ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.193677][T25025] RSP: 002b:00007fe8db755c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1311.202291][T25025] RAX: ffffffffffffffda RBX: 00007fe8db7566d4 RCX: 000000000045aff9 [ 1311.210376][T25025] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 00000000200000c0 [ 1311.218356][T25025] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1311.226337][T25025] R10: 0000000000005000 R11: 0000000000000246 R12: 0000000000000004 [ 1311.234392][T25025] R13: 0000000000000723 R14: 00000000004c8629 R15: 0000000000000009 [ 1311.333599][T25036] FAULT_INJECTION: forcing a failure. [ 1311.333599][T25036] name failslab, interval 1, probability 0, space 0, times 0 [ 1311.346488][T25036] CPU: 1 PID: 25036 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1311.355702][T25036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.365765][T25036] Call Trace: [ 1311.369075][T25036] dump_stack+0x11d/0x181 [ 1311.373589][T25036] should_fail.cold+0xa/0x1a [ 1311.378262][T25036] __should_failslab+0xee/0x130 [ 1311.383122][T25036] should_failslab+0x9/0x14 [ 1311.387637][T25036] kmem_cache_alloc+0x29/0x5d0 [ 1311.392413][T25036] ? fib6_node_lookup+0xed/0x120 [ 1311.397458][T25036] dst_alloc+0xad/0x149 [ 1311.401654][T25036] ip6_dst_alloc+0x3d/0x80 [ 1311.406078][T25036] ip6_rt_cache_alloc+0x12b/0x480 [ 1311.411178][T25036] ip6_pol_route+0x5d2/0x730 [ 1311.415832][T25036] ip6_pol_route_output+0x48/0x60 [ 1311.420872][T25036] fib6_rule_lookup+0x3d6/0x470 [ 1311.425728][T25036] ? ip6_pol_route_input+0x70/0x70 [ 1311.430854][T25036] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1311.436596][T25036] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1311.441891][T25036] ip6_route_output_flags_noref+0x16b/0x230 [ 1311.447814][T25036] ip6_route_output_flags+0x50/0x1a0 [ 1311.453111][T25036] ip6_dst_lookup_tail+0x25d/0xc50 [ 1311.458226][T25036] ? debug_smp_processor_id+0x43/0x137 [ 1311.463710][T25036] ? dst_destroy+0x210/0x210 [ 1311.468369][T25036] ? debug_smp_processor_id+0x43/0x137 [ 1311.474884][T25036] ? dst_destroy+0x210/0x210 [ 1311.479634][T25036] ? __call_rcu+0x153/0x390 [ 1311.484187][T25036] ip6_dst_lookup_flow+0x5c/0x110 [ 1311.489225][T25036] rawv6_sendmsg+0x9be/0x2340 [ 1311.493930][T25036] ? __const_udelay+0x36/0x40 [ 1311.498708][T25036] ? __udelay+0x10/0x20 [ 1311.502876][T25036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1311.509226][T25036] ? aa_label_sk_perm+0x89/0xe0 [ 1311.514149][T25036] ? aa_sk_perm+0x1d3/0x590 [ 1311.518676][T25036] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1311.525091][T25036] inet_sendmsg+0x6d/0x90 [ 1311.529454][T25036] ? inet_sendmsg+0x6d/0x90 11:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x1300}, 0x0) 11:03:30 executing program 0 (fault-call:4 fault-nth:10): r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1311.534008][T25036] ? inet_send_prepare+0x200/0x200 [ 1311.539303][T25036] sock_sendmsg+0x9f/0xc0 [ 1311.543668][T25036] ____sys_sendmsg+0x212/0x4d0 [ 1311.548450][T25036] ___sys_sendmsg+0xb5/0x100 [ 1311.553066][T25036] ? __fget+0xb8/0x1d0 [ 1311.557178][T25036] ? __fget_light+0xaf/0x190 [ 1311.561793][T25036] ? __fdget+0x2c/0x40 [ 1311.565876][T25036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1311.572136][T25036] __sys_sendmmsg+0x123/0x350 [ 1311.576846][T25036] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1311.583090][T25036] ? fput_many+0xec/0x130 [ 1311.587471][T25036] ? fput+0x29/0x30 [ 1311.591359][T25036] ? ksys_write+0x145/0x1b0 [ 1311.595889][T25036] __x64_sys_sendmmsg+0x64/0x80 [ 1311.600739][T25036] do_syscall_64+0xcc/0x3a0 [ 1311.605327][T25036] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1311.611213][T25036] RIP: 0033:0x45aff9 [ 