 856.087520] ? finish_task_switch+0x1ca/0x840 [ 856.092023] ? syscall_return_slowpath+0x5c0/0x5c0 [ 856.096975] ? syscall_return_slowpath+0x30f/0x5c0 [ 856.101923] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 856.107315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 856.112204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.117416] RIP: 0033:0x455a09 [ 856.120607] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.128322] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 08:45:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3a00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 856.135598] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 856.142880] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 856.150164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 856.157446] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001a 08:45:56 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000048f00"}, 0x2c) 08:45:56 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000000000000000007fffffff000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1802000000000000]}}, 0x1c) 08:45:56 executing program 0 (fault-call:3 fault-nth:27): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:56 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000000022900"}, &(0x7f0000000140)=0x44) 08:45:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x7000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 856.293183] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 856.312262] IPVS: ftp: loaded support on port[0] = 21 [ 856.313869] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 856.336422] FAULT_INJECTION: forcing a failure. 08:45:56 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 856.336422] name failslab, interval 1, probability 0, space 0, times 0 [ 856.347799] CPU: 1 PID: 27381 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 856.355086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 856.364452] Call Trace: [ 856.367058] dump_stack+0x1b9/0x294 [ 856.370703] ? dump_stack_print_info.cold.2+0x52/0x52 [ 856.375909] ? kernel_text_address+0x79/0xf0 [ 856.380341] ? __unwind_start+0x166/0x330 [ 856.384507] ? __kernel_text_address+0xd/0x40 [ 856.389024] should_fail.cold.4+0xa/0x1a [ 856.393105] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 856.398236] ? save_stack+0xa9/0xd0 [ 856.401885] ? graph_lock+0x170/0x170 [ 856.405699] ? kasan_kmalloc+0xc4/0xe0 [ 856.409609] ? kmem_cache_alloc_trace+0x152/0x780 [ 856.414471] ? kobject_uevent_env+0x20f/0x1110 [ 856.419068] ? kobject_uevent+0x1f/0x30 [ 856.423055] ? device_add+0xb01/0x16d0 [ 856.426957] ? device_create_groups_vargs+0x1ff/0x270 [ 856.432162] ? find_held_lock+0x36/0x1c0 [ 856.436247] ? __lock_is_held+0xb5/0x140 08:45:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x500, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 856.440333] ? check_same_owner+0x320/0x320 [ 856.444671] ? rcu_note_context_switch+0x710/0x710 [ 856.449624] __should_failslab+0x124/0x180 [ 856.453875] should_failslab+0x9/0x14 [ 856.457689] __kmalloc+0x2c8/0x760 [ 856.461250] ? kobject_uevent_env+0x20f/0x1110 [ 856.465848] ? rcu_read_lock_sched_held+0x108/0x120 [ 856.470879] ? kobject_get_path+0xc2/0x1a0 [ 856.475130] kobject_get_path+0xc2/0x1a0 [ 856.479216] kobject_uevent_env+0x234/0x1110 [ 856.483635] ? device_pm_add+0x221/0x340 [ 856.487720] kobject_uevent+0x1f/0x30 08:45:56 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 856.491535] device_add+0xb01/0x16d0 [ 856.495270] ? device_private_init+0x230/0x230 [ 856.499867] ? kfree+0x1e9/0x260 [ 856.503250] ? kfree_const+0x5e/0x70 [ 856.506987] device_create_groups_vargs+0x1ff/0x270 [ 856.512036] device_create+0xd3/0x100 [ 856.515881] ? device_create_vargs+0x60/0x60 [ 856.520308] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 856.525420] ? trace_hardirqs_on+0xd/0x10 [ 856.529593] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 856.534539] ? graph_lock+0x170/0x170 [ 856.538363] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 856.544530] ? lock_release+0xa10/0xa10 [ 856.548527] ? check_same_owner+0x320/0x320 [ 856.552873] ? rcu_note_context_switch+0x710/0x710 [ 856.557826] ? __lock_acquire+0x7f5/0x5140 [ 856.562082] ? __might_sleep+0x95/0x190 [ 856.566076] ? kasan_check_write+0x14/0x20 [ 856.570327] ? __mutex_lock+0x7d9/0x17f0 [ 856.574407] ? genl_rcv_msg+0x13a/0x170 [ 856.578395] ? __lock_acquire+0x7f5/0x5140 [ 856.582649] ? mutex_trylock+0x2a0/0x2a0 [ 856.586726] ? graph_lock+0x170/0x170 08:45:56 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00L\x00'}, 0x2c) [ 856.590549] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 856.595771] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 856.600808] ? validate_nla+0x2d9/0x7b0 [ 856.601504] IPVS: ftp: loaded support on port[0] = 21 [ 856.604811] hwsim_new_radio_nl+0x7b8/0xa60 [ 856.604827] ? nla_parse+0x358/0x4a0 [ 856.604842] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 856.604865] ? __netlink_ns_capable+0x100/0x130 [ 856.604886] genl_family_rcv_msg+0x889/0x1120 [ 856.632456] ? genl_rcv+0x40/0x40 [ 856.635928] ? lock_downgrade+0x8e0/0x8e0 [ 856.640097] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:45:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 856.645141] ? kasan_check_read+0x11/0x20 [ 856.649312] ? lock_acquire+0x1dc/0x520 [ 856.653303] ? genl_rcv+0x19/0x40 [ 856.656795] genl_rcv_msg+0xc6/0x170 [ 856.660537] netlink_rcv_skb+0x172/0x440 [ 856.664625] ? genl_family_rcv_msg+0x1120/0x1120 [ 856.669412] ? netlink_ack+0xbc0/0xbc0 [ 856.673328] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 856.679752] ? netlink_skb_destructor+0x210/0x210 [ 856.684620] genl_rcv+0x28/0x40 [ 856.687923] netlink_unicast+0x58b/0x740 [ 856.692011] ? netlink_attachskb+0x970/0x970 [ 856.696440] ? import_iovec+0x24b/0x420 [ 856.700436] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 856.705473] ? security_netlink_send+0x88/0xb0 [ 856.710074] netlink_sendmsg+0x9f0/0xfa0 [ 856.714263] ? netlink_unicast+0x740/0x740 [ 856.718520] ? security_socket_sendmsg+0x94/0xc0 [ 856.723289] ? netlink_unicast+0x740/0x740 [ 856.727549] sock_sendmsg+0xd5/0x120 [ 856.731280] ___sys_sendmsg+0x805/0x940 [ 856.735294] ? copy_msghdr_from_user+0x560/0x560 [ 856.740123] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 856.745688] ? proc_fail_nth_write+0x96/0x1f0 [ 856.750200] ? __fget_light+0x2ef/0x430 [ 856.754190] ? fget_raw+0x20/0x20 [ 856.757650] ? find_held_lock+0x36/0x1c0 [ 856.761726] ? kasan_check_write+0x14/0x20 [ 856.765971] ? wait_for_completion+0x870/0x870 [ 856.770573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 856.776121] ? sockfd_lookup_light+0xc5/0x160 [ 856.780628] __sys_sendmsg+0x115/0x270 [ 856.784530] ? __ia32_sys_shutdown+0x80/0x80 [ 856.788951] ? __sb_end_write+0xac/0xe0 08:45:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xaa1414ac, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) [ 856.792941] ? fput+0x130/0x1a0 [ 856.796227] ? ksys_write+0x1a6/0x250 [ 856.800049] __x64_sys_sendmsg+0x78/0xb0 [ 856.804118] do_syscall_64+0x1b1/0x800 [ 856.808010] ? finish_task_switch+0x1ca/0x840 [ 856.812516] ? syscall_return_slowpath+0x5c0/0x5c0 [ 856.817459] ? syscall_return_slowpath+0x30f/0x5c0 [ 856.822408] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 856.827819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 856.832680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 856.837879] RIP: 0033:0x455a09 [ 856.841073] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 856.848798] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 856.856080] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 856.863362] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 856.870645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 856.877933] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001b [ 856.932176] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x600000000000000]}}, 0x1c) 08:45:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000200000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x33, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:57 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00c\x00'}, 0x2c) 08:45:57 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00\x00\x00\x00\x00\x00^\x00'}, &(0x7f0000000140)=0x44) 08:45:57 executing program 0 (fault-call:3 fault-nth:28): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 857.069830] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 857.084587] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 857.099009] FAULT_INJECTION: forcing a failure. [ 857.099009] name failslab, interval 1, probability 0, space 0, times 0 [ 857.110391] CPU: 1 PID: 27441 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 857.117690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.127070] Call Trace: [ 857.129678] dump_stack+0x1b9/0x294 [ 857.133335] ? dump_stack_print_info.cold.2+0x52/0x52 [ 857.138556] ? kernel_text_address+0x79/0xf0 [ 857.142987] ? __unwind_start+0x166/0x330 [ 857.147167] ? __kernel_text_address+0xd/0x40 [ 857.151700] should_fail.cold.4+0xa/0x1a [ 857.152379] IPVS: ftp: loaded support on port[0] = 21 [ 857.155788] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 857.155808] ? save_stack+0xa9/0xd0 08:45:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x1000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 857.155829] ? graph_lock+0x170/0x170 [ 857.155843] ? kasan_kmalloc+0xc4/0xe0 [ 857.155860] ? kmem_cache_alloc_trace+0x152/0x780 [ 857.155875] ? kobject_uevent_env+0x20f/0x1110 [ 857.155887] ? kobject_uevent+0x1f/0x30 [ 857.155910] ? device_add+0xb01/0x16d0 [ 857.194808] ? device_create_groups_vargs+0x1ff/0x270 [ 857.200056] ? find_held_lock+0x36/0x1c0 [ 857.204199] ? __lock_is_held+0xb5/0x140 [ 857.208340] ? check_same_owner+0x320/0x320 [ 857.212697] ? rcu_note_context_switch+0x710/0x710 [ 857.217644] __should_failslab+0x124/0x180 [ 857.221897] should_failslab+0x9/0x14 [ 857.225715] __kmalloc+0x2c8/0x760 [ 857.229275] ? kobject_uevent_env+0x20f/0x1110 [ 857.233879] ? rcu_read_lock_sched_held+0x108/0x120 [ 857.238916] ? kobject_get_path+0xc2/0x1a0 [ 857.243178] kobject_get_path+0xc2/0x1a0 [ 857.247263] kobject_uevent_env+0x234/0x1110 [ 857.251692] ? device_pm_add+0x221/0x340 [ 857.255811] kobject_uevent+0x1f/0x30 [ 857.259635] device_add+0xb01/0x16d0 [ 857.263379] ? device_private_init+0x230/0x230 08:45:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 857.267985] ? kfree+0x1e9/0x260 [ 857.271384] ? kfree_const+0x5e/0x70 [ 857.275142] device_create_groups_vargs+0x1ff/0x270 [ 857.280198] device_create+0xd3/0x100 [ 857.284022] ? device_create_vargs+0x60/0x60 [ 857.288471] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 857.293618] ? trace_hardirqs_on+0xd/0x10 [ 857.297975] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 857.302942] ? graph_lock+0x170/0x170 [ 857.306896] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 857.313076] ? lock_release+0xa10/0xa10 [ 857.317096] ? check_same_owner+0x320/0x320 [ 857.321453] ? rcu_note_context_switch+0x710/0x710 [ 857.326487] ? __lock_acquire+0x7f5/0x5140 [ 857.330747] ? __might_sleep+0x95/0x190 [ 857.334745] ? kasan_check_write+0x14/0x20 [ 857.338997] ? __mutex_lock+0x7d9/0x17f0 [ 857.343083] ? genl_rcv_msg+0x13a/0x170 [ 857.347078] ? __lock_acquire+0x7f5/0x5140 [ 857.351340] ? mutex_trylock+0x2a0/0x2a0 [ 857.355421] ? graph_lock+0x170/0x170 [ 857.359248] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 857.364472] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:45:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 857.369523] ? validate_nla+0x2d9/0x7b0 [ 857.373737] hwsim_new_radio_nl+0x7b8/0xa60 [ 857.378082] ? nla_parse+0x358/0x4a0 [ 857.381820] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 857.387405] ? __netlink_ns_capable+0x100/0x130 [ 857.392098] genl_family_rcv_msg+0x889/0x1120 [ 857.396636] ? genl_rcv+0x40/0x40 [ 857.400129] ? lock_downgrade+0x8e0/0x8e0 [ 857.404308] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 857.409372] ? kasan_check_read+0x11/0x20 [ 857.413553] ? lock_acquire+0x1dc/0x520 [ 857.417552] ? genl_rcv+0x19/0x40 08:45:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x80ffffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 857.421039] genl_rcv_msg+0xc6/0x170 [ 857.424786] netlink_rcv_skb+0x172/0x440 [ 857.428881] ? genl_family_rcv_msg+0x1120/0x1120 [ 857.433672] ? netlink_ack+0xbc0/0xbc0 [ 857.437587] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 857.442805] ? netlink_skb_destructor+0x210/0x210 [ 857.447677] genl_rcv+0x28/0x40 [ 857.450980] netlink_unicast+0x58b/0x740 [ 857.455243] ? netlink_attachskb+0x970/0x970 [ 857.459674] ? import_iovec+0x24b/0x420 [ 857.463673] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:45:57 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 857.468716] ? security_netlink_send+0x88/0xb0 [ 857.473413] netlink_sendmsg+0x9f0/0xfa0 [ 857.477509] ? netlink_unicast+0x740/0x740 [ 857.481764] ? security_socket_sendmsg+0x94/0xc0 [ 857.486545] ? netlink_unicast+0x740/0x740 [ 857.490807] sock_sendmsg+0xd5/0x120 [ 857.494550] ___sys_sendmsg+0x805/0x940 [ 857.498554] ? copy_msghdr_from_user+0x560/0x560 [ 857.503338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 857.508903] ? proc_fail_nth_write+0x96/0x1f0 [ 857.513430] ? __fget_light+0x2ef/0x430 [ 857.517440] ? fget_raw+0x20/0x20 08:45:57 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 857.520950] ? find_held_lock+0x36/0x1c0 [ 857.525055] ? kasan_check_write+0x14/0x20 [ 857.529325] ? wait_for_completion+0x870/0x870 [ 857.533963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 857.539572] ? sockfd_lookup_light+0xc5/0x160 [ 857.544152] __sys_sendmsg+0x115/0x270 [ 857.548069] ? __ia32_sys_shutdown+0x80/0x80 [ 857.552520] ? __sb_end_write+0xac/0xe0 [ 857.556564] ? fput+0x130/0x1a0 [ 857.559869] ? ksys_write+0x1a6/0x250 [ 857.563696] __x64_sys_sendmsg+0x78/0xb0 [ 857.567778] do_syscall_64+0x1b1/0x800 [ 857.571691] ? syscall_return_slowpath+0x5c0/0x5c0 [ 857.577083] ? syscall_return_slowpath+0x30f/0x5c0 [ 857.577726] IPVS: ftp: loaded support on port[0] = 21 [ 857.582033] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 857.582055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 857.582075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 857.582086] RIP: 0033:0x455a09 [ 857.582094] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 857.582107] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 08:45:58 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000300"}, 0x2c) 08:45:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000002000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 857.582120] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 857.582128] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 857.582134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 857.582141] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001c [ 857.711958] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:58 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:45:58 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000008400"}, 0x2c) 08:45:58 executing program 0 (fault-call:3 fault-nth:29): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000002000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd100000000000000]}}, 0x1c) 08:45:58 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000200"}, &(0x7f0000000140)=0x44) 08:45:58 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xc0fe, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 857.938826] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 857.947096] FAULT_INJECTION: forcing a failure. [ 857.947096] name failslab, interval 1, probability 0, space 0, times 0 [ 857.958913] CPU: 0 PID: 27490 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 857.966230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 857.975606] Call Trace: [ 857.978229] dump_stack+0x1b9/0x294 [ 857.982003] ? dump_stack_print_info.cold.2+0x52/0x52 [ 857.987242] ? __lock_acquire+0x7f5/0x5140 [ 857.991519] should_fail.cold.4+0xa/0x1a [ 857.995622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 858.000754] ? rcu_note_context_switch+0x710/0x710 [ 858.004773] IPVS: ftp: loaded support on port[0] = 21 [ 858.005741] ? graph_lock+0x170/0x170 [ 858.015458] ? __might_sleep+0x95/0x190 [ 858.019470] ? find_held_lock+0x36/0x1c0 [ 858.023561] ? __lock_is_held+0xb5/0x140 [ 858.027698] ? check_same_owner+0x320/0x320 [ 858.032052] ? graph_lock+0x170/0x170 [ 858.035882] ? device_create+0xd3/0x100 [ 858.039887] ? rcu_note_context_switch+0x710/0x710 [ 858.044855] __should_failslab+0x124/0x180 [ 858.049146] should_failslab+0x9/0x14 [ 858.051420] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 858.053026] kmem_cache_alloc_node+0x272/0x780 [ 858.053043] ? find_held_lock+0x36/0x1c0 [ 858.053065] __alloc_skb+0x111/0x780 [ 858.075848] ? skb_scrub_packet+0x580/0x580 [ 858.080203] ? kasan_check_read+0x11/0x20 [ 858.084395] ? rcu_is_watching+0x85/0x140 [ 858.088585] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 858.093805] ? netlink_has_listeners+0x2ff/0x4c0 [ 858.098596] ? netlink_tap_init_net+0x3c0/0x3c0 [ 858.103286] alloc_uevent_skb+0x89/0x220 [ 858.107359] kobject_uevent_env+0x866/0x1110 [ 858.111770] ? device_pm_add+0x221/0x340 [ 858.115842] kobject_uevent+0x1f/0x30 [ 858.119667] device_add+0xb01/0x16d0 [ 858.123413] ? device_private_init+0x230/0x230 [ 858.128192] ? kfree+0x1e9/0x260 [ 858.131573] ? kfree_const+0x5e/0x70 [ 858.135296] device_create_groups_vargs+0x1ff/0x270 [ 858.140323] device_create+0xd3/0x100 [ 858.144141] ? device_create_vargs+0x60/0x60 [ 858.148558] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 858.153673] ? trace_hardirqs_on+0xd/0x10 [ 858.157836] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 858.162775] ? graph_lock+0x170/0x170 [ 858.166597] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 858.172774] ? lock_release+0xa10/0xa10 [ 858.176757] ? check_same_owner+0x320/0x320 [ 858.181100] ? rcu_note_context_switch+0x710/0x710 [ 858.186033] ? __lock_acquire+0x7f5/0x5140 [ 858.190297] ? __might_sleep+0x95/0x190 [ 858.194328] ? kasan_check_write+0x14/0x20 [ 858.198655] ? __mutex_lock+0x7d9/0x17f0 [ 858.202783] ? genl_rcv_msg+0x13a/0x170 [ 858.206812] ? __lock_acquire+0x7f5/0x5140 [ 858.211095] ? mutex_trylock+0x2a0/0x2a0 [ 858.215207] ? graph_lock+0x170/0x170 [ 858.219038] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 858.224249] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 858.229286] ? validate_nla+0x2d9/0x7b0 [ 858.233366] hwsim_new_radio_nl+0x7b8/0xa60 [ 858.237712] ? nla_parse+0x358/0x4a0 [ 858.241437] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 858.246660] ? __netlink_ns_capable+0x100/0x130 [ 858.251350] genl_family_rcv_msg+0x889/0x1120 [ 858.256088] ? genl_rcv+0x40/0x40 [ 858.259582] ? lock_downgrade+0x8e0/0x8e0 [ 858.263740] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 858.268768] ? kasan_check_read+0x11/0x20 [ 858.272924] ? lock_acquire+0x1dc/0x520 [ 858.276900] ? genl_rcv+0x19/0x40 [ 858.280367] genl_rcv_msg+0xc6/0x170 [ 858.284087] netlink_rcv_skb+0x172/0x440 [ 858.288164] ? genl_family_rcv_msg+0x1120/0x1120 [ 858.293055] ? netlink_ack+0xbc0/0xbc0 [ 858.296962] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 858.302253] ? netlink_skb_destructor+0x210/0x210 [ 858.307125] genl_rcv+0x28/0x40 [ 858.310409] netlink_unicast+0x58b/0x740 [ 858.314708] ? netlink_attachskb+0x970/0x970 [ 858.319121] ? import_iovec+0x24b/0x420 [ 858.323108] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 858.328134] ? security_netlink_send+0x88/0xb0 [ 858.332738] netlink_sendmsg+0x9f0/0xfa0 [ 858.336814] ? netlink_unicast+0x740/0x740 [ 858.341057] ? security_socket_sendmsg+0x94/0xc0 [ 858.345849] ? netlink_unicast+0x740/0x740 [ 858.350107] sock_sendmsg+0xd5/0x120 [ 858.353827] ___sys_sendmsg+0x805/0x940 [ 858.357842] ? copy_msghdr_from_user+0x560/0x560 [ 858.362619] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 858.368167] ? proc_fail_nth_write+0x96/0x1f0 [ 858.372677] ? __fget_light+0x2ef/0x430 [ 858.376659] ? fget_raw+0x20/0x20 [ 858.380117] ? find_held_lock+0x36/0x1c0 [ 858.384189] ? kasan_check_write+0x14/0x20 [ 858.388436] ? wait_for_completion+0x870/0x870 [ 858.393031] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 858.398623] ? sockfd_lookup_light+0xc5/0x160 [ 858.403130] __sys_sendmsg+0x115/0x270 [ 858.407023] ? __ia32_sys_shutdown+0x80/0x80 [ 858.411461] ? __sb_end_write+0xac/0xe0 [ 858.415447] ? fput+0x130/0x1a0 [ 858.418736] ? ksys_write+0x1a6/0x250 [ 858.422562] __x64_sys_sendmsg+0x78/0xb0 [ 858.426641] do_syscall_64+0x1b1/0x800 [ 858.430558] ? finish_task_switch+0x1ca/0x840 [ 858.435059] ? syscall_return_slowpath+0x5c0/0x5c0 [ 858.439998] ? syscall_return_slowpath+0x30f/0x5c0 [ 858.444943] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 858.450334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 858.455191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 858.460411] RIP: 0033:0x455a09 [ 858.463606] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 858.471325] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 858.478613] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 08:45:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x20000]}}, 0x1c) 08:45:58 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:45:58 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x2c, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:45:58 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\n\x00'}, 0x2c) 08:45:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000200000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 858.485885] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 858.493259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 858.500585] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001d [ 858.567767] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:45:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:59 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:45:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000004000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 858.623410] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:45:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xffffff80, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 858.828313] IPVS: ftp: loaded support on port[0] = 21 08:45:59 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000008400"}, 0x2c) 08:45:59 executing program 0 (fault-call:3 fault-nth:30): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:45:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:45:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xffffff91]}}, 0x1c) 08:45:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000002000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:45:59 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) 08:45:59 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000003fc00"}, &(0x7f0000000140)=0x44) 08:45:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3f000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 858.998898] FAULT_INJECTION: forcing a failure. [ 858.998898] name failslab, interval 1, probability 0, space 0, times 0 [ 858.999776] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 859.010332] CPU: 0 PID: 27557 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 859.023259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.032622] Call Trace: [ 859.035234] dump_stack+0x1b9/0x294 [ 859.038889] ? dump_stack_print_info.cold.2+0x52/0x52 [ 859.044103] ? is_bpf_text_address+0xd7/0x170 08:45:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xb00000000000000]}}, 0x1c) 08:45:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x300, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 859.048647] ? kernel_text_address+0x79/0xf0 [ 859.053077] ? __unwind_start+0x166/0x330 [ 859.055127] IPVS: ftp: loaded support on port[0] = 21 [ 859.057243] should_fail.cold.4+0xa/0x1a [ 859.057262] ? __save_stack_trace+0x7e/0xd0 [ 859.057283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 859.075964] ? graph_lock+0x170/0x170 [ 859.079786] ? save_stack+0x43/0xd0 [ 859.083437] ? kasan_kmalloc+0xc4/0xe0 [ 859.087353] ? kasan_slab_alloc+0x12/0x20 [ 859.091536] ? find_held_lock+0x36/0x1c0 [ 859.095626] ? __lock_is_held+0xb5/0x140 [ 859.099828] ? check_same_owner+0x320/0x320 [ 859.104207] ? rcu_note_context_switch+0x710/0x710 [ 859.107332] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 859.109168] __should_failslab+0x124/0x180 [ 859.109185] should_failslab+0x9/0x14 [ 859.109204] kmem_cache_alloc_node_trace+0x26f/0x770 [ 859.109230] __kmalloc_node_track_caller+0x33/0x70 [ 859.109254] __kmalloc_reserve.isra.39+0x3a/0xe0 [ 859.142057] __alloc_skb+0x14d/0x780 08:45:59 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 859.145894] ? skb_scrub_packet+0x580/0x580 [ 859.150238] ? kasan_check_read+0x11/0x20 [ 859.154401] ? rcu_is_watching+0x85/0x140 [ 859.158568] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 859.163791] ? netlink_has_listeners+0x2ff/0x4c0 [ 859.168572] ? netlink_tap_init_net+0x3c0/0x3c0 [ 859.173275] alloc_uevent_skb+0x89/0x220 [ 859.177365] kobject_uevent_env+0x866/0x1110 [ 859.181793] ? device_pm_add+0x221/0x340 [ 859.185890] kobject_uevent+0x1f/0x30 [ 859.189724] device_add+0xb01/0x16d0 [ 859.193483] ? device_private_init+0x230/0x230 [ 859.198094] ? kfree+0x1e9/0x260 [ 859.201494] ? kfree_const+0x5e/0x70 [ 859.205243] device_create_groups_vargs+0x1ff/0x270 [ 859.210299] device_create+0xd3/0x100 [ 859.214116] ? device_create_vargs+0x60/0x60 [ 859.218540] ? mac80211_hwsim_new_radio+0x1a9/0x33b0 [ 859.223653] ? trace_hardirqs_on+0xd/0x10 [ 859.227818] mac80211_hwsim_new_radio+0x3c6/0x33b0 [ 859.232770] ? graph_lock+0x170/0x170 [ 859.236600] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 859.242775] ? lock_release+0xa10/0xa10 [ 859.246775] ? check_same_owner+0x320/0x320 [ 859.251131] ? rcu_note_context_switch+0x710/0x710 [ 859.256070] ? __lock_acquire+0x7f5/0x5140 [ 859.260319] ? __might_sleep+0x95/0x190 [ 859.264306] ? kasan_check_write+0x14/0x20 [ 859.268555] ? __mutex_lock+0x7d9/0x17f0 [ 859.272627] ? genl_rcv_msg+0x13a/0x170 [ 859.276615] ? __lock_acquire+0x7f5/0x5140 [ 859.280872] ? mutex_trylock+0x2a0/0x2a0 [ 859.284964] ? graph_lock+0x170/0x170 [ 859.288782] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 859.293987] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 859.299025] ? validate_nla+0x2d9/0x7b0 [ 859.303028] hwsim_new_radio_nl+0x7b8/0xa60 [ 859.307372] ? nla_parse+0x358/0x4a0 [ 859.311108] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 859.316417] ? __netlink_ns_capable+0x100/0x130 [ 859.321107] genl_family_rcv_msg+0x889/0x1120 [ 859.325673] ? genl_rcv+0x40/0x40 [ 859.329135] ? lock_downgrade+0x8e0/0x8e0 [ 859.333287] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 859.338313] ? kasan_check_read+0x11/0x20 [ 859.342476] ? lock_acquire+0x1dc/0x520 [ 859.346453] ? genl_rcv+0x19/0x40 [ 859.349935] genl_rcv_msg+0xc6/0x170 [ 859.353656] netlink_rcv_skb+0x172/0x440 [ 859.357727] ? genl_family_rcv_msg+0x1120/0x1120 [ 859.362497] ? netlink_ack+0xbc0/0xbc0 [ 859.366389] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 859.371589] ? netlink_skb_destructor+0x210/0x210 [ 859.376443] genl_rcv+0x28/0x40 [ 859.379735] netlink_unicast+0x58b/0x740 [ 859.383806] ? netlink_attachskb+0x970/0x970 [ 859.388244] ? import_iovec+0x24b/0x420 [ 859.392232] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 859.397254] ? security_netlink_send+0x88/0xb0 [ 859.401846] netlink_sendmsg+0x9f0/0xfa0 [ 859.405921] ? netlink_unicast+0x740/0x740 [ 859.410168] ? security_socket_sendmsg+0x94/0xc0 [ 859.414936] ? netlink_unicast+0x740/0x740 [ 859.419192] sock_sendmsg+0xd5/0x120 [ 859.422927] ___sys_sendmsg+0x805/0x940 [ 859.426919] ? copy_msghdr_from_user+0x560/0x560 [ 859.431702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 859.437257] ? proc_fail_nth_write+0x96/0x1f0 [ 859.441763] ? __fget_light+0x2ef/0x430 [ 859.445743] ? fget_raw+0x20/0x20 [ 859.449212] ? find_held_lock+0x36/0x1c0 [ 859.453269] ? kasan_check_write+0x14/0x20 [ 859.457576] ? wait_for_completion+0x870/0x870 [ 859.462173] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 859.467737] ? sockfd_lookup_light+0xc5/0x160 [ 859.472232] __sys_sendmsg+0x115/0x270 [ 859.476168] ? __ia32_sys_shutdown+0x80/0x80 [ 859.480577] ? __sb_end_write+0xac/0xe0 [ 859.484575] ? fput+0x130/0x1a0 [ 859.487860] ? ksys_write+0x1a6/0x250 [ 859.491670] __x64_sys_sendmsg+0x78/0xb0 [ 859.495750] do_syscall_64+0x1b1/0x800 [ 859.499636] ? finish_task_switch+0x1ca/0x840 [ 859.504131] ? syscall_return_slowpath+0x5c0/0x5c0 [ 859.509089] ? syscall_return_slowpath+0x30f/0x5c0 [ 859.514047] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 859.519440] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 859.524316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 859.529534] RIP: 0033:0x455a09 [ 859.532734] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 859.540432] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 859.547698] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 859.554961] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 859.562223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 859.569493] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001e [ 859.760152] IPVS: ftp: loaded support on port[0] = 21 08:46:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa20c8925]}}, 0x1c) 08:46:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:46:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000000200000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x400000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00z\x00'}, 0x2c) 08:46:00 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720001d000"}, &(0x7f0000000140)=0x44) 08:46:00 executing program 0 (fault-call:3 fault-nth:31): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 859.850995] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 859.852971] FAULT_INJECTION: forcing a failure. [ 859.852971] name failslab, interval 1, probability 0, space 0, times 0 [ 859.868165] CPU: 1 PID: 27607 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 859.875465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.884832] Call Trace: [ 859.887442] dump_stack+0x1b9/0x294 [ 859.891095] ? dump_stack_print_info.cold.2+0x52/0x52 [ 859.896306] ? device_add+0xbd0/0x16d0 [ 859.900230] should_fail.cold.4+0xa/0x1a [ 859.902153] IPVS: ftp: loaded support on port[0] = 21 [ 859.904306] ? graph_lock+0x170/0x170 [ 859.904331] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 859.904348] ? __lock_acquire+0x7f5/0x5140 [ 859.904367] ? mutex_trylock+0x2a0/0x2a0 [ 859.904385] ? graph_lock+0x170/0x170 [ 859.904404] ? find_held_lock+0x36/0x1c0 [ 859.934753] ? __lock_is_held+0xb5/0x140 [ 859.938852] ? check_same_owner+0x320/0x320 [ 859.943199] ? rcu_note_context_switch+0x710/0x710 08:46:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00z\x00'}, 0x2c) [ 859.948251] ? kasan_check_write+0x14/0x20 [ 859.952699] __should_failslab+0x124/0x180 [ 859.956961] should_failslab+0x9/0x14 [ 859.960812] __kmalloc_track_caller+0x2c4/0x760 [ 859.965523] ? graph_lock+0x170/0x170 [ 859.969345] ? kasan_check_write+0x14/0x20 [ 859.973604] ? do_raw_spin_lock+0xc1/0x200 [ 859.977900] ? kstrdup_const+0x66/0x80 [ 859.981839] kstrdup+0x39/0x70 [ 859.985058] kstrdup_const+0x66/0x80 [ 859.988793] __kernfs_new_node+0xa8/0x580 [ 859.992964] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 859.997744] ? lock_downgrade+0x8e0/0x8e0 08:46:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x91ffffff]}}, 0x1c) 08:46:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 860.001926] ? kasan_check_read+0x11/0x20 [ 860.006121] ? do_raw_spin_unlock+0x9e/0x2e0 [ 860.010550] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 860.015155] kernfs_new_node+0x80/0xf0 [ 860.019067] kernfs_create_link+0x33/0x180 [ 860.023323] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 860.028636] sysfs_create_link+0x65/0xc0 [ 860.032723] driver_sysfs_add+0x107/0x2a0 [ 860.036894] device_bind_driver+0x19/0xd0 [ 860.041065] mac80211_hwsim_new_radio+0x451/0x33b0 [ 860.045416] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 860.046038] ? graph_lock+0x170/0x170 [ 860.046066] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 860.046084] ? lock_release+0xa10/0xa10 [ 860.065640] ? check_same_owner+0x320/0x320 [ 860.069992] ? rcu_note_context_switch+0x710/0x710 [ 860.074965] ? __lock_acquire+0x7f5/0x5140 [ 860.079267] ? __might_sleep+0x95/0x190 [ 860.083273] ? kasan_check_write+0x14/0x20 [ 860.087534] ? __mutex_lock+0x7d9/0x17f0 [ 860.091623] ? genl_rcv_msg+0x13a/0x170 [ 860.095622] ? __lock_acquire+0x7f5/0x5140 [ 860.099881] ? mutex_trylock+0x2a0/0x2a0 [ 860.103971] ? graph_lock+0x170/0x170 [ 860.107794] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 860.113027] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 860.118067] ? validate_nla+0x2d9/0x7b0 [ 860.120945] IPVS: ftp: loaded support on port[0] = 21 [ 860.122062] hwsim_new_radio_nl+0x7b8/0xa60 [ 860.122079] ? nla_parse+0x358/0x4a0 [ 860.122097] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 860.122120] ? __netlink_ns_capable+0x100/0x130 [ 860.122139] genl_family_rcv_msg+0x889/0x1120 08:46:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3300000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 860.122157] ? genl_rcv+0x40/0x40 [ 860.122172] ? lock_downgrade+0x8e0/0x8e0 [ 860.122187] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 860.122209] ? kasan_check_read+0x11/0x20 [ 860.166609] ? lock_acquire+0x1dc/0x520 [ 860.170605] ? genl_rcv+0x19/0x40 [ 860.174095] genl_rcv_msg+0xc6/0x170 [ 860.177829] netlink_rcv_skb+0x172/0x440 [ 860.181915] ? genl_family_rcv_msg+0x1120/0x1120 [ 860.186692] ? netlink_ack+0xbc0/0xbc0 [ 860.190603] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 860.195825] ? netlink_skb_destructor+0x210/0x210 [ 860.200701] genl_rcv+0x28/0x40 [ 860.203999] netlink_unicast+0x58b/0x740 [ 860.208088] ? netlink_attachskb+0x970/0x970 [ 860.212517] ? import_iovec+0x24b/0x420 [ 860.216514] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 860.221548] ? security_netlink_send+0x88/0xb0 [ 860.226147] netlink_sendmsg+0x9f0/0xfa0 [ 860.230232] ? netlink_unicast+0x740/0x740 [ 860.234493] ? security_socket_sendmsg+0x94/0xc0 [ 860.239258] ? netlink_unicast+0x740/0x740 [ 860.243509] sock_sendmsg+0xd5/0x120 [ 860.247241] ___sys_sendmsg+0x805/0x940 [ 860.251235] ? copy_msghdr_from_user+0x560/0x560 [ 860.256022] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 860.261584] ? proc_fail_nth_write+0x96/0x1f0 [ 860.266100] ? __fget_light+0x2ef/0x430 [ 860.270097] ? fget_raw+0x20/0x20 [ 860.273568] ? find_held_lock+0x36/0x1c0 [ 860.277655] ? kasan_check_write+0x14/0x20 [ 860.281927] ? wait_for_completion+0x870/0x870 [ 860.286543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 860.292102] ? sockfd_lookup_light+0xc5/0x160 [ 860.296621] __sys_sendmsg+0x115/0x270 [ 860.300538] ? __ia32_sys_shutdown+0x80/0x80 [ 860.304969] ? __sb_end_write+0xac/0xe0 [ 860.309495] ? fput+0x130/0x1a0 [ 860.312792] ? ksys_write+0x1a6/0x250 [ 860.316621] __x64_sys_sendmsg+0x78/0xb0 [ 860.320700] do_syscall_64+0x1b1/0x800 [ 860.324602] ? finish_task_switch+0x1ca/0x840 [ 860.329118] ? syscall_return_slowpath+0x5c0/0x5c0 [ 860.334069] ? syscall_return_slowpath+0x30f/0x5c0 [ 860.336366] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 860.339014] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 860.339037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 860.339055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 860.364541] RIP: 0033:0x455a09 [ 860.367742] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 860.375466] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 860.382750] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 860.390036] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 08:46:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:46:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1100000000000000]}}, 0x1c) 08:46:00 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000010d00"}, 0x2c) 08:46:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xffffffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:00 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000004000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:00 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 860.397321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 860.404632] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000001f [ 860.457787] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:00 executing program 0 (fault-call:3 fault-nth:32): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3300, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 860.685791] FAULT_INJECTION: forcing a failure. [ 860.685791] name failslab, interval 1, probability 0, space 0, times 0 [ 860.697201] CPU: 0 PID: 27669 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 860.704486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.713882] Call Trace: [ 860.724546] dump_stack+0x1b9/0x294 [ 860.728198] ? dump_stack_print_info.cold.2+0x52/0x52 [ 860.733395] ? __might_sleep+0x95/0x190 [ 860.737387] should_fail.cold.4+0xa/0x1a [ 860.742088] ? graph_lock+0x170/0x170 [ 860.745899] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 860.751019] ? __lock_acquire+0x7f5/0x5140 [ 860.755255] ? mutex_trylock+0x2a0/0x2a0 [ 860.759321] ? graph_lock+0x170/0x170 [ 860.763135] ? find_held_lock+0x36/0x1c0 [ 860.767200] ? __lock_is_held+0xb5/0x140 [ 860.771275] ? check_same_owner+0x320/0x320 [ 860.775601] ? rcu_note_context_switch+0x710/0x710 [ 860.780543] ? kasan_check_write+0x14/0x20 [ 860.784807] __should_failslab+0x124/0x180 [ 860.789066] should_failslab+0x9/0x14 [ 860.792885] __kmalloc_track_caller+0x2c4/0x760 [ 860.797689] ? graph_lock+0x170/0x170 [ 860.801507] ? kasan_check_write+0x14/0x20 [ 860.805761] ? do_raw_spin_lock+0xc1/0x200 [ 860.809986] ? kstrdup_const+0x66/0x80 [ 860.813866] kstrdup+0x39/0x70 [ 860.817052] kstrdup_const+0x66/0x80 [ 860.820769] __kernfs_new_node+0xa8/0x580 [ 860.824910] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 860.829659] ? lock_downgrade+0x8e0/0x8e0 [ 860.833808] ? kasan_check_read+0x11/0x20 [ 860.837965] ? do_raw_spin_unlock+0x9e/0x2e0 [ 860.842394] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 860.846975] kernfs_new_node+0x80/0xf0 [ 860.850887] kernfs_create_link+0x33/0x180 [ 860.855122] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 860.860384] sysfs_create_link+0x65/0xc0 [ 860.864431] driver_sysfs_add+0x107/0x2a0 [ 860.868564] device_bind_driver+0x19/0xd0 [ 860.872698] mac80211_hwsim_new_radio+0x451/0x33b0 [ 860.877610] ? graph_lock+0x170/0x170 [ 860.881411] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 860.887544] ? lock_release+0xa10/0xa10 [ 860.891515] ? check_same_owner+0x320/0x320 [ 860.895829] ? rcu_note_context_switch+0x710/0x710 [ 860.900759] ? __lock_acquire+0x7f5/0x5140 [ 860.904981] ? __might_sleep+0x95/0x190 [ 860.908958] ? kasan_check_write+0x14/0x20 [ 860.913186] ? __mutex_lock+0x7d9/0x17f0 [ 860.917236] ? genl_rcv_msg+0x13a/0x170 [ 860.921208] ? __lock_acquire+0x7f5/0x5140 [ 860.925449] ? mutex_trylock+0x2a0/0x2a0 [ 860.929499] ? graph_lock+0x170/0x170 [ 860.933287] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 860.938464] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 860.943467] ? validate_nla+0x2d9/0x7b0 [ 860.947428] hwsim_new_radio_nl+0x7b8/0xa60 [ 860.951734] ? nla_parse+0x358/0x4a0 [ 860.955431] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 860.960608] ? __netlink_ns_capable+0x100/0x130 [ 860.965266] genl_family_rcv_msg+0x889/0x1120 [ 860.969749] ? genl_rcv+0x40/0x40 [ 860.973194] ? lock_downgrade+0x8e0/0x8e0 [ 860.977341] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 860.982348] ? kasan_check_read+0x11/0x20 [ 860.986482] ? lock_acquire+0x1dc/0x520 [ 860.990439] ? genl_rcv+0x19/0x40 [ 860.993885] genl_rcv_msg+0xc6/0x170 [ 860.997595] netlink_rcv_skb+0x172/0x440 [ 861.001654] ? genl_family_rcv_msg+0x1120/0x1120 [ 861.006398] ? netlink_ack+0xbc0/0xbc0 [ 861.010279] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 861.015465] ? netlink_skb_destructor+0x210/0x210 [ 861.020296] genl_rcv+0x28/0x40 [ 861.023568] netlink_unicast+0x58b/0x740 [ 861.027615] ? netlink_attachskb+0x970/0x970 [ 861.032009] ? import_iovec+0x24b/0x420 [ 861.035988] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 861.040992] ? security_netlink_send+0x88/0xb0 [ 861.045565] netlink_sendmsg+0x9f0/0xfa0 [ 861.049623] ? netlink_unicast+0x740/0x740 [ 861.053856] ? security_socket_sendmsg+0x94/0xc0 [ 861.058595] ? netlink_unicast+0x740/0x740 [ 861.062822] sock_sendmsg+0xd5/0x120 [ 861.066521] ___sys_sendmsg+0x805/0x940 [ 861.070491] ? copy_msghdr_from_user+0x560/0x560 [ 861.075237] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 861.080758] ? proc_fail_nth_write+0x96/0x1f0 [ 861.085240] ? __fget_light+0x2ef/0x430 [ 861.089196] ? fget_raw+0x20/0x20 [ 861.092644] ? find_held_lock+0x36/0x1c0 [ 861.096720] ? kasan_check_write+0x14/0x20 [ 861.100945] ? wait_for_completion+0x870/0x870 [ 861.105526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 861.111050] ? sockfd_lookup_light+0xc5/0x160 [ 861.115531] __sys_sendmsg+0x115/0x270 [ 861.119405] ? __ia32_sys_shutdown+0x80/0x80 [ 861.123815] ? __sb_end_write+0xac/0xe0 [ 861.127795] ? fput+0x130/0x1a0 [ 861.131064] ? ksys_write+0x1a6/0x250 [ 861.134859] __x64_sys_sendmsg+0x78/0xb0 [ 861.138917] do_syscall_64+0x1b1/0x800 [ 861.142810] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 861.147647] ? syscall_return_slowpath+0x5c0/0x5c0 [ 861.152581] ? syscall_return_slowpath+0x30f/0x5c0 [ 861.157509] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 861.162876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 861.167715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 861.172888] RIP: 0033:0x455a09 [ 861.176160] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 08:46:01 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00z\x00'}, 0x2c) 08:46:01 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200f60300"}, &(0x7f0000000140)=0x44) 08:46:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:46:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x7, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:01 executing program 0 (fault-call:3 fault-nth:33): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x900000000000000]}}, 0x1c) 08:46:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000001000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 861.183864] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 861.191119] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 861.198373] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 861.205627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 861.212883] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000020 [ 861.260485] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 861.280544] IPVS: ftp: loaded support on port[0] = 21 [ 861.294484] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:46:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x4, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:01 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 861.333624] FAULT_INJECTION: forcing a failure. [ 861.333624] name failslab, interval 1, probability 0, space 0, times 0 [ 861.344959] CPU: 1 PID: 27691 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 861.352242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.361602] Call Trace: [ 861.364210] dump_stack+0x1b9/0x294 [ 861.367856] ? dump_stack_print_info.cold.2+0x52/0x52 [ 861.373061] ? device_add+0xbd0/0x16d0 [ 861.376971] should_fail.cold.4+0xa/0x1a 08:46:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 861.381042] ? graph_lock+0x170/0x170 [ 861.384860] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 861.389976] ? __lock_acquire+0x7f5/0x5140 [ 861.394224] ? mutex_trylock+0x2a0/0x2a0 [ 861.398331] ? graph_lock+0x170/0x170 [ 861.402153] ? find_held_lock+0x36/0x1c0 [ 861.406238] ? __lock_is_held+0xb5/0x140 [ 861.410336] ? check_same_owner+0x320/0x320 [ 861.414680] ? rcu_note_context_switch+0x710/0x710 [ 861.419627] ? kasan_check_write+0x14/0x20 [ 861.423875] __should_failslab+0x124/0x180 [ 861.428122] should_failslab+0x9/0x14 [ 861.431938] __kmalloc_track_caller+0x2c4/0x760 [ 861.436621] ? graph_lock+0x170/0x170 [ 861.440432] ? kasan_check_write+0x14/0x20 [ 861.444681] ? do_raw_spin_lock+0xc1/0x200 [ 861.448930] ? kstrdup_const+0x66/0x80 [ 861.452845] kstrdup+0x39/0x70 [ 861.456056] kstrdup_const+0x66/0x80 [ 861.459796] __kernfs_new_node+0xa8/0x580 [ 861.463981] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 861.468792] ? lock_downgrade+0x8e0/0x8e0 [ 861.472962] ? kasan_check_read+0x11/0x20 [ 861.477125] ? do_raw_spin_unlock+0x9e/0x2e0 [ 861.481548] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 861.486145] kernfs_new_node+0x80/0xf0 [ 861.490049] kernfs_create_link+0x33/0x180 [ 861.494296] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 861.499592] sysfs_create_link+0x65/0xc0 [ 861.503674] driver_sysfs_add+0x107/0x2a0 [ 861.507846] device_bind_driver+0x19/0xd0 [ 861.512130] mac80211_hwsim_new_radio+0x451/0x33b0 [ 861.517103] ? graph_lock+0x170/0x170 [ 861.520930] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 861.527097] ? lock_release+0xa10/0xa10 [ 861.531089] ? check_same_owner+0x320/0x320 [ 861.535429] ? rcu_note_context_switch+0x710/0x710 [ 861.540374] ? __lock_acquire+0x7f5/0x5140 [ 861.545452] ? __might_sleep+0x95/0x190 [ 861.549449] ? kasan_check_write+0x14/0x20 [ 861.553703] ? __mutex_lock+0x7d9/0x17f0 [ 861.557824] ? genl_rcv_msg+0x13a/0x170 [ 861.561819] ? __lock_acquire+0x7f5/0x5140 [ 861.566072] ? mutex_trylock+0x2a0/0x2a0 [ 861.570147] ? graph_lock+0x170/0x170 [ 861.573967] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 861.577336] IPVS: ftp: loaded support on port[0] = 21 [ 861.579168] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 861.579185] ? validate_nla+0x2d9/0x7b0 [ 861.579206] hwsim_new_radio_nl+0x7b8/0xa60 [ 861.579218] ? nla_parse+0x358/0x4a0 [ 861.579232] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 861.579251] ? __netlink_ns_capable+0x100/0x130 [ 861.579269] genl_family_rcv_msg+0x889/0x1120 [ 861.615837] ? genl_rcv+0x40/0x40 [ 861.619311] ? lock_downgrade+0x8e0/0x8e0 [ 861.623480] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 861.628520] ? kasan_check_read+0x11/0x20 [ 861.632687] ? lock_acquire+0x1dc/0x520 [ 861.636674] ? genl_rcv+0x19/0x40 [ 861.640151] genl_rcv_msg+0xc6/0x170 [ 861.643878] netlink_rcv_skb+0x172/0x440 [ 861.647957] ? genl_family_rcv_msg+0x1120/0x1120 [ 861.652728] ? netlink_ack+0xbc0/0xbc0 [ 861.656637] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 861.662046] ? netlink_skb_destructor+0x210/0x210 [ 861.666916] genl_rcv+0x28/0x40 [ 861.670216] netlink_unicast+0x58b/0x740 [ 861.674299] ? netlink_attachskb+0x970/0x970 [ 861.678727] ? import_iovec+0x24b/0x420 [ 861.682727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 861.687773] ? security_netlink_send+0x88/0xb0 [ 861.692378] netlink_sendmsg+0x9f0/0xfa0 [ 861.696468] ? netlink_unicast+0x740/0x740 [ 861.700721] ? security_socket_sendmsg+0x94/0xc0 [ 861.705488] ? netlink_unicast+0x740/0x740 [ 861.709739] sock_sendmsg+0xd5/0x120 [ 861.713469] ___sys_sendmsg+0x805/0x940 [ 861.717458] ? copy_msghdr_from_user+0x560/0x560 [ 861.722242] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 861.727886] ? proc_fail_nth_write+0x96/0x1f0 [ 861.732397] ? __fget_light+0x2ef/0x430 [ 861.736382] ? fget_raw+0x20/0x20 [ 861.739845] ? find_held_lock+0x36/0x1c0 [ 861.743925] ? kasan_check_write+0x14/0x20 [ 861.748177] ? wait_for_completion+0x870/0x870 [ 861.752787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 861.758338] ? sockfd_lookup_light+0xc5/0x160 [ 861.762854] __sys_sendmsg+0x115/0x270 [ 861.766768] ? __ia32_sys_shutdown+0x80/0x80 [ 861.771191] ? __sb_end_write+0xac/0xe0 [ 861.775182] ? fput+0x130/0x1a0 [ 861.778469] ? ksys_write+0x1a6/0x250 [ 861.782286] __x64_sys_sendmsg+0x78/0xb0 [ 861.786362] do_syscall_64+0x1b1/0x800 [ 861.790264] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 861.795127] ? syscall_return_slowpath+0x5c0/0x5c0 [ 861.800076] ? syscall_return_slowpath+0x30f/0x5c0 [ 861.805030] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 861.810415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 861.815280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 861.820477] RIP: 0033:0x455a09 [ 861.823670] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 861.831390] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 861.838676] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 861.845952] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 861.853227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 861.860505] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000021 08:46:02 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00 \x00'}, 0x2c) 08:46:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x5, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xaaaa000000000000]}}, 0x1c) 08:46:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:46:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000034000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:02 executing program 0 (fault-call:3 fault-nth:34): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:02 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200fe0300"}, &(0x7f0000000140)=0x44) [ 861.947805] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 861.965847] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 861.978730] IPVS: ftp: loaded support on port[0] = 21 08:46:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x8, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 862.002294] FAULT_INJECTION: forcing a failure. [ 862.002294] name failslab, interval 1, probability 0, space 0, times 0 [ 862.013841] CPU: 1 PID: 27732 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 862.021134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.030502] Call Trace: [ 862.033109] dump_stack+0x1b9/0x294 [ 862.036808] ? dump_stack_print_info.cold.2+0x52/0x52 [ 862.042023] ? finish_task_switch+0x1ca/0x840 [ 