1311.615098][T25036] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1311.634930][T25036] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1311.643409][T25036] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1311.651372][T25036] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1311.659332][T25036] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1311.667288][T25036] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1311.675283][T25036] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000017 11:03:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x28, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0x2, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1311.841621][T25046] FAULT_INJECTION: forcing a failure. [ 1311.841621][T25046] name failslab, interval 1, probability 0, space 0, times 0 11:03:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x1400}, 0x0) [ 1311.969201][T25046] CPU: 0 PID: 25046 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1311.977920][T25046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1311.988179][T25046] Call Trace: [ 1311.991531][T25046] dump_stack+0x11d/0x181 [ 1311.995916][T25046] should_fail.cold+0xa/0x1a [ 1312.000535][T25046] __should_failslab+0xee/0x130 [ 1312.005400][T25046] should_failslab+0x9/0x14 [ 1312.009932][T25046] __kmalloc_track_caller+0x4f/0x690 11:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0x12, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1312.015237][T25046] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1312.021494][T25046] ? ida_alloc_range+0x5a8/0x7a0 [ 1312.026441][T25046] ? kstrdup_const+0x74/0x80 [ 1312.031060][T25046] kstrdup+0x43/0x80 [ 1312.034966][T25046] kstrdup_const+0x74/0x80 [ 1312.039395][T25046] alloc_vfsmnt+0xbc/0x3e0 [ 1312.043820][T25046] clone_mnt+0x60/0x8e0 [ 1312.047985][T25046] copy_tree+0xd4/0x650 [ 1312.052149][T25046] __do_loopback.isra.0+0xf8/0x230 [ 1312.057348][T25046] do_mount+0x1179/0x14f0 [ 1312.061695][T25046] ksys_mount+0xe8/0x160 [ 1312.065947][T25046] __x64_sys_mount+0x70/0x90 [ 1312.070552][T25046] do_syscall_64+0xcc/0x3a0 [ 1312.075154][T25046] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1312.081056][T25046] RIP: 0033:0x45aff9 [ 1312.084970][T25046] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.104580][T25046] RSP: 002b:00007fe8db755c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 11:03:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1312.113058][T25046] RAX: ffffffffffffffda RBX: 00007fe8db7566d4 RCX: 000000000045aff9 [ 1312.121076][T25046] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 00000000200000c0 [ 1312.129109][T25046] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1312.137086][T25046] R10: 0000000000005000 R11: 0000000000000246 R12: 0000000000000004 [ 1312.145066][T25046] R13: 0000000000000723 R14: 00000000004c8629 R15: 000000000000000a 11:03:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 11:03:31 executing program 3 (fault-call:10 fault-nth:24): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 11:03:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2d, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1312.561766][T25080] FAULT_INJECTION: forcing a failure. [ 1312.561766][T25080] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.574467][T25080] CPU: 0 PID: 25080 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1312.583149][T25080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1312.593211][T25080] Call Trace: [ 1312.596514][T25080] dump_stack+0x11d/0x181 [ 1312.600872][T25080] should_fail.cold+0xa/0x1a [ 1312.605480][T25080] __should_failslab+0xee/0x130 [ 1312.610346][T25080] should_failslab+0x9/0x14 [ 1312.614860][T25080] kmem_cache_alloc+0x29/0x5d0 [ 1312.619717][T25080] ? fib6_node_lookup+0xed/0x120 [ 1312.624663][T25080] dst_alloc+0xad/0x149 [ 1312.628898][T25080] ip6_dst_alloc+0x3d/0x80 [ 1312.633312][T25080] ip6_rt_cache_alloc+0x12b/0x480 [ 1312.638335][T25080] ip6_pol_route+0x5d2/0x730 [ 1312.643011][T25080] ip6_pol_route_output+0x48/0x60 [ 1312.648153][T25080] fib6_rule_lookup+0x3d6/0x470 [ 1312.653016][T25080] ? ip6_pol_route_input+0x70/0x70 [ 