862.046541] ? finish_task_switch+0x182/0x840 [ 862.051063] should_fail.cold.4+0xa/0x1a [ 862.055149] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 862.060279] ? __schedule+0x809/0x1e30 [ 862.064189] ? kasan_check_write+0x14/0x20 [ 862.068459] ? __sched_text_start+0x8/0x8 [ 862.072620] ? find_held_lock+0x36/0x1c0 [ 862.076704] ? __lock_is_held+0xb5/0x140 [ 862.080799] ? check_same_owner+0x320/0x320 [ 862.085142] ? mark_held_locks+0xc9/0x160 [ 862.089313] __should_failslab+0x124/0x180 [ 862.093564] should_failslab+0x9/0x14 [ 862.097390] kmem_cache_alloc_trace+0x2cb/0x780 08:46:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x200000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) [ 862.102072] ? trace_hardirqs_on+0xd/0x10 [ 862.106245] ? queue_work_on+0x12c/0x1e0 [ 862.110335] ? device_create_file+0x1e0/0x1e0 [ 862.114846] kobject_uevent_env+0x20f/0x1110 [ 862.119279] ? _raw_spin_unlock_irq+0x27/0x70 [ 862.123810] kobject_uevent+0x1f/0x30 [ 862.127638] driver_bound+0x1a3/0x220 [ 862.131478] device_bind_driver+0xb3/0xd0 [ 862.135646] mac80211_hwsim_new_radio+0x451/0x33b0 [ 862.140602] ? graph_lock+0x170/0x170 [ 862.144440] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 862.150617] ? lock_release+0xa10/0xa10 [ 862.154613] ? check_same_owner+0x320/0x320 [ 862.154930] IPVS: ftp: loaded support on port[0] = 21 [ 862.158966] ? rcu_note_context_switch+0x710/0x710 [ 862.158985] ? __lock_acquire+0x7f5/0x5140 [ 862.159006] ? __might_sleep+0x95/0x190 [ 862.159028] ? kasan_check_write+0x14/0x20 [ 862.159046] ? __mutex_lock+0x7d9/0x17f0 [ 862.159063] ? genl_rcv_msg+0x13a/0x170 [ 862.159079] ? __lock_acquire+0x7f5/0x5140 [ 862.193880] ? mutex_trylock+0x2a0/0x2a0 [ 862.197955] ? graph_lock+0x170/0x170 08:46:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 862.201774] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 862.206986] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 862.212018] ? validate_nla+0x2d9/0x7b0 [ 862.216011] hwsim_new_radio_nl+0x7b8/0xa60 [ 862.220348] ? nla_parse+0x358/0x4a0 [ 862.224072] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 862.229283] ? __netlink_ns_capable+0x100/0x130 [ 862.233973] genl_family_rcv_msg+0x889/0x1120 [ 862.238492] ? genl_rcv+0x40/0x40 [ 862.241958] ? lock_downgrade+0x8e0/0x8e0 [ 862.246116] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:46:02 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00c\x00'}, 0x2c) 08:46:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfec0000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xd200000000000000]}}, 0x1c) 08:46:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 862.251149] ? kasan_check_read+0x11/0x20 [ 862.255308] ? lock_acquire+0x1dc/0x520 [ 862.259290] ? genl_rcv+0x19/0x40 [ 862.262764] genl_rcv_msg+0xc6/0x170 [ 862.266495] netlink_rcv_skb+0x172/0x440 [ 862.270571] ? genl_family_rcv_msg+0x1120/0x1120 [ 862.275341] ? netlink_ack+0xbc0/0xbc0 [ 862.279247] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 862.284457] ? netlink_skb_destructor+0x210/0x210 [ 862.289322] genl_rcv+0x28/0x40 [ 862.292641] netlink_unicast+0x58b/0x740 [ 862.296729] ? netlink_attachskb+0x970/0x970 [ 862.301156] ? import_iovec+0x24b/0x420 [ 862.305149] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 862.310176] ? security_netlink_send+0x88/0xb0 [ 862.314769] netlink_sendmsg+0x9f0/0xfa0 [ 862.318849] ? netlink_unicast+0x740/0x740 [ 862.323099] ? security_socket_sendmsg+0x94/0xc0 [ 862.327863] ? netlink_unicast+0x740/0x740 [ 862.332110] sock_sendmsg+0xd5/0x120 [ 862.335836] ___sys_sendmsg+0x805/0x940 [ 862.339828] ? copy_msghdr_from_user+0x560/0x560 [ 862.344606] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 862.350162] ? proc_fail_nth_write+0x96/0x1f0 [ 862.354678] ? __fget_light+0x2ef/0x430 [ 862.358670] ? fget_raw+0x20/0x20 [ 862.362139] ? find_held_lock+0x36/0x1c0 [ 862.364974] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 862.366221] ? kasan_check_write+0x14/0x20 [ 862.366246] ? wait_for_completion+0x870/0x870 [ 862.366273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 862.366289] ? sockfd_lookup_light+0xc5/0x160 [ 862.366305] __sys_sendmsg+0x115/0x270 [ 862.366321] ? __ia32_sys_shutdown+0x80/0x80 08:46:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x600000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 862.403507] ? __sb_end_write+0xac/0xe0 [ 862.407493] ? fput+0x130/0x1a0 [ 862.410785] ? ksys_write+0x1a6/0x250 [ 862.414653] __x64_sys_sendmsg+0x78/0xb0 [ 862.418730] do_syscall_64+0x1b1/0x800 [ 862.419650] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 862.422622] ? finish_task_switch+0x1ca/0x840 [ 862.422641] ? syscall_return_slowpath+0x5c0/0x5c0 [ 862.422657] ? syscall_return_slowpath+0x30f/0x5c0 [ 862.422676] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 862.422700] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:46:02 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 862.452871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 862.458075] RIP: 0033:0x455a09 [ 862.461269] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 862.468991] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 862.476364] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 862.483646] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 862.490947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 08:46:02 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:46:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000000040000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 862.498253] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000022 08:46:02 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200880100"}, &(0x7f0000000140)=0x44) [ 862.697763] IPVS: ftp: loaded support on port[0] = 21 [ 862.833169] IPVS: ftp: loaded support on port[0] = 21 08:46:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x7000000]}}, 0x1c) 08:46:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000ffffffff0000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x6000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:03 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00z\x00'}, &(0x7f0000000140)=0x44) 08:46:03 executing program 0 (fault-call:3 fault-nth:35): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb405000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00t\x00'}, 0x2c) 08:46:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:46:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 862.932994] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 862.949010] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x33000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000010000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:03 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) [ 863.009616] IPVS: ftp: loaded support on port[0] = 21 08:46:03 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\a\x00'}, 0x2c) 08:46:03 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 863.153731] FAULT_INJECTION: forcing a failure. [ 863.153731] name failslab, interval 1, probability 0, space 0, times 0 [ 863.165173] CPU: 0 PID: 27803 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 863.172462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.181829] Call Trace: [ 863.184433] dump_stack+0x1b9/0x294 [ 863.188086] ? dump_stack_print_info.cold.2+0x52/0x52 [ 863.193301] ? workqueue_congested+0x3b0/0x3b0 [ 863.197912] should_fail.cold.4+0xa/0x1a [ 863.202011] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 863.209800] ? _raw_spin_unlock+0x22/0x30 [ 863.213974] ? graph_lock+0x170/0x170 [ 863.217797] ? kasan_check_write+0x14/0x20 [ 863.221681] IPVS: ftp: loaded support on port[0] = 21 [ 863.222054] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 863.222074] ? find_held_lock+0x36/0x1c0 [ 863.222092] ? __lock_is_held+0xb5/0x140 [ 863.240381] ? check_same_owner+0x320/0x320 [ 863.244743] ? rcu_note_context_switch+0x710/0x710 [ 863.249689] ? mark_held_locks+0xc9/0x160 [ 863.253856] __should_failslab+0x124/0x180 [ 863.258103] should_failslab+0x9/0x14 [ 863.261924] kmem_cache_alloc_trace+0x2cb/0x780 [ 863.266612] ? trace_hardirqs_on+0xd/0x10 [ 863.270777] ? queue_work_on+0x12c/0x1e0 [ 863.274878] ? device_create_file+0x1e0/0x1e0 [ 863.279392] kobject_uevent_env+0x20f/0x1110 [ 863.283830] ? _raw_spin_unlock_irq+0x27/0x70 [ 863.288346] kobject_uevent+0x1f/0x30 [ 863.292165] driver_bound+0x1a3/0x220 [ 863.295980] device_bind_driver+0xb3/0xd0 [ 863.300149] mac80211_hwsim_new_radio+0x451/0x33b0 [ 863.305086] ? graph_lock+0x170/0x170 [ 863.308903] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 863.315068] ? lock_release+0xa10/0xa10 [ 863.319055] ? check_same_owner+0x320/0x320 [ 863.323389] ? rcu_note_context_switch+0x710/0x710 [ 863.328326] ? __lock_acquire+0x7f5/0x5140 [ 863.332578] ? __might_sleep+0x95/0x190 [ 863.336568] ? kasan_check_write+0x14/0x20 [ 863.340837] ? __mutex_lock+0x7d9/0x17f0 [ 863.344903] ? genl_rcv_msg+0x13a/0x170 [ 863.348882] ? __lock_acquire+0x7f5/0x5140 [ 863.353125] ? mutex_trylock+0x2a0/0x2a0 [ 863.357189] ? graph_lock+0x170/0x170 [ 863.360991] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 863.366185] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 863.371203] ? validate_nla+0x2d9/0x7b0 [ 863.375206] hwsim_new_radio_nl+0x7b8/0xa60 [ 863.379530] ? nla_parse+0x358/0x4a0 [ 863.383262] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 863.388547] ? __netlink_ns_capable+0x100/0x130 [ 863.393364] genl_family_rcv_msg+0x889/0x1120 [ 863.397864] ? genl_rcv+0x40/0x40 [ 863.401319] ? lock_downgrade+0x8e0/0x8e0 [ 863.405474] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 863.410504] ? kasan_check_read+0x11/0x20 [ 863.414654] ? lock_acquire+0x1dc/0x520 [ 863.418624] ? genl_rcv+0x19/0x40 [ 863.422094] genl_rcv_msg+0xc6/0x170 [ 863.425985] netlink_rcv_skb+0x172/0x440 [ 863.430092] ? genl_family_rcv_msg+0x1120/0x1120 [ 863.434881] ? netlink_ack+0xbc0/0xbc0 [ 863.438788] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 863.443986] ? netlink_skb_destructor+0x210/0x210 [ 863.448838] genl_rcv+0x28/0x40 [ 863.452121] netlink_unicast+0x58b/0x740 [ 863.456187] ? netlink_attachskb+0x970/0x970 [ 863.460597] ? import_iovec+0x24b/0x420 [ 863.464573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 863.469595] ? security_netlink_send+0x88/0xb0 [ 863.474182] netlink_sendmsg+0x9f0/0xfa0 [ 863.478269] ? netlink_unicast+0x740/0x740 [ 863.482511] ? security_socket_sendmsg+0x94/0xc0 [ 863.487287] ? netlink_unicast+0x740/0x740 [ 863.491529] sock_sendmsg+0xd5/0x120 [ 863.495249] ___sys_sendmsg+0x805/0x940 [ 863.499228] ? copy_msghdr_from_user+0x560/0x560 [ 863.503996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 863.509533] ? proc_fail_nth_write+0x96/0x1f0 [ 863.514034] ? __fget_light+0x2ef/0x430 [ 863.518008] ? fget_raw+0x20/0x20 [ 863.521466] ? find_held_lock+0x36/0x1c0 [ 863.525534] ? kasan_check_write+0x14/0x20 [ 863.529781] ? wait_for_completion+0x870/0x870 [ 863.534385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 863.540104] ? sockfd_lookup_light+0xc5/0x160 [ 863.544649] __sys_sendmsg+0x115/0x270 [ 863.548571] ? __ia32_sys_shutdown+0x80/0x80 [ 863.552986] ? __sb_end_write+0xac/0xe0 [ 863.556965] ? fput+0x130/0x1a0 [ 863.560251] ? ksys_write+0x1a6/0x250 [ 863.564068] __x64_sys_sendmsg+0x78/0xb0 [ 863.568141] do_syscall_64+0x1b1/0x800 [ 863.572033] ? finish_task_switch+0x1ca/0x840 [ 863.576546] ? syscall_return_slowpath+0x5c0/0x5c0 [ 863.581489] ? syscall_return_slowpath+0x30f/0x5c0 [ 863.586430] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 863.591806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 863.596661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 863.601850] RIP: 0033:0x455a09 [ 863.605036] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 863.612747] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 863.620018] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 863.627289] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 863.634574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 863.641840] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000023 [ 863.697355] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) 08:46:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe00]}}, 0x1c) 08:46:04 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c7465720000000000000003ec00"}, &(0x7f0000000140)=0x44) 08:46:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000000020000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:04 executing program 0 (fault-call:3 fault-nth:36): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00t\x00'}, 0x2c) 08:46:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x5c000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x8000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 863.847471] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 863.860971] IPVS: ftp: loaded support on port[0] = 21 [ 863.864575] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:46:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00t\x00'}, 0x2c) [ 863.910611] FAULT_INJECTION: forcing a failure. [ 863.910611] name failslab, interval 1, probability 0, space 0, times 0 [ 863.922102] CPU: 0 PID: 27860 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 863.929385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.938887] Call Trace: [ 863.941508] dump_stack+0x1b9/0x294 [ 863.945203] ? dump_stack_print_info.cold.2+0x52/0x52 [ 863.950430] ? kasan_check_write+0x14/0x20 [ 863.954692] ? finish_task_switch+0x28b/0x840 [ 863.959221] should_fail.cold.4+0xa/0x1a [ 863.963308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 863.968440] ? __schedule+0x809/0x1e30 [ 863.972354] ? kasan_check_write+0x14/0x20 [ 863.976617] ? __sched_text_start+0x8/0x8 [ 863.980798] ? find_held_lock+0x36/0x1c0 [ 863.984882] ? __lock_is_held+0xb5/0x140 [ 863.989193] ? check_same_owner+0x320/0x320 [ 863.993553] ? mark_held_locks+0xc9/0x160 [ 863.994850] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 863.997859] __should_failslab+0x124/0x180 08:46:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x5c, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 863.997889] should_failslab+0x9/0x14 [ 863.997922] kmem_cache_alloc_trace+0x2cb/0x780 [ 864.016345] ? trace_hardirqs_on+0xd/0x10 [ 864.020517] ? queue_work_on+0x12c/0x1e0 [ 864.024603] ? device_create_file+0x1e0/0x1e0 [ 864.029347] kobject_uevent_env+0x20f/0x1110 [ 864.033772] ? _raw_spin_unlock_irq+0x27/0x70 [ 864.038295] kobject_uevent+0x1f/0x30 [ 864.042115] driver_bound+0x1a3/0x220 [ 864.046046] device_bind_driver+0xb3/0xd0 [ 864.050372] mac80211_hwsim_new_radio+0x451/0x33b0 [ 864.055319] ? graph_lock+0x170/0x170 08:46:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00H\x00'}, 0x2c) [ 864.059144] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 864.065303] ? lock_release+0xa10/0xa10 [ 864.069292] ? check_same_owner+0x320/0x320 [ 864.073626] ? rcu_note_context_switch+0x710/0x710 [ 864.074593] IPVS: ftp: loaded support on port[0] = 21 [ 864.078573] ? __lock_acquire+0x7f5/0x5140 [ 864.078594] ? __might_sleep+0x95/0x190 [ 864.078614] ? kasan_check_write+0x14/0x20 [ 864.078635] ? __mutex_lock+0x7d9/0x17f0 [ 864.100287] ? genl_rcv_msg+0x13a/0x170 [ 864.104296] ? __lock_acquire+0x7f5/0x5140 08:46:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x7000000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 864.108568] ? mutex_trylock+0x2a0/0x2a0 [ 864.112660] ? graph_lock+0x170/0x170 [ 864.116491] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 864.120100] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 864.121716] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 864.121733] ? validate_nla+0x2d9/0x7b0 [ 864.121752] hwsim_new_radio_nl+0x7b8/0xa60 [ 864.121770] ? nla_parse+0x358/0x4a0 [ 864.144382] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 864.149596] ? __netlink_ns_capable+0x100/0x130 [ 864.154304] genl_family_rcv_msg+0x889/0x1120 [ 864.158817] ? genl_rcv+0x40/0x40 [ 864.162282] ? lock_downgrade+0x8e0/0x8e0 [ 864.166440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 864.171474] ? kasan_check_read+0x11/0x20 [ 864.176503] ? lock_acquire+0x1dc/0x520 [ 864.180487] ? genl_rcv+0x19/0x40 [ 864.183962] genl_rcv_msg+0xc6/0x170 [ 864.187691] netlink_rcv_skb+0x172/0x440 [ 864.191759] ? genl_family_rcv_msg+0x1120/0x1120 [ 864.196523] ? netlink_ack+0xbc0/0xbc0 [ 864.200419] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 864.205622] ? netlink_skb_destructor+0x210/0x210 [ 864.210482] genl_rcv+0x28/0x40 [ 864.213777] netlink_unicast+0x58b/0x740 [ 864.217850] ? netlink_attachskb+0x970/0x970 [ 864.222277] ? import_iovec+0x24b/0x420 [ 864.226267] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 864.231291] ? security_netlink_send+0x88/0xb0 [ 864.235884] netlink_sendmsg+0x9f0/0xfa0 [ 864.239964] ? netlink_unicast+0x740/0x740 [ 864.244209] ? security_socket_sendmsg+0x94/0xc0 [ 864.248967] ? netlink_unicast+0x740/0x740 [ 864.253468] sock_sendmsg+0xd5/0x120 [ 864.257192] ___sys_sendmsg+0x805/0x940 [ 864.261180] ? copy_msghdr_from_user+0x560/0x560 [ 864.265958] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 864.271507] ? proc_fail_nth_write+0x96/0x1f0 [ 864.276016] ? __fget_light+0x2ef/0x430 [ 864.280005] ? fget_raw+0x20/0x20 [ 864.283464] ? find_held_lock+0x36/0x1c0 [ 864.287534] ? kasan_check_write+0x14/0x20 [ 864.291803] ? wait_for_completion+0x870/0x870 [ 864.296405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 864.301943] ? sockfd_lookup_light+0xc5/0x160 [ 864.306459] __sys_sendmsg+0x115/0x270 [ 864.310370] ? __ia32_sys_shutdown+0x80/0x80 [ 864.314781] ? __sb_end_write+0xac/0xe0 [ 864.318763] ? fput+0x130/0x1a0 [ 864.322049] ? ksys_write+0x1a6/0x250 [ 864.325864] __x64_sys_sendmsg+0x78/0xb0 [ 864.329931] do_syscall_64+0x1b1/0x800 [ 864.333819] ? finish_task_switch+0x1ca/0x840 [ 864.338320] ? syscall_return_slowpath+0x5c0/0x5c0 [ 864.343259] ? syscall_return_slowpath+0x30f/0x5c0 [ 864.348193] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 864.353566] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 864.358430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 864.363618] RIP: 0033:0x455a09 [ 864.366801] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 864.374508] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 864.381773] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 864.389043] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 864.396309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 864.403692] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000024 08:46:04 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000048f00"}, 0x2c) 08:46:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfc00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:04 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000000036c00"}, &(0x7f0000000140)=0x44) 08:46:04 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:46:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000020000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:04 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:04 executing program 0 (fault-call:3 fault-nth:37): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x240]}}, 0x1c) 08:46:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xff00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 864.663340] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 864.685403] IPVS: ftp: loaded support on port[0] = 21 08:46:05 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008cffffff00"}, 0x6e) 08:46:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000400300000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfc00000000000000]}}, 0x1c) 08:46:05 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x2c) 08:46:05 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb80b], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 864.835684] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 864.870923] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfe80000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000340000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:05 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffff00"}, 0x6e) [ 865.013529] IPVS: ftp: loaded support on port[0] = 21 [ 865.072885] FAULT_INJECTION: forcing a failure. [ 865.072885] name failslab, interval 1, probability 0, space 0, times 0 [ 865.084238] CPU: 1 PID: 27913 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 865.091551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.100909] Call Trace: [ 865.103510] dump_stack+0x1b9/0x294 [ 865.107516] ? dump_stack_print_info.cold.2+0x52/0x52 [ 865.112740] should_fail.cold.4+0xa/0x1a [ 865.116815] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 865.121933] ? rcu_note_context_switch+0x710/0x710 [ 865.126879] ? graph_lock+0x170/0x170 [ 865.130696] ? __might_sleep+0x95/0x190 [ 865.134686] ? find_held_lock+0x36/0x1c0 [ 865.138763] ? __lock_is_held+0xb5/0x140 [ 865.142846] ? check_same_owner+0x320/0x320 [ 865.147175] ? graph_lock+0x170/0x170 [ 865.150987] ? rcu_note_context_switch+0x710/0x710 [ 865.156034] __should_failslab+0x124/0x180 [ 865.160277] should_failslab+0x9/0x14 [ 865.164082] kmem_cache_alloc_node+0x272/0x780 [ 865.168668] ? find_held_lock+0x36/0x1c0 [ 865.172747] __alloc_skb+0x111/0x780 [ 865.176471] ? skb_scrub_packet+0x580/0x580 [ 865.180798] ? kasan_check_read+0x11/0x20 [ 865.184958] ? rcu_is_watching+0x85/0x140 [ 865.189125] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 865.194335] ? netlink_has_listeners+0x2ff/0x4c0 [ 865.199101] ? netlink_tap_init_net+0x3c0/0x3c0 [ 865.203776] alloc_uevent_skb+0x89/0x220 [ 865.207848] kobject_uevent_env+0x866/0x1110 [ 865.212265] ? _raw_spin_unlock_irq+0x27/0x70 [ 865.216773] kobject_uevent+0x1f/0x30 [ 865.220580] driver_bound+0x1a3/0x220 [ 865.224390] device_bind_driver+0xb3/0xd0 [ 865.228545] mac80211_hwsim_new_radio+0x451/0x33b0 [ 865.233488] ? graph_lock+0x170/0x170 [ 865.237305] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 865.243463] ? lock_release+0xa10/0xa10 [ 865.247447] ? check_same_owner+0x320/0x320 [ 865.251791] ? rcu_note_context_switch+0x710/0x710 [ 865.256739] ? __lock_acquire+0x7f5/0x5140 [ 865.261009] ? __might_sleep+0x95/0x190 [ 865.264993] ? kasan_check_write+0x14/0x20 [ 865.269234] ? __mutex_lock+0x7d9/0x17f0 [ 865.273309] ? genl_rcv_msg+0x13a/0x170 [ 865.277309] ? __lock_acquire+0x7f5/0x5140 [ 865.281551] ? mutex_trylock+0x2a0/0x2a0 [ 865.285614] ? graph_lock+0x170/0x170 [ 865.289438] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 865.294640] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 865.299660] ? validate_nla+0x2d9/0x7b0 [ 865.303660] hwsim_new_radio_nl+0x7b8/0xa60 [ 865.307987] ? nla_parse+0x358/0x4a0 [ 865.311729] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 865.316956] ? __netlink_ns_capable+0x100/0x130 [ 865.321646] genl_family_rcv_msg+0x889/0x1120 [ 865.326154] ? genl_rcv+0x40/0x40 [ 865.329613] ? lock_downgrade+0x8e0/0x8e0 [ 865.333767] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 865.338795] ? kasan_check_read+0x11/0x20 [ 865.342950] ? lock_acquire+0x1dc/0x520 [ 865.346926] ? genl_rcv+0x19/0x40 [ 865.350401] genl_rcv_msg+0xc6/0x170 [ 865.354121] netlink_rcv_skb+0x172/0x440 [ 865.358184] ? genl_family_rcv_msg+0x1120/0x1120 [ 865.362945] ? netlink_ack+0xbc0/0xbc0 [ 865.366861] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 865.372064] ? netlink_skb_destructor+0x210/0x210 [ 865.376919] genl_rcv+0x28/0x40 [ 865.380202] netlink_unicast+0x58b/0x740 [ 865.384270] ? netlink_attachskb+0x970/0x970 [ 865.388679] ? import_iovec+0x24b/0x420 [ 865.392658] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 865.397678] ? security_netlink_send+0x88/0xb0 [ 865.402263] netlink_sendmsg+0x9f0/0xfa0 [ 865.406335] ? netlink_unicast+0x740/0x740 [ 865.410574] ? security_socket_sendmsg+0x94/0xc0 [ 865.415332] ? netlink_unicast+0x740/0x740 [ 865.419571] sock_sendmsg+0xd5/0x120 [ 865.423289] ___sys_sendmsg+0x805/0x940 [ 865.427272] ? copy_msghdr_from_user+0x560/0x560 [ 865.432065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 865.438131] ? proc_fail_nth_write+0x96/0x1f0 [ 865.442660] ? __fget_light+0x2ef/0x430 [ 865.446636] ? fget_raw+0x20/0x20 [ 865.450095] ? find_held_lock+0x36/0x1c0 [ 865.454164] ? kasan_check_write+0x14/0x20 [ 865.458429] ? wait_for_completion+0x870/0x870 [ 865.463047] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 865.468588] ? sockfd_lookup_light+0xc5/0x160 [ 865.473090] __sys_sendmsg+0x115/0x270 [ 865.476986] ? __ia32_sys_shutdown+0x80/0x80 [ 865.481397] ? __sb_end_write+0xac/0xe0 [ 865.485375] ? fput+0x130/0x1a0 [ 865.488655] ? ksys_write+0x1a6/0x250 [ 865.492474] __x64_sys_sendmsg+0x78/0xb0 [ 865.496542] do_syscall_64+0x1b1/0x800 [ 865.500472] ? finish_task_switch+0x1ca/0x840 [ 865.504975] ? syscall_return_slowpath+0x5c0/0x5c0 [ 865.509905] ? syscall_return_slowpath+0x30f/0x5c0 [ 865.514853] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 865.520227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 865.525077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 865.530265] RIP: 0033:0x455a09 [ 865.533454] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 865.541250] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 865.548520] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 865.555788] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 865.563057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 865.570326] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000025 08:46:06 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff600"}, 0x6e) 08:46:06 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:06 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000600"}, 0x2c) 08:46:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000000010000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x40000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:06 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00\x00\x00\x00@\x00'}, &(0x7f0000000140)=0x44) 08:46:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x5000000000000]}}, 0x1c) 08:46:06 executing program 0 (fault-call:3 fault-nth:38): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) [ 865.698280] FAULT_INJECTION: forcing a failure. [ 865.698280] name failslab, interval 1, probability 0, space 0, times 0 [ 865.709678] CPU: 1 PID: 27958 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 865.716967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.725089] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 865.726323] Call Trace: [ 865.726346] dump_stack+0x1b9/0x294 [ 865.726366] ? dump_stack_print_info.cold.2+0x52/0x52 [ 865.726383] ? kernel_text_address+0x79/0xf0 [ 865.726399] ? __unwind_start+0x166/0x330 [ 865.726421] ? __kernel_text_address+0xd/0x40 [ 865.751774] IPVS: ftp: loaded support on port[0] = 21 [ 865.752216] should_fail.cold.4+0xa/0x1a [ 865.752239] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 865.752259] ? save_stack+0xa9/0xd0 [ 865.752276] ? graph_lock+0x170/0x170 [ 865.778504] ? kasan_kmalloc+0xc4/0xe0 [ 865.782418] ? kmem_cache_alloc_trace+0x152/0x780 [ 865.787274] ? kobject_uevent_env+0x20f/0x1110 [ 865.791869] ? kobject_uevent+0x1f/0x30 [ 865.795855] ? driver_bound+0x1a3/0x220 [ 865.799845] ? device_bind_driver+0xb3/0xd0 [ 865.804181] ? find_held_lock+0x36/0x1c0 [ 865.808259] ? __lock_is_held+0xb5/0x140 [ 865.812347] ? check_same_owner+0x320/0x320 [ 865.816682] ? do_raw_spin_unlock+0x9e/0x2e0 [ 865.821103] ? rcu_note_context_switch+0x710/0x710 [ 865.826051] __should_failslab+0x124/0x180 [ 865.830299] should_failslab+0x9/0x14 [ 865.834145] __kmalloc+0x2c8/0x760 [ 865.837698] ? kobject_uevent_env+0x20f/0x1110 [ 865.840216] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 865.842283] ? rcu_read_lock_sched_held+0x108/0x120 [ 865.842298] ? kobject_get_path+0xc2/0x1a0 [ 865.842315] ? trace_hardirqs_on+0xd/0x10 [ 865.868210] kobject_get_path+0xc2/0x1a0 [ 865.872287] kobject_uevent_env+0x234/0x1110 [ 865.877411] ? _raw_spin_unlock_irq+0x27/0x70 [ 865.881926] kobject_uevent+0x1f/0x30 [ 865.885741] driver_bound+0x1a3/0x220 [ 865.889565] device_bind_driver+0xb3/0xd0 [ 865.893730] mac80211_hwsim_new_radio+0x451/0x33b0 [ 865.898669] ? graph_lock+0x170/0x170 [ 865.902490] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 865.908653] ? lock_release+0xa10/0xa10 [ 865.912646] ? check_same_owner+0x320/0x320 [ 865.914665] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 865.916979] ? rcu_note_context_switch+0x710/0x710 [ 865.916994] ? __lock_acquire+0x7f5/0x5140 [ 865.917013] ? __might_sleep+0x95/0x190 [ 865.917032] ? kasan_check_write+0x14/0x20 [ 865.917050] ? __mutex_lock+0x7d9/0x17f0 [ 865.917072] ? genl_rcv_msg+0x13a/0x170 08:46:06 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\t\x00'}, 0x2c) 08:46:06 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:06 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00"}, 0x6e) [ 865.932477] IPVS: ftp: loaded support on port[0] = 21 [ 865.935929] ? __lock_acquire+0x7f5/0x5140 [ 865.935950] ? mutex_trylock+0x2a0/0x2a0 [ 865.935965] ? graph_lock+0x170/0x170 [ 865.935984] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 865.935999] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 865.936014] ? validate_nla+0x2d9/0x7b0 [ 865.936034] hwsim_new_radio_nl+0x7b8/0xa60 [ 865.936046] ? nla_parse+0x358/0x4a0 [ 865.936064] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 865.992852] ? __netlink_ns_capable+0x100/0x130 [ 865.997536] genl_family_rcv_msg+0x889/0x1120 [ 866.002047] ? genl_rcv+0x40/0x40 [ 866.005513] ? lock_downgrade+0x8e0/0x8e0 [ 866.009681] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 866.014717] ? kasan_check_read+0x11/0x20 [ 866.018879] ? lock_acquire+0x1dc/0x520 [ 866.022861] ? genl_rcv+0x19/0x40 [ 866.026334] genl_rcv_msg+0xc6/0x170 [ 866.030053] netlink_rcv_skb+0x172/0x440 [ 866.034119] ? genl_family_rcv_msg+0x1120/0x1120 [ 866.038882] ? netlink_ack+0xbc0/0xbc0 [ 866.042777] ? rcu_bh_force_quiescent_state+0x20/0x20 08:46:06 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00 \x00'}, 0x2c) [ 866.047977] ? netlink_skb_destructor+0x210/0x210 [ 866.052833] genl_rcv+0x28/0x40 [ 866.056135] netlink_unicast+0x58b/0x740 [ 866.060210] ? netlink_attachskb+0x970/0x970 [ 866.064625] ? import_iovec+0x24b/0x420 [ 866.068613] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 866.073638] ? security_netlink_send+0x88/0xb0 [ 866.078231] netlink_sendmsg+0x9f0/0xfa0 [ 866.082310] ? netlink_unicast+0x740/0x740 [ 866.086902] ? security_socket_sendmsg+0x94/0xc0 [ 866.091673] ? netlink_unicast+0x740/0x740 [ 866.095926] sock_sendmsg+0xd5/0x120 08:46:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x40000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:06 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c6530000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffff8c00"}, 0x6e) [ 866.099649] ___sys_sendmsg+0x805/0x940 [ 866.103641] ? copy_msghdr_from_user+0x560/0x560 [ 866.108422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 866.113972] ? proc_fail_nth_write+0x96/0x1f0 [ 866.118479] ? __fget_light+0x2ef/0x430 [ 866.122480] ? fget_raw+0x20/0x20 [ 866.125945] ? find_held_lock+0x36/0x1c0 [ 866.130021] ? kasan_check_write+0x14/0x20 [ 866.134272] ? wait_for_completion+0x870/0x870 [ 866.138876] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.144423] ? sockfd_lookup_light+0xc5/0x160 [ 866.148934] __sys_sendmsg+0x115/0x270 [ 866.152835] ? __ia32_sys_shutdown+0x80/0x80 [ 866.157259] ? __sb_end_write+0xac/0xe0 [ 866.161247] ? fput+0x130/0x1a0 [ 866.164536] ? ksys_write+0x1a6/0x250 [ 866.168352] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 866.173215] __x64_sys_sendmsg+0x78/0xb0 [ 866.177290] do_syscall_64+0x1b1/0x800 [ 866.181190] ? finish_task_switch+0x1ca/0x840 [ 866.185698] ? syscall_return_slowpath+0x5c0/0x5c0 [ 866.190636] ? syscall_return_slowpath+0x30f/0x5c0 [ 866.195579] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 866.200962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 866.205824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.211022] RIP: 0033:0x455a09 [ 866.214219] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 866.221968] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 866.229248] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 866.236527] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 08:46:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfffffff5]}}, 0x1c) 08:46:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000010000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 866.243804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 866.251090] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000026 08:46:06 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4050000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 866.292445] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:06 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000003fd00"}, &(0x7f0000000140)=0x44) 08:46:06 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, "2e2f66696c65300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100"}, 0x6e) 08:46:06 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000000000100"}, 0x2c) 08:46:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xe]}}, 0x1c) 08:46:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000000000000000007fffffff0000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:06 executing program 0 (fault-call:3 fault-nth:39): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x5000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:06 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 866.519308] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 866.524311] IPVS: ftp: loaded support on port[0] = 21 [ 866.573387] FAULT_INJECTION: forcing a failure. [ 866.573387] name failslab, interval 1, probability 0, space 0, times 0 [ 866.584763] CPU: 1 PID: 28037 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 866.592410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.601768] Call Trace: [ 866.604371] dump_stack+0x1b9/0x294 [ 866.608014] ? dump_stack_print_info.cold.2+0x52/0x52 [ 866.613222] ? lock_repin_lock+0x410/0x410 [ 866.617482] should_fail.cold.4+0xa/0x1a 08:46:06 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00l\x00'}, 0x2c) 08:46:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 866.621557] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 866.626678] ? lock_downgrade+0x8e0/0x8e0 [ 866.630846] ? graph_lock+0x170/0x170 [ 866.634670] ? find_held_lock+0x36/0x1c0 [ 866.638752] ? __lock_is_held+0xb5/0x140 [ 866.642838] ? check_same_owner+0x320/0x320 [ 866.647172] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 866.652290] ? rcu_note_context_switch+0x710/0x710 [ 866.657238] __should_failslab+0x124/0x180 [ 866.661488] should_failslab+0x9/0x14 [ 866.665304] __kmalloc+0x2c8/0x760 [ 866.668866] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 866.674072] ? ieee80211_register_hw+0xc0b/0x35d0 [ 866.679984] ieee80211_register_hw+0xc0b/0x35d0 [ 866.684675] ? ieee80211_free_ack_frame+0x60/0x60 [ 866.689543] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 866.694592] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 866.700763] ? check_same_owner+0x320/0x320 [ 866.705102] ? __lock_acquire+0x7f5/0x5140 [ 866.709357] ? __might_sleep+0x95/0x190 [ 866.713363] ? kasan_check_write+0x14/0x20 [ 866.717613] ? __mutex_lock+0x7d9/0x17f0 08:46:07 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x2) 08:46:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 866.721687] ? genl_rcv_msg+0x13a/0x170 [ 866.725669] ? __lock_acquire+0x7f5/0x5140 [ 866.729911] ? mutex_trylock+0x2a0/0x2a0 [ 866.733981] ? graph_lock+0x170/0x170 [ 866.734043] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 866.737789] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 866.737810] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 866.737827] ? validate_nla+0x2d9/0x7b0 [ 866.737846] hwsim_new_radio_nl+0x7b8/0xa60 [ 866.737860] ? nla_parse+0x358/0x4a0 [ 866.737875] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 08:46:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfeffffff, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 866.737896] ? __netlink_ns_capable+0x100/0x130 [ 866.775701] genl_family_rcv_msg+0x889/0x1120 [ 866.780210] ? genl_rcv+0x40/0x40 [ 866.783675] ? lock_downgrade+0x8e0/0x8e0 [ 866.787834] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 866.792867] ? kasan_check_read+0x11/0x20 [ 866.797028] ? lock_acquire+0x1dc/0x520 [ 866.801030] ? genl_rcv+0x19/0x40 [ 866.804493] genl_rcv_msg+0xc6/0x170 [ 866.808212] netlink_rcv_skb+0x172/0x440 [ 866.812281] ? genl_family_rcv_msg+0x1120/0x1120 [ 866.812891] IPVS: ftp: loaded support on port[0] = 21 [ 866.817033] ? netlink_ack+0xbc0/0xbc0 [ 866.817051] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 866.817071] ? netlink_skb_destructor+0x210/0x210 [ 866.817091] genl_rcv+0x28/0x40 [ 866.817103] netlink_unicast+0x58b/0x740 [ 866.817120] ? netlink_attachskb+0x970/0x970 [ 866.847900] ? import_iovec+0x24b/0x420 [ 866.851892] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 866.856927] ? security_netlink_send+0x88/0xb0 [ 866.861522] netlink_sendmsg+0x9f0/0xfa0 [ 866.865600] ? netlink_unicast+0x740/0x740 [ 866.869851] ? security_socket_sendmsg+0x94/0xc0 08:46:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x800000000000000]}}, 0x1c) 08:46:07 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x2000006e) [ 866.874617] ? netlink_unicast+0x740/0x740 [ 866.878873] sock_sendmsg+0xd5/0x120 [ 866.882602] ___sys_sendmsg+0x805/0x940 [ 866.886587] ? copy_msghdr_from_user+0x560/0x560 [ 866.891367] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 866.897178] ? proc_fail_nth_write+0x96/0x1f0 [ 866.901685] ? __fget_light+0x2ef/0x430 [ 866.905676] ? fget_raw+0x20/0x20 [ 866.909145] ? find_held_lock+0x36/0x1c0 [ 866.913219] ? kasan_check_write+0x14/0x20 [ 866.917641] ? wait_for_completion+0x870/0x870 [ 866.922242] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 866.927789] ? sockfd_lookup_light+0xc5/0x160 [ 866.932297] __sys_sendmsg+0x115/0x270 [ 866.936208] ? __ia32_sys_shutdown+0x80/0x80 [ 866.940632] ? __sb_end_write+0xac/0xe0 [ 866.944619] ? fput+0x130/0x1a0 [ 866.947904] ? ksys_write+0x1a6/0x250 [ 866.951727] __x64_sys_sendmsg+0x78/0xb0 [ 866.955815] do_syscall_64+0x1b1/0x800 [ 866.959713] ? finish_task_switch+0x1ca/0x840 [ 866.964221] ? syscall_return_slowpath+0x5c0/0x5c0 [ 866.969168] ? syscall_return_slowpath+0x30f/0x5c0 [ 866.974113] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 866.979494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 866.984354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 866.989553] RIP: 0033:0x455a09 [ 866.992746] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 867.000467] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 867.007746] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 867.015026] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 867.022307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 867.029583] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000027 [ 867.058145] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:46:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb8], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfec00000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000001000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:07 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00l\x00'}, 0x2c) 08:46:07 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000900)={@dev, 0x0}, &(0x7f0000000940)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000980)={'vcan0\x00', r2}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) r3 = socket(0xa, 0x6, 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f00000001c0)={r6, &(0x7f0000000100)=""/158}) getsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000540), &(0x7f0000000840)=0x10) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @multicast2}, &(0x7f00000005c0)=0xc) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000880)={0x1}, 0x4) sendmsg$can_raw(r4, &(0x7f0000000700)={&(0x7f0000000600)={0x1d, r7}, 0x10, &(0x7f00000006c0)={&(0x7f0000000640)=@canfd={{0x2, 0x20, 0x9, 0x80000000}, 0x21, 0x1, 0x0, 0x0, "d0b807c9e0f201dc75f6d7d374aeafd2cbff1dc61f44d3e8dc3a2399fbd84f609353ff34c3a993bc96fe0d16531f8dad557390385527cf2698e92a2de078ee76"}, 0x48}, 0x1, 0x0, 0x0, 0x94}, 0x0) bind$rds(r4, &(0x7f0000000400)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) getsockopt$inet6_dccp_buf(r3, 0x21, 0x0, &(0x7f0000000200)=""/134, &(0x7f00000002c0)=0x86) accept(r5, &(0x7f00000009c0)=@ax25, &(0x7f0000000a40)=0x80) r8 = socket(0x0, 0x3, 0x8) getsockopt$sock_buf(r8, 0x1, 0x3b, &(0x7f0000000440)=""/121, &(0x7f0000000500)=0xfffffffffffffe30) socket$vsock_dgram(0x28, 0x2, 0x0) sendto(r0, &(0x7f0000000740)="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", 0xfe, 0x800, &(0x7f0000000000)=@generic={0x11, "8c3b173e75ebee833df1325f6e5d045804d3c80376f3ccd8fb7ce9f6b66ad9a7214386c031f31ac4c7fbfabb8d28a62e76676f234697ee21f989cc14676ea6cae23785239f3a42b998f6e54ce459db021d59b5ef97f7c0c39c750e8b3ba7dfd8853d6824c59d8e1b16636241bffef041bd95257271ab765acabec2f54da1"}, 0x80) bind$unix(r8, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 08:46:07 executing program 0 (fault-call:3 fault-nth:40): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xa00000000000000]}}, 0x1c) 08:46:07 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000003fe00"}, &(0x7f0000000140)=0x44) [ 867.285333] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 867.295393] FAULT_INJECTION: forcing a failure. [ 867.295393] name failslab, interval 1, probability 0, space 0, times 0 [ 867.306752] CPU: 1 PID: 28081 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 867.314113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.323475] Call Trace: [ 867.326084] dump_stack+0x1b9/0x294 [ 867.329731] ? dump_stack_print_info.cold.2+0x52/0x52 08:46:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b4], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xb00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 867.334948] ? lock_repin_lock+0x410/0x410 [ 867.339203] should_fail.cold.4+0xa/0x1a [ 867.343292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 867.348422] ? lock_downgrade+0x8e0/0x8e0 [ 867.352590] ? graph_lock+0x170/0x170 [ 867.356412] ? find_held_lock+0x36/0x1c0 [ 867.360505] ? __lock_is_held+0xb5/0x140 [ 867.364594] ? check_same_owner+0x320/0x320 [ 867.368933] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 867.374056] ? rcu_note_context_switch+0x710/0x710 [ 867.379009] __should_failslab+0x124/0x180 [ 867.383260] should_failslab+0x9/0x14 [ 867.387085] __kmalloc+0x2c8/0x760 [ 867.390661] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 867.395952] ? ieee80211_register_hw+0xc0b/0x35d0 [ 867.400816] ieee80211_register_hw+0xc0b/0x35d0 [ 867.405569] ? ieee80211_free_ack_frame+0x60/0x60 [ 867.410436] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 867.415483] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 867.421657] ? check_same_owner+0x320/0x320 [ 867.426002] ? __lock_acquire+0x7f5/0x5140 [ 867.430331] ? __might_sleep+0x95/0x190 08:46:07 executing program 6: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) socket$rds(0x15, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) [ 867.434325] ? kasan_check_write+0x14/0x20 [ 867.438578] ? __mutex_lock+0x7d9/0x17f0 [ 867.442663] ? genl_rcv_msg+0x13a/0x170 [ 867.446657] ? __lock_acquire+0x7f5/0x5140 [ 867.450908] ? mutex_trylock+0x2a0/0x2a0 [ 867.454981] ? graph_lock+0x170/0x170 [ 867.458797] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 867.463997] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 867.469017] ? validate_nla+0x2d9/0x7b0 [ 867.473004] hwsim_new_radio_nl+0x7b8/0xa60 [ 867.478290] ? nla_parse+0x358/0x4a0 [ 867.482012] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 867.487219] ? __netlink_ns_capable+0x100/0x130 [ 867.488544] IPVS: ftp: loaded support on port[0] = 21 [ 867.491943] genl_family_rcv_msg+0x889/0x1120 [ 867.491963] ? genl_rcv+0x40/0x40 [ 867.491980] ? lock_downgrade+0x8e0/0x8e0 [ 867.491996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 867.492021] ? kasan_check_read+0x11/0x20 [ 867.518497] ? lock_acquire+0x1dc/0x520 [ 867.522479] ? genl_rcv+0x19/0x40 [ 867.525964] genl_rcv_msg+0xc6/0x170 [ 867.529709] netlink_rcv_skb+0x172/0x440 08:46:07 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 867.533785] ? genl_family_rcv_msg+0x1120/0x1120 [ 867.538556] ? netlink_ack+0xbc0/0xbc0 [ 867.542457] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 867.547667] ? netlink_skb_destructor+0x210/0x210 [ 867.552545] genl_rcv+0x28/0x40 [ 867.555840] netlink_unicast+0x58b/0x740 [ 867.559918] ? netlink_attachskb+0x970/0x970 [ 867.564336] ? import_iovec+0x24b/0x420 [ 867.568327] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 867.573359] ? security_netlink_send+0x88/0xb0 [ 867.577956] netlink_sendmsg+0x9f0/0xfa0 [ 867.582035] ? netlink_unicast+0x740/0x740 08:46:07 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0x6e) [ 867.586295] ? security_socket_sendmsg+0x94/0xc0 [ 867.591087] ? netlink_unicast+0x740/0x740 [ 867.595332] sock_sendmsg+0xd5/0x120 [ 867.600285] ___sys_sendmsg+0x805/0x940 [ 867.604284] ? copy_msghdr_from_user+0x560/0x560 [ 867.609066] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 867.614617] ? proc_fail_nth_write+0x96/0x1f0 [ 867.619124] ? __fget_light+0x2ef/0x430 [ 867.623110] ? fget_raw+0x20/0x20 [ 867.626574] ? find_held_lock+0x36/0x1c0 [ 867.631004] ? kasan_check_write+0x14/0x20 08:46:07 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e71000500"}, 0x2c) 08:46:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3a00, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 867.635264] ? wait_for_completion+0x870/0x870 [ 867.639872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 867.645420] ? sockfd_lookup_light+0xc5/0x160 [ 867.649930] __sys_sendmsg+0x115/0x270 [ 867.653829] ? __ia32_sys_shutdown+0x80/0x80 [ 867.658245] ? __sb_end_write+0xac/0xe0 [ 867.662234] ? fput+0x130/0x1a0 [ 867.665530] ? ksys_write+0x1a6/0x250 [ 867.669366] __x64_sys_sendmsg+0x78/0xb0 [ 867.673788] do_syscall_64+0x1b1/0x800 [ 867.677701] ? finish_task_switch+0x1ca/0x840 [ 867.682217] ? syscall_return_slowpath+0x5c0/0x5c0 [ 867.684754] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 867.687159] ? syscall_return_slowpath+0x30f/0x5c0 [ 867.687182] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 867.687202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 867.687221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 867.687235] RIP: 0033:0x455a09 [ 867.720955] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 867.728678] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 08:46:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000000000007fffffff000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 867.735959] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 867.743251] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 867.750539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 867.757825] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000028 [ 867.794573] IPVS: ftp: loaded support on port[0] = 21 [ 867.877323] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:08 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x346) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 08:46:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x2, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xfe80000000000000]}}, 0x1c) 08:46:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000020000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:08 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000000400"}, &(0x7f0000000140)=0x44) 08:46:08 executing program 0 (fault-call:3 fault-nth:41): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000000600"}, 0x2c) [ 868.045136] FAULT_INJECTION: forcing a failure. [ 868.045136] name failslab, interval 1, probability 0, space 0, times 0 [ 868.056484] CPU: 1 PID: 28139 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 868.063770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.072297] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 868.073382] Call Trace: [ 868.073405] dump_stack+0x1b9/0x294 [ 868.073425] ? dump_stack_print_info.cold.2+0x52/0x52 [ 868.073449] should_fail.cold.4+0xa/0x1a 08:46:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 868.073464] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 868.073482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 868.104811] ? graph_lock+0x170/0x170 [ 868.108625] ? kernel_text_address+0x79/0xf0 [ 868.113231] ? __unwind_start+0x166/0x330 [ 868.117393] ? __kernel_text_address+0xd/0x40 [ 868.121909] ? find_held_lock+0x36/0x1c0 [ 868.125986] ? __lock_is_held+0xb5/0x140 [ 868.130075] ? check_same_owner+0x320/0x320 [ 868.134404] ? device_bind_driver+0xb3/0xd0 [ 868.138740] ? mac80211_hwsim_new_radio+0x451/0x33b0 08:46:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, 0x2c) [ 868.143855] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 868.148389] ? rcu_note_context_switch+0x710/0x710 [ 868.153317] ? genl_rcv+0x28/0x40 [ 868.156797] ? netlink_unicast+0x58b/0x740 [ 868.161038] ? netlink_sendmsg+0x9f0/0xfa0 [ 868.165286] __should_failslab+0x124/0x180 [ 868.169528] should_failslab+0x9/0x14 [ 868.173353] kmem_cache_alloc+0x2af/0x760 [ 868.177517] skb_clone+0x1ed/0x4f0 [ 868.181059] ? refcount_add_not_zero+0x2a0/0x320 [ 868.185820] ? skb_split+0x11d0/0x11d0 [ 868.189713] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 868.194745] ? netlink_trim+0x1b2/0x370 [ 868.198737] ? netlink_skb_destructor+0x210/0x210 [ 868.203599] netlink_broadcast_filtered+0x1024/0x1580 [ 868.208798] ? __netlink_sendskb+0xd0/0xd0 [ 868.213042] ? pointer+0xa10/0xa10 [ 868.216591] ? kasan_check_read+0x11/0x20 [ 868.220744] ? rcu_is_watching+0x85/0x140 [ 868.224906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.230449] ? refcount_inc_not_zero+0x1dd/0x2d0 [ 868.233205] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 868.235224] ? __sanitizer_cov_trace_cmp4+0x16/0x20 08:46:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 868.235245] netlink_broadcast+0x3a/0x50 [ 868.235267] kobject_uevent_env+0x829/0x1110 [ 868.235282] ? _raw_spin_unlock_irq+0x27/0x70 [ 868.235303] kobject_uevent+0x1f/0x30 [ 868.235324] driver_bound+0x1a3/0x220 [ 868.259192] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 868.262670] device_bind_driver+0xb3/0xd0 [ 868.262691] mac80211_hwsim_new_radio+0x451/0x33b0 [ 868.285504] ? graph_lock+0x170/0x170 [ 868.289324] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 868.295486] ? lock_release+0xa10/0xa10 [ 868.299474] ? check_same_owner+0x320/0x320 [ 868.303814] ? rcu_note_context_switch+0x710/0x710 [ 868.308753] ? __lock_acquire+0x7f5/0x5140 [ 868.313017] ? __might_sleep+0x95/0x190 [ 868.317004] ? kasan_check_write+0x14/0x20 [ 868.321248] ? __mutex_lock+0x7d9/0x17f0 [ 868.325350] ? genl_rcv_msg+0x13a/0x170 [ 868.329332] ? __lock_acquire+0x7f5/0x5140 [ 868.333571] ? mutex_trylock+0x2a0/0x2a0 [ 868.337653] ? graph_lock+0x170/0x170 [ 868.341462] ? __sanitizer_cov_trace_switch+0x53/0x90 08:46:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x70, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:08 executing program 6: r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@multicast1=0xe0000001, @dev={0xac, 0x14, 0x14, 0x11}, @dev={0xac, 0x14, 0x14, 0x20}}, 0xc) socketpair$unix(0x1, 0x8003, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000380)=@abs={0x1}, 0x6e) r2 = socket(0x1, 0x0, 0xc47c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x5, 0x7, 0x4, 0x2, 0x65a1}, &(0x7f0000000140)=0x14) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x5, 0x8, 0x37cc, 0x0, 0x9}, 0x14) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x4, 0x4) bind$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000280)=0x8, 0x4) 08:46:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100001100"}, 0x2c) [ 868.346665] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 868.351691] ? validate_nla+0x2d9/0x7b0 [ 868.355676] hwsim_new_radio_nl+0x7b8/0xa60 [ 868.360051] ? nla_parse+0x358/0x4a0 [ 868.363791] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 868.368991] ? __netlink_ns_capable+0x100/0x130 [ 868.373669] genl_family_rcv_msg+0x889/0x1120 [ 868.378174] ? genl_rcv+0x40/0x40 [ 868.381635] ? lock_downgrade+0x8e0/0x8e0 [ 868.385787] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 868.390816] ? kasan_check_read+0x11/0x20 [ 868.394971] ? lock_acquire+0x1dc/0x520 [ 868.398958] ? genl_rcv+0x19/0x40 [ 868.402427] genl_rcv_msg+0xc6/0x170 [ 868.406406] netlink_rcv_skb+0x172/0x440 [ 868.410734] ? genl_family_rcv_msg+0x1120/0x1120 [ 868.415496] ? netlink_ack+0xbc0/0xbc0 [ 868.419392] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 868.424591] ? netlink_skb_destructor+0x210/0x210 [ 868.429440] genl_rcv+0x28/0x40 [ 868.432723] netlink_unicast+0x58b/0x740 [ 868.436791] ? netlink_attachskb+0x970/0x970 [ 868.441206] ? import_iovec+0x24b/0x420 08:46:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xeffe0000]}}, 0x1c) [ 868.445191] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 868.450216] ? security_netlink_send+0x88/0xb0 [ 868.454806] netlink_sendmsg+0x9f0/0xfa0 [ 868.458879] ? netlink_unicast+0x740/0x740 [ 868.463122] ? security_socket_sendmsg+0x94/0xc0 [ 868.467877] ? netlink_unicast+0x740/0x740 [ 868.469759] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 868.472111] sock_sendmsg+0xd5/0x120 [ 868.472129] ___sys_sendmsg+0x805/0x940 [ 868.472150] ? copy_msghdr_from_user+0x560/0x560 [ 868.472182] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 08:46:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 868.472197] ? proc_fail_nth_write+0x96/0x1f0 [ 868.472214] ? __fget_light+0x2ef/0x430 [ 868.504196] ? fget_raw+0x20/0x20 [ 868.507916] ? find_held_lock+0x36/0x1c0 [ 868.511991] ? kasan_check_write+0x14/0x20 [ 868.516246] ? wait_for_completion+0x870/0x870 [ 868.520933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 868.526472] ? sockfd_lookup_light+0xc5/0x160 [ 868.530978] __sys_sendmsg+0x115/0x270 [ 868.534877] ? __ia32_sys_shutdown+0x80/0x80 [ 868.539336] ? __sb_end_write+0xac/0xe0 [ 868.543318] ? fput+0x130/0x1a0 08:46:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xb00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 868.546602] ? ksys_write+0x1a6/0x250 [ 868.550424] __x64_sys_sendmsg+0x78/0xb0 [ 868.554492] do_syscall_64+0x1b1/0x800 [ 868.558393] ? finish_task_switch+0x1ca/0x840 [ 868.562894] ? syscall_return_slowpath+0x5c0/0x5c0 [ 868.567830] ? syscall_return_slowpath+0x30f/0x5c0 [ 868.572771] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 868.578146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 868.583002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 868.588207] RIP: 0033:0x455a09 08:46:08 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00H\x00'}, 0x2c) 08:46:08 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 868.591399] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 868.599113] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 868.606389] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 868.613661] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 868.620934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 868.628205] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 0000000000000029 [ 868.641925] IPVS: ftp: loaded support on port[0] = 21 08:46:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f00001100000000000000000000000800120000000300000000000000000006000000000000000000000000000000600000010000000000000000000000ffffffff00000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 868.646284] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 868.744307] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 868.831284] IPVS: ftp: loaded support on port[0] = 21 08:46:09 executing program 6: socketpair$unix(0x1, 0x8, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 08:46:09 executing program 0 (fault-call:3 fault-nth:42): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x80ffffff00000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000000200"}, 0x2c) 08:46:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000000000400000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:09 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000000000000001d00"}, &(0x7f0000000140)=0x44) 08:46:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x1000000]}}, 0x1c) [ 868.976337] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 868.984126] FAULT_INJECTION: forcing a failure. [ 868.984126] name failslab, interval 1, probability 0, space 0, times 0 [ 868.994538] IPVS: ftp: loaded support on port[0] = 21 [ 868.995460] CPU: 0 PID: 28202 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 869.007843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.017194] Call Trace: [ 869.019795] dump_stack+0x1b9/0x294 [ 869.023439] ? dump_stack_print_info.cold.2+0x52/0x52 [ 869.028642] ? lock_repin_lock+0x410/0x410 [ 869.032890] should_fail.cold.4+0xa/0x1a [ 869.036967] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 869.042082] ? lock_downgrade+0x8e0/0x8e0 [ 869.046242] ? graph_lock+0x170/0x170 [ 869.050056] ? find_held_lock+0x36/0x1c0 [ 869.054127] ? __lock_is_held+0xb5/0x140 [ 869.058207] ? check_same_owner+0x320/0x320 [ 869.062541] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 869.067662] ? rcu_note_context_switch+0x710/0x710 [ 869.072607] __should_failslab+0x124/0x180 [ 869.076863] should_failslab+0x9/0x14 [ 869.080672] __kmalloc+0x2c8/0x760 [ 869.084371] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 869.089571] ? ieee80211_register_hw+0xc0b/0x35d0 [ 869.094429] ieee80211_register_hw+0xc0b/0x35d0 [ 869.098192] IPVS: ftp: loaded support on port[0] = 21 [ 869.099109] ? ieee80211_free_ack_frame+0x60/0x60 [ 869.099134] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 869.114194] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 869.120354] ? check_same_owner+0x320/0x320 [ 869.124686] ? __lock_acquire+0x7f5/0x5140 [ 869.128928] ? __might_sleep+0x95/0x190 [ 869.132918] ? kasan_check_write+0x14/0x20 [ 869.137164] ? __mutex_lock+0x7d9/0x17f0 [ 869.141235] ? genl_rcv_msg+0x13a/0x170 [ 869.145220] ? __lock_acquire+0x7f5/0x5140 [ 869.149460] ? mutex_trylock+0x2a0/0x2a0 [ 869.153520] ? graph_lock+0x170/0x170 [ 869.157327] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 869.162520] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 869.167535] ? validate_nla+0x2d9/0x7b0 [ 869.171515] hwsim_new_radio_nl+0x7b8/0xa60 [ 869.175837] ? nla_parse+0x358/0x4a0 [ 869.179552] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 869.184747] ? __netlink_ns_capable+0x100/0x130 [ 869.189420] genl_family_rcv_msg+0x889/0x1120 [ 869.193927] ? genl_rcv+0x40/0x40 [ 869.197378] ? lock_downgrade+0x8e0/0x8e0 [ 869.201526] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 869.206547] ? kasan_check_read+0x11/0x20 [ 869.210695] ? lock_acquire+0x1dc/0x520 [ 869.214667] ? genl_rcv+0x19/0x40 [ 869.218129] genl_rcv_msg+0xc6/0x170 [ 869.221841] netlink_rcv_skb+0x172/0x440 [ 869.225901] ? genl_family_rcv_msg+0x1120/0x1120 [ 869.230657] ? netlink_ack+0xbc0/0xbc0 [ 869.234539] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 869.239732] ? netlink_skb_destructor+0x210/0x210 [ 869.244577] genl_rcv+0x28/0x40 [ 869.247859] netlink_unicast+0x58b/0x740 [ 869.251924] ? netlink_attachskb+0x970/0x970 [ 869.256327] ? import_iovec+0x24b/0x420 [ 869.260302] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 869.265316] ? security_netlink_send+0x88/0xb0 [ 869.269895] netlink_sendmsg+0x9f0/0xfa0 [ 869.273960] ? netlink_unicast+0x740/0x740 [ 869.278194] ? security_socket_sendmsg+0x94/0xc0 [ 869.282949] ? netlink_unicast+0x740/0x740 [ 869.287183] sock_sendmsg+0xd5/0x120 [ 869.290892] ___sys_sendmsg+0x805/0x940 [ 869.294991] ? copy_msghdr_from_user+0x560/0x560 [ 869.299758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 869.305295] ? proc_fail_nth_write+0x96/0x1f0 [ 869.309791] ? __fget_light+0x2ef/0x430 [ 869.313852] ? fget_raw+0x20/0x20 [ 869.317303] ? find_held_lock+0x36/0x1c0 [ 869.321367] ? kasan_check_write+0x14/0x20 [ 869.325616] ? wait_for_completion+0x870/0x870 [ 869.330206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 869.335742] ? sockfd_lookup_light+0xc5/0x160 [ 869.340236] __sys_sendmsg+0x115/0x270 [ 869.344122] ? __ia32_sys_shutdown+0x80/0x80 [ 869.348528] ? __sb_end_write+0xac/0xe0 [ 869.352502] ? fput+0x130/0x1a0 [ 869.355783] ? ksys_write+0x1a6/0x250 [ 869.359595] __x64_sys_sendmsg+0x78/0xb0 [ 869.363663] do_syscall_64+0x1b1/0x800 [ 869.367549] ? finish_task_switch+0x1ca/0x840 [ 869.372043] ? syscall_return_slowpath+0x5c0/0x5c0 [ 869.377071] ? syscall_return_slowpath+0x30f/0x5c0 [ 869.382034] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 869.387427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 869.392279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 869.397465] RIP: 0033:0x455a09 [ 869.400650] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 869.408360] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 869.415632] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 08:46:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:09 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c74657200000001d000"}, &(0x7f0000000140)=0x44) 08:46:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x7f00000000000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f0000110000000000000000000000080012000000030000000000000000000600000000000000000000000000000060000001000000000000007fffffff0000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) [ 869.422900] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 869.430164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 869.437428] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002a [ 869.461734] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:46:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x18, 0x804, 0x20, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000140), &(0x7f0000000180)=0x4) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) getsockname$ax25(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000100)={'veth1\x00', 0x43}) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) [ 869.488528] IPVS: ftp: loaded support on port[0] = 21 08:46:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:09 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'nq\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}, 0x2c) 08:46:09 executing program 0 (fault-call:3 fault-nth:43): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x70000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000004003000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:09 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x35a) 08:46:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) [ 869.600334] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 08:46:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000000003400000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xff000000, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) [ 869.709058] IPVS: ftp: loaded support on port[0] = 21 [ 869.897116] FAULT_INJECTION: forcing a failure. [ 869.897116] name failslab, interval 1, probability 0, space 0, times 0 [ 869.908419] CPU: 1 PID: 28250 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 869.915691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.925043] Call Trace: [ 869.927638] dump_stack+0x1b9/0x294 [ 869.931266] ? dump_stack_print_info.cold.2+0x52/0x52 [ 869.936455] ? retint_kernel+0x10/0x10 [ 869.940349] should_fail.cold.4+0xa/0x1a [ 869.944411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 869.949510] ? save_stack+0xa9/0xd0 [ 869.953136] ? save_stack+0x43/0xd0 [ 869.956756] ? kasan_slab_alloc+0x12/0x20 [ 869.960904] ? kmem_cache_alloc+0x12e/0x760 [ 869.965232] ? __debug_object_init+0xbc0/0x12c0 [ 869.969895] ? debug_object_init+0x16/0x20 [ 869.974124] ? init_timer_key+0xa1/0x470 [ 869.978179] ? mac80211_hwsim_new_radio+0xf39/0x33b0 [ 869.983280] ? hwsim_new_radio_nl+0x7b8/0xa60 [ 869.987771] ? genl_family_rcv_msg+0x889/0x1120 [ 869.992450] ? genl_rcv_msg+0xc6/0x170 [ 869.996335] ? netlink_rcv_skb+0x172/0x440 [ 870.000562] ? genl_rcv+0x28/0x40 [ 870.004024] ? netlink_unicast+0x58b/0x740 [ 870.008270] ? graph_lock+0x170/0x170 [ 870.012071] ? print_usage_bug+0xc0/0xc0 [ 870.016131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.021513] ? lock_downgrade+0x8e0/0x8e0 [ 870.025660] ? print_usage_bug+0xc0/0xc0 [ 870.029725] ? print_usage_bug+0xc0/0xc0 [ 870.033791] ? __lock_acquire+0x7f5/0x5140 [ 870.038031] __should_failslab+0x124/0x180 [ 870.042271] should_failslab+0x9/0x14 [ 870.046076] kmem_cache_alloc+0x47/0x760 [ 870.050137] ? debug_check_no_locks_freed+0x310/0x310 [ 870.055332] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 870.060446] __debug_object_init+0xbc0/0x12c0 [ 870.064951] ? trace_hardirqs_on+0xd/0x10 [ 870.069107] ? debug_object_free+0x5f0/0x5f0 [ 870.073519] ? print_usage_bug+0xc0/0xc0 [ 870.077580] ? debug_object_free+0x5f0/0x5f0 [ 870.081993] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 870.087005] ? trace_hardirqs_on+0xd/0x10 [ 870.091501] ? __debug_object_init+0x57f/0x12c0 [ 870.096167] ? do_raw_spin_lock+0xc1/0x200 [ 870.100404] ? graph_lock+0x170/0x170 [ 870.104211] ? mark_held_locks+0xc9/0x160 [ 870.108356] ? debug_mutex_init+0x1c/0x60 [ 870.112503] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 870.117521] ? find_held_lock+0x36/0x1c0 [ 870.121602] ? __next_timer_interrupt+0x1a0/0x1a0 [ 870.126445] debug_object_init_on_stack+0x19/0x20 [ 870.131289] init_timer_on_stack_key+0x30/0xe0 [ 870.135874] schedule_timeout+0x126/0x240 [ 870.140202] ? usleep_range+0x180/0x180 [ 870.144174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.149712] ? handle_channel_custom.isra.26+0x171/0x6e0 [ 870.155168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.160706] ? wiphy_apply_custom_regulatory+0x1e8/0x2a0 [ 870.166162] schedule_timeout_interruptible+0x75/0x90 [ 870.172933] mac80211_hwsim_new_radio+0x1ce4/0x33b0 [ 870.177966] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 870.184119] ? check_same_owner+0x320/0x320 [ 870.188442] ? __lock_acquire+0x7f5/0x5140 [ 870.192678] ? __might_sleep+0x95/0x190 [ 870.196652] ? kasan_check_write+0x14/0x20 [ 870.200885] ? __mutex_lock+0x7d9/0x17f0 [ 870.204945] ? genl_rcv_msg+0x13a/0x170 [ 870.208918] ? __lock_acquire+0x7f5/0x5140 [ 870.213154] ? mutex_trylock+0x2a0/0x2a0 [ 870.217214] ? graph_lock+0x170/0x170 [ 870.221020] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 870.226229] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 870.231250] ? validate_nla+0x2d9/0x7b0 [ 870.235233] hwsim_new_radio_nl+0x7b8/0xa60 [ 870.239554] ? nla_parse+0x358/0x4a0 [ 870.243268] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 870.248462] ? __netlink_ns_capable+0x100/0x130 [ 870.253135] genl_family_rcv_msg+0x889/0x1120 [ 