1312.658135][T25080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1312.664055][T25080] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1312.669329][T25080] ip6_route_output_flags_noref+0x16b/0x230 [ 1312.675267][T25080] ip6_route_output_flags+0x50/0x1a0 [ 1312.680562][T25080] ip6_dst_lookup_tail+0x25d/0xc50 [ 1312.685672][T25080] ? debug_smp_processor_id+0x43/0x137 [ 1312.691144][T25080] ? dst_destroy+0x210/0x210 [ 1312.695750][T25080] ? debug_smp_processor_id+0x43/0x137 [ 1312.701208][T25080] ? dst_destroy+0x210/0x210 [ 1312.705850][T25080] ? __call_rcu+0x153/0x390 [ 1312.710375][T25080] ip6_dst_lookup_flow+0x5c/0x110 [ 1312.715411][T25080] rawv6_sendmsg+0x9be/0x2340 [ 1312.720129][T25080] ? __const_udelay+0x36/0x40 [ 1312.724898][T25080] ? __udelay+0x10/0x20 [ 1312.729241][T25080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1312.735721][T25080] ? aa_label_sk_perm+0x89/0xe0 [ 1312.740576][T25080] ? aa_sk_perm+0x1d3/0x590 [ 1312.745094][T25080] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1312.751437][T25080] inet_sendmsg+0x6d/0x90 [ 1312.755770][T25080] ? inet_sendmsg+0x6d/0x90 [ 1312.760447][T25080] ? inet_send_prepare+0x200/0x200 [ 1312.765657][T25080] sock_sendmsg+0x9f/0xc0 [ 1312.770018][T25080] ____sys_sendmsg+0x212/0x4d0 [ 1312.774791][T25080] ___sys_sendmsg+0xb5/0x100 [ 1312.779384][T25080] ? __fget+0xb8/0x1d0 [ 1312.783467][T25080] ? __fget_light+0xaf/0x190 [ 1312.788075][T25080] ? __fdget+0x2c/0x40 [ 1312.792158][T25080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1312.798453][T25080] __sys_sendmmsg+0x123/0x350 [ 1312.803209][T25080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1312.809488][T25080] ? fput_many+0xec/0x130 [ 1312.813825][T25080] ? fput+0x29/0x30 [ 1312.817648][T25080] ? ksys_write+0x145/0x1b0 [ 1312.822173][T25080] __x64_sys_sendmmsg+0x64/0x80 [ 1312.827025][T25080] do_syscall_64+0xcc/0x3a0 [ 1312.831536][T25080] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1312.837429][T25080] RIP: 0033:0x45aff9 [ 1312.841332][T25080] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1312.861198][T25080] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1312.870137][T25080] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1312.879233][T25080] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1312.887201][T25080] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1312.895179][T25080] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1312.903154][T25080] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000018 11:03:31 executing program 0 (fault-call:4 fault-nth:11): r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x2403}, 0x0) 11:03:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x30, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1313.079185][T25088] FAULT_INJECTION: forcing a failure. [ 1313.079185][T25088] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.185062][T25088] CPU: 1 PID: 25088 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1313.194241][T25088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.204328][T25088] Call Trace: [ 1313.207708][T25088] dump_stack+0x11d/0x181 [ 1313.212253][T25088] should_fail.cold+0xa/0x1a [ 1313.217064][T25088] __should_failslab+0xee/0x130 [ 1313.222102][T25088] should_failslab+0x9/0x14 [ 1313.226634][T25088] kmem_cache_alloc+0x29/0x5d0 [ 1313.231693][T25088] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1313.238580][T25088] alloc_vfsmnt+0x4c/0x3e0 [ 1313.243880][T25088] clone_mnt+0x60/0x8e0 [ 1313.248413][T25088] ? __read_once_size+0x5a/0xe0 [ 1313.253366][T25088] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1313.259233][T25088] copy_tree+0x2b3/0x650 [ 1313.263915][T25088] __do_loopback.isra.0+0xf8/0x230 [ 1313.269177][T25088] do_mount+0x1179/0x14f0 [ 1313.273607][T25088] ksys_mount+0xe8/0x160 [ 1313.278016][T25088] __x64_sys_mount+0x70/0x90 [ 1313.282670][T25088] do_syscall_64+0xcc/0x3a0 [ 1313.287306][T25088] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1313.293207][T25088] RIP: 0033:0x45aff9 [ 1313.297454][T25088] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1313.317893][T25088] RSP: 002b:00007fe8db755c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1313.326611][T25088] RAX: ffffffffffffffda RBX: 00007fe8db7566d4 RCX: 000000000045aff9 11:03:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x2, 0x0, @remote, 0x2}, 0x1c) 11:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x3000}, 0x0) [ 1313.334593][T25088] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 00000000200000c0 [ 1313.343104][T25088] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1313.351275][T25088] R10: 0000000000005000 R11: 0000000000000246 R12: 0000000000000004 [ 1313.359365][T25088] R13: 0000000000000723 R14: 00000000004c8629 R15: 000000000000000b 11:03:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x32, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:32 executing program 3 (fault-call:10 fault-nth:25): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 11:03:32 executing program 0 (fault-call:4 fault-nth:12): r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1313.794612][T25121] FAULT_INJECTION: forcing a failure. [ 1313.794612][T25121] name failslab, interval 1, probability 0, space 0, times 0 [ 1313.807417][T25121] CPU: 0 PID: 25121 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1313.816145][T25121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1313.826308][T25121] Call Trace: [ 1313.829654][T25121] dump_stack+0x11d/0x181 [ 1313.834053][T25121] should_fail.cold+0xa/0x1a [ 1313.838687][T25121] __should_failslab+0xee/0x130 [ 1313.843550][T25121] should_failslab+0x9/0x14 [ 1313.848209][T25121] kmem_cache_alloc+0x29/0x5d0 [ 1313.852991][T25121] ? fib6_node_lookup+0xed/0x120 [ 1313.864399][T25121] dst_alloc+0xad/0x149 [ 1313.868615][T25121] ip6_dst_alloc+0x3d/0x80 [ 1313.873078][T25121] ip6_rt_cache_alloc+0x12b/0x480 [ 1313.878187][T25121] ip6_pol_route+0x5d2/0x730 [ 1313.882802][T25121] ip6_pol_route_output+0x48/0x60 [ 1313.887847][T25121] fib6_rule_lookup+0x3d6/0x470 [ 1313.892721][T25121] ? ip6_pol_route_input+0x70/0x70 [ 1313.897914][T25121] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1313.903842][T25121] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1313.909062][T25121] ip6_route_output_flags_noref+0x16b/0x230 [ 1313.916388][T25121] ip6_route_output_flags+0x50/0x1a0 [ 1313.922649][T25121] ip6_dst_lookup_tail+0x25d/0xc50 [ 1313.927794][T25121] ? debug_smp_processor_id+0x43/0x137 [ 1313.933469][T25121] ? dst_destroy+0x210/0x210 [ 1313.938064][T25121] ? debug_smp_processor_id+0x43/0x137 [ 1313.943539][T25121] ? dst_destroy+0x210/0x210 [ 1313.948142][T25121] ? __call_rcu+0x153/0x390 [ 1313.952690][T25121] ip6_dst_lookup_flow+0x5c/0x110 [ 1313.957859][T25121] rawv6_sendmsg+0x9be/0x2340 [ 1313.962627][T25121] ? __const_udelay+0x36/0x40 [ 1313.967664][T25121] ? __udelay+0x10/0x20 [ 1313.971840][T25121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1313.978174][T25121] ? aa_label_sk_perm+0x89/0xe0 [ 1313.983046][T25121] ? aa_sk_perm+0x1d3/0x590 [ 1313.987590][T25121] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1313.993930][T25121] inet_sendmsg+0x6d/0x90 [ 1313.998268][T25121] ? inet_sendmsg+0x6d/0x90 [ 1314.003083][T25121] ? inet_send_prepare+0x200/0x200 [ 1314.008577][T25121] sock_sendmsg+0x9f/0xc0 [ 1314.013027][T25121] ____sys_sendmsg+0x212/0x4d0 [ 1314.017902][T25121] ___sys_sendmsg+0xb5/0x100 [ 1314.022513][T25121] ? __fget+0xb8/0x1d0 [ 1314.026725][T25121] ? __fget_light+0xaf/0x190 [ 1314.031476][T25121] ? __fdget+0x2c/0x40 [ 1314.035561][T25121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1314.041846][T25121] __sys_sendmmsg+0x123/0x350 [ 1314.046728][T25121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1314.053062][T25121] ? fput_many+0xec/0x130 [ 1314.057492][T25121] ? fput+0x29/0x30 [ 1314.061339][T25121] ? ksys_write+0x145/0x1b0 [ 1314.066002][T25121] __x64_sys_sendmmsg+0x64/0x80 [ 1314.071085][T25121] do_syscall_64+0xcc/0x3a0 [ 1314.075610][T25121] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1314.081618][T25121] RIP: 0033:0x45aff9 [ 1314.086745][T25121] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1314.106833][T25121] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1314.115258][T25121] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1314.123327][T25121] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1314.131357][T25121] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:03:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x34, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 11:03:33 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1314.139353][T25121] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1314.149594][T25121] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000019 11:03:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x35, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x3, 0x0, @remote, 0x2}, 0x1c) 11:03:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 11:03:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:33 executing program 3 (fault-call:10 fault-nth:26): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 11:03:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3d, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1314.868813][T25165] FAULT_INJECTION: forcing a failure. [ 1314.868813][T25165] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.881543][T25165] CPU: 1 PID: 25165 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1314.890292][T25165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1314.900447][T25165] Call Trace: [ 1314.903818][T25165] dump_stack+0x11d/0x181 [ 1314.908214][T25165] should_fail.cold+0xa/0x1a [ 1314.912943][T25165] __should_failslab+0xee/0x130 11:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8100}, 0x0) [ 1314.917926][T25165] should_failslab+0x9/0x14 [ 1314.922437][T25165] kmem_cache_alloc+0x29/0x5d0 [ 1314.927222][T25165] ? fib6_node_lookup+0xed/0x120 [ 1314.932236][T25165] dst_alloc+0xad/0x149 [ 1314.936595][T25165] ip6_dst_alloc+0x3d/0x80 [ 1314.941021][T25165] ip6_rt_cache_alloc+0x12b/0x480 [ 1314.946119][T25165] ip6_pol_route+0x5d2/0x730 [ 1314.950858][T25165] ip6_pol_route_output+0x48/0x60 [ 1314.956004][T25165] fib6_rule_lookup+0x3d6/0x470 [ 1314.960894][T25165] ? ip6_pol_route_input+0x70/0x70 11:03:34 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5002, 0x0) 11:03:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x44, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1314.966148][T25165] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1314.972000][T25165] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1314.977291][T25165] ip6_route_output_flags_noref+0x16b/0x230 [ 1314.983271][T25165] ip6_route_output_flags+0x50/0x1a0 [ 1314.988591][T25165] ip6_dst_lookup_tail+0x25d/0xc50 [ 1314.993729][T25165] ? debug_smp_processor_id+0x43/0x137 [ 1314.999271][T25165] ? dst_destroy+0x210/0x210 [ 1315.004324][T25165] ? debug_smp_processor_id+0x43/0x137 [ 1315.009811][T25165] ? dst_destroy+0x210/0x210 [ 1315.014736][T25165] ? __call_rcu+0x153/0x390 [ 1315.019287][T25165] ip6_dst_lookup_flow+0x5c/0x110 [ 1315.024307][T25165] rawv6_sendmsg+0x9be/0x2340 [ 1315.028974][T25165] ? process_measurement+0x149/0x1190 [ 1315.034341][T25165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1315.040794][T25165] ? aa_label_sk_perm+0x89/0xe0 [ 1315.045661][T25165] ? aa_sk_perm+0x1d3/0x590 [ 1315.050158][T25165] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1315.056478][T25165] inet_sendmsg+0x6d/0x90 [ 1315.060814][T25165] ? inet_sendmsg+0x6d/0x90 [ 1315.065323][T25165] ? inet_send_prepare+0x200/0x200 [ 1315.070425][T25165] sock_sendmsg+0x9f/0xc0 [ 1315.074746][T25165] ____sys_sendmsg+0x212/0x4d0 [ 1315.080253][T25165] ___sys_sendmsg+0xb5/0x100 [ 1315.084869][T25165] ? __fget+0xb8/0x1d0 [ 1315.088937][T25165] ? __fget