870.257637] ? genl_rcv+0x40/0x40 [ 870.261096] ? lock_downgrade+0x8e0/0x8e0 [ 870.265241] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 870.270263] ? kasan_check_read+0x11/0x20 [ 870.274412] ? lock_acquire+0x1dc/0x520 [ 870.278381] ? genl_rcv+0x19/0x40 [ 870.281844] genl_rcv_msg+0xc6/0x170 [ 870.285558] netlink_rcv_skb+0x172/0x440 [ 870.289618] ? genl_family_rcv_msg+0x1120/0x1120 [ 870.294371] ? netlink_ack+0xbc0/0xbc0 [ 870.298286] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 870.303479] ? netlink_skb_destructor+0x210/0x210 [ 870.308326] genl_rcv+0x28/0x40 [ 870.311604] netlink_unicast+0x58b/0x740 [ 870.315671] ? netlink_attachskb+0x970/0x970 [ 870.320081] ? import_iovec+0x24b/0x420 [ 870.324579] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 870.329602] ? security_netlink_send+0x88/0xb0 [ 870.334186] netlink_sendmsg+0x9f0/0xfa0 [ 870.338251] ? netlink_unicast+0x740/0x740 [ 870.342487] ? security_socket_sendmsg+0x94/0xc0 [ 870.347242] ? netlink_unicast+0x740/0x740 [ 870.351476] sock_sendmsg+0xd5/0x120 [ 870.355189] ___sys_sendmsg+0x805/0x940 [ 870.359179] ? copy_msghdr_from_user+0x560/0x560 [ 870.363941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 870.369479] ? proc_fail_nth_write+0x96/0x1f0 [ 870.373977] ? __fget_light+0x2ef/0x430 [ 870.377948] ? fget_raw+0x20/0x20 [ 870.381399] ? find_held_lock+0x36/0x1c0 [ 870.385554] ? kasan_check_write+0x14/0x20 [ 870.389793] ? wait_for_completion+0x870/0x870 [ 870.394386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.399925] ? sockfd_lookup_light+0xc5/0x160 [ 870.404422] __sys_sendmsg+0x115/0x270 [ 870.408307] ? __ia32_sys_shutdown+0x80/0x80 [ 870.412713] ? __sb_end_write+0xac/0xe0 [ 870.416690] ? fput+0x130/0x1a0 [ 870.419967] ? ksys_write+0x1a6/0x250 [ 870.423777] __x64_sys_sendmsg+0x78/0xb0 [ 870.427838] do_syscall_64+0x1b1/0x800 [ 870.431723] ? finish_task_switch+0x1ca/0x840 [ 870.436217] ? syscall_return_slowpath+0x5c0/0x5c0 [ 870.441145] ? syscall_return_slowpath+0x30f/0x5c0 [ 870.446078] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 870.451443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.456290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.461473] RIP: 0033:0x455a09 [ 870.464656] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 870.472367] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 870.479636] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 870.486901] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 08:46:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0xaaaa0000]}}, 0x1c) 08:46:10 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x38, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0xbb}, 0x4}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}]}, &(0x7f0000000100)=0x10) 08:46:10 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2=0xe0000002, 0x0, 0x0, "6e7100000000000000000100"}, 0x2c) 08:46:10 executing program 6: socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000380)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 08:46:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0047fc2f07d82c99240970") syz_emit_ethernet(0x7e, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0xfec0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2=0xe0000002]}, {[@multicast1=0xe0000001]}, {}, {[@loopback=0x7f000001]}, {[@broadcast=0xffffffff]}, {[@multicast1=0xe0000001]}, {[@dev={0xac, 0x14, 0x14}]}]}]}}}}}}}, &(0x7f0000000000)) 08:46:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020f000011000000000000000000000008001200000003000000000000000000060000000000000000000000000000006000000100000000000000000000007fffffff00000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030005000000000002000000ac14ffbb00000000000000000100180000000000"], 0x88}, 0x1}, 0x0) 08:46:10 executing program 0 (fault-call:3 fault-nth:44): r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000180)=0x4, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1}, 0x0) 08:46:10 executing program 2: unshare(0x40000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000000c0)={"66696c746572000000001d00"}, &(0x7f0000000140)=0x44) [ 870.494167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 870.501437] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002b [ 870.581455] IPVS: set_ctl: invalid protocol: 0 224.0.0.2:0 [ 870.601836] IPVS: ftp: loaded support on port[0] = 21 [ 870.607863] FAULT_INJECTION: forcing a failure. [ 870.607863] name failslab, interval 1, probability 0, space 0, times 0 [ 870.608112] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 870.619470] CPU: 0 PID: 28267 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 870.636807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.646168] Call Trace: [ 870.648802] dump_stack+0x1b9/0x294 [ 870.652444] ? dump_stack_print_info.cold.2+0x52/0x52 [ 870.657655] should_fail.cold.4+0xa/0x1a [ 870.662343] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 870.667476] ? graph_lock+0x170/0x170 [ 870.671298] ? graph_lock+0x170/0x170 [ 870.675120] ? find_held_lock+0x36/0x1c0 [ 870.679199] ? __lock_is_held+0xb5/0x140 [ 870.683274] ? check_same_owner+0x320/0x320 [ 870.687604] ? rcu_note_context_switch+0x710/0x710 [ 870.692547] __should_failslab+0x124/0x180 [ 870.696788] should_failslab+0x9/0x14 [ 870.700596] kmem_cache_alloc+0x2af/0x760 [ 870.704746] ? is_bpf_text_address+0xd7/0x170 [ 870.709245] ? kernel_text_address+0x79/0xf0 [ 870.715532] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 870.720591] __kernfs_new_node+0xe7/0x580 [ 870.724746] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 870.729519] ? lock_downgrade+0x8e0/0x8e0 [ 870.734393] kernfs_new_node+0x80/0xf0 [ 870.738287] kernfs_create_dir_ns+0x3d/0x140 [ 870.742958] sysfs_create_dir_ns+0xbe/0x1d0 [ 870.747282] kobject_add_internal+0x354/0xac0 [ 870.751784] ? kobj_ns_type_registered+0x60/0x60 [ 870.756544] ? kfree_const+0x59/0x70 [ 870.760261] ? rcu_read_lock_sched_held+0x108/0x120 [ 870.765279] ? kfree+0x1e9/0x260 [ 870.768649] ? kfree_const+0x5e/0x70 [ 870.772492] kobject_add+0x13a/0x190 [ 870.776209] ? kset_create_and_add+0x190/0x190 [ 870.780797] ? kmem_cache_alloc_trace+0x616/0x780 [ 870.785640] ? kasan_check_write+0x14/0x20 [ 870.789887] ? do_raw_spin_lock+0xc1/0x200 [ 870.794129] get_device_parent.isra.27+0x360/0x5a0 [ 870.799067] device_add+0x2f1/0x16d0 [ 870.802790] ? device_private_init+0x230/0x230 [ 870.807374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.812927] wiphy_register+0x182e/0x24e0 [ 870.817090] ? wiphy_unregister+0x12b0/0x12b0 [ 870.821595] ? rcu_read_lock_sched_held+0x108/0x120 [ 870.826620] ? __kmalloc+0x5f9/0x760 [ 870.830348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.835893] ? ieee80211_cs_list_valid+0x7c/0x440 [ 870.840739] ? ieee80211_register_hw+0xc0b/0x35d0 [ 870.845586] ieee80211_register_hw+0x13cd/0x35d0 [ 870.850352] ? ieee80211_free_ack_frame+0x60/0x60 [ 870.855202] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 870.860229] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 870.866386] ? check_same_owner+0x320/0x320 [ 870.870712] ? __lock_acquire+0x7f5/0x5140 [ 870.874950] ? __might_sleep+0x95/0x190 [ 870.878927] ? kasan_check_write+0x14/0x20 [ 870.883164] ? __mutex_lock+0x7d9/0x17f0 [ 870.887227] ? genl_rcv_msg+0x13a/0x170 [ 870.891205] ? __lock_acquire+0x7f5/0x5140 [ 870.895443] ? mutex_trylock+0x2a0/0x2a0 [ 870.899514] ? graph_lock+0x170/0x170 [ 870.903316] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 870.908512] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 870.913531] ? validate_nla+0x2d9/0x7b0 [ 870.917528] hwsim_new_radio_nl+0x7b8/0xa60 [ 870.921846] ? nla_parse+0x358/0x4a0 [ 870.925576] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 870.930859] ? __netlink_ns_capable+0x100/0x130 [ 870.935541] genl_family_rcv_msg+0x889/0x1120 [ 870.940041] ? genl_rcv+0x40/0x40 [ 870.943592] ? lock_downgrade+0x8e0/0x8e0 [ 870.948033] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 870.953059] ? kasan_check_read+0x11/0x20 [ 870.957224] ? lock_acquire+0x1dc/0x520 [ 870.961203] ? genl_rcv+0x19/0x40 [ 870.964669] genl_rcv_msg+0xc6/0x170 [ 870.968385] netlink_rcv_skb+0x172/0x440 [ 870.972497] ? genl_family_rcv_msg+0x1120/0x1120 [ 870.977258] ? netlink_ack+0xbc0/0xbc0 [ 870.981144] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 870.986336] ? netlink_skb_destructor+0x210/0x210 [ 870.991180] genl_rcv+0x28/0x40 [ 870.994458] netlink_unicast+0x58b/0x740 [ 870.998531] ? netlink_attachskb+0x970/0x970 [ 871.002935] ? import_iovec+0x24b/0x420 [ 871.006915] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 871.011931] ? security_netlink_send+0x88/0xb0 [ 871.016529] netlink_sendmsg+0x9f0/0xfa0 [ 871.020598] ? netlink_unicast+0x740/0x740 [ 871.024834] ? security_socket_sendmsg+0x94/0xc0 [ 871.029589] ? netlink_unicast+0x740/0x740 [ 871.033827] sock_sendmsg+0xd5/0x120 [ 871.037542] ___sys_sendmsg+0x805/0x940 [ 871.041522] ? copy_msghdr_from_user+0x560/0x560 [ 871.046288] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 871.051824] ? proc_fail_nth_write+0x96/0x1f0 [ 871.056332] ? __fget_light+0x2ef/0x430 [ 871.060303] ? fget_raw+0x20/0x20 [ 871.063840] ? find_held_lock+0x36/0x1c0 [ 871.067930] ? kasan_check_write+0x14/0x20 [ 871.072172] ? wait_for_completion+0x870/0x870 [ 871.076769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 871.082306] ? sockfd_lookup_light+0xc5/0x160 [ 871.086805] __sys_sendmsg+0x115/0x270 [ 871.090867] ? __ia32_sys_shutdown+0x80/0x80 [ 871.095277] ? __sb_end_write+0xac/0xe0 [ 871.099251] ? fput+0x130/0x1a0 [ 871.102559] ? ksys_write+0x1a6/0x250 [ 871.106381] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 871.111320] __x64_sys_sendmsg+0x78/0xb0 [ 871.115507] do_syscall_64+0x1b1/0x800 [ 871.119401] ? finish_task_switch+0x1ca/0x840 [ 871.123901] ? syscall_return_slowpath+0x5c0/0x5c0 [ 871.128841] ? syscall_return_slowpath+0x30f/0x5c0 [ 871.133775] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 871.139143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.143993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.149178] RIP: 0033:0x455a09 [ 871.152364] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 871.160075] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 871.167597] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 871.175121] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 871.182388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 871.189667] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002c [ 871.197903] kobject_add_internal failed for ieee80211 (error: -12 parent: hwsim83) [ 871.227599] ------------[ cut here ]------------ [ 871.232807] kernfs: ns required in 'ieee80211' for 'phy82' [ 871.238624] WARNING: CPU: 1 PID: 28267 at fs/kernfs/dir.c:759 kernfs_add_one+0x406/0x4d0 [ 871.246851] Kernel panic - not syncing: panic_on_warn set ... [ 871.246851] [ 871.254219] CPU: 1 PID: 28267 Comm: syz-executor0 Not tainted 4.17.0-rc7+ #81 [ 871.261486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.270839] Call Trace: [ 871.273437] dump_stack+0x1b9/0x294 [ 871.277080] ? dump_stack_print_info.cold.2+0x52/0x52 [ 871.282287] ? kernfs_add_one+0x3f0/0x4d0 [ 871.286437] panic+0x22f/0x4de [ 871.289616] ? add_taint.cold.5+0x16/0x16 [ 871.293759] ? __warn.cold.8+0x148/0x1b3 [ 871.297820] ? kernfs_add_one+0x406/0x4d0 [ 871.301971] __warn.cold.8+0x163/0x1b3 [ 871.305865] ? kernfs_add_one+0x406/0x4d0 [ 871.310017] report_bug+0x252/0x2d0 [ 871.313652] do_error_trap+0x1de/0x490 [ 871.317550] ? math_error+0x420/0x420 [ 871.321346] ? vprintk_default+0x28/0x30 [ 871.325400] ? vprintk_func+0x81/0xe7 [ 871.329193] ? printk+0x9e/0xba [ 871.332477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.337319] do_invalid_op+0x1b/0x20 [ 871.341030] invalid_op+0x14/0x20 [ 871.344489] RIP: 0010:kernfs_add_one+0x406/0x4d0 [ 871.349232] RSP: 0018:ffff8801a7d0ece0 EFLAGS: 00010286 [ 871.354591] RAX: 000000000000002e RBX: ffffffff87d5d6e0 RCX: ffffc90001e99000 [ 871.361854] RDX: 0000000000040000 RSI: ffffffff81610561 RDI: ffff8801a7d0e840 [ 871.369111] RBP: ffff8801a7d0ed20 R08: ffff8801782b2240 R09: 0000000000000006 [ 871.376374] R10: ffff8801782b2240 R11: 0000000000000000 R12: ffff8801d7029d40 [ 871.383634] R13: ffffffff885e19c0 R14: 0000000000000020 R15: 0000000000000000 [ 871.390920] ? vprintk_func+0x81/0xe7 [ 871.394734] kernfs_create_link+0x112/0x180 [ 871.399047] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 871.404312] sysfs_create_link+0x65/0xc0 [ 871.408371] device_add+0x7a0/0x16d0 [ 871.412082] ? device_private_init+0x230/0x230 [ 871.416663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.422211] wiphy_register+0x182e/0x24e0 [ 871.426368] ? wiphy_unregister+0x12b0/0x12b0 [ 871.430853] ? rcu_read_lock_sched_held+0x108/0x120 [ 871.435870] ? __kmalloc+0x5f9/0x760 [ 871.439583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.445123] ? ieee80211_cs_list_valid+0x7c/0x440 [ 871.449957] ? ieee80211_register_hw+0xc0b/0x35d0 [ 871.454785] ieee80211_register_hw+0x13cd/0x35d0 [ 871.459545] ? ieee80211_free_ack_frame+0x60/0x60 [ 871.464389] mac80211_hwsim_new_radio+0x1da2/0x33b0 [ 871.469411] ? __rhashtable_insert_fast.constprop.53+0xf50/0xf50 [ 871.475549] ? check_same_owner+0x320/0x320 [ 871.479872] ? __lock_acquire+0x7f5/0x5140 [ 871.484109] ? __might_sleep+0x95/0x190 [ 871.488088] ? kasan_check_write+0x14/0x20 [ 871.492316] ? __mutex_lock+0x7d9/0x17f0 [ 871.496361] ? genl_rcv_msg+0x13a/0x170 [ 871.500321] ? __lock_acquire+0x7f5/0x5140 [ 871.504551] ? mutex_trylock+0x2a0/0x2a0 [ 871.508615] ? graph_lock+0x170/0x170 [ 871.512425] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 871.517628] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 871.522635] ? validate_nla+0x2d9/0x7b0 [ 871.526607] hwsim_new_radio_nl+0x7b8/0xa60 [ 871.530933] ? nla_parse+0x358/0x4a0 [ 871.534640] ? mac80211_hwsim_new_radio+0x33b0/0x33b0 [ 871.539824] ? __netlink_ns_capable+0x100/0x130 [ 871.544485] genl_family_rcv_msg+0x889/0x1120 [ 871.548970] ? genl_rcv+0x40/0x40 [ 871.552415] ? lock_downgrade+0x8e0/0x8e0 [ 871.556564] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 871.561571] ? kasan_check_read+0x11/0x20 [ 871.565717] ? lock_acquire+0x1dc/0x520 [ 871.569677] ? genl_rcv+0x19/0x40 [ 871.573121] genl_rcv_msg+0xc6/0x170 [ 871.576823] netlink_rcv_skb+0x172/0x440 [ 871.580869] ? genl_family_rcv_msg+0x1120/0x1120 [ 871.585613] ? netlink_ack+0xbc0/0xbc0 [ 871.589493] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 871.594672] ? netlink_skb_destructor+0x210/0x210 [ 871.599501] genl_rcv+0x28/0x40 [ 871.602779] netlink_unicast+0x58b/0x740 [ 871.606847] ? netlink_attachskb+0x970/0x970 [ 871.611250] ? import_iovec+0x24b/0x420 [ 871.615218] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 871.620223] ? security_netlink_send+0x88/0xb0 [ 871.624793] netlink_sendmsg+0x9f0/0xfa0 [ 871.628842] ? netlink_unicast+0x740/0x740 [ 871.633074] ? security_socket_sendmsg+0x94/0xc0 [ 871.637818] ? netlink_unicast+0x740/0x740 [ 871.642046] sock_sendmsg+0xd5/0x120 [ 871.645743] ___sys_sendmsg+0x805/0x940 [ 871.649701] ? copy_msghdr_from_user+0x560/0x560 [ 871.654446] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 871.659971] ? proc_fail_nth_write+0x96/0x1f0 [ 871.664461] ? __fget_light+0x2ef/0x430 [ 871.668434] ? fget_raw+0x20/0x20 [ 871.671886] ? find_held_lock+0x36/0x1c0 [ 871.675955] ? kasan_check_write+0x14/0x20 [ 871.680192] ? wait_for_completion+0x870/0x870 [ 871.684773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 871.690296] ? sockfd_lookup_light+0xc5/0x160 [ 871.695140] __sys_sendmsg+0x115/0x270 [ 871.699025] ? __ia32_sys_shutdown+0x80/0x80 [ 871.703445] ? __sb_end_write+0xac/0xe0 [ 871.707426] ? fput+0x130/0x1a0 [ 871.710709] ? ksys_write+0x1a6/0x250 [ 871.714517] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 871.719371] __x64_sys_sendmsg+0x78/0xb0 [ 871.723433] do_syscall_64+0x1b1/0x800 [ 871.727306] ? finish_task_switch+0x1ca/0x840 [ 871.731786] ? syscall_return_slowpath+0x5c0/0x5c0 [ 871.736734] ? syscall_return_slowpath+0x30f/0x5c0 [ 871.741657] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 871.747029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.751890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.757083] RIP: 0033:0x455a09 [ 871.760272] RSP: 002b:00007fe5fe3cac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 871.767985] RAX: ffffffffffffffda RBX: 00007fe5fe3cb6d4 RCX: 0000000000455a09 [ 871.775243] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000013 [ 871.782500] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 871.789757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 871.797018] R13: 00000000000005ce R14: 00000000006fdbf0 R15: 000000000000002c [ 871.805276] Dumping ftrace buffer: [ 871.809166] (ftrace buffer empty) [ 871.813058] Kernel Offset: disabled [ 871.816694] Rebooting in 86400 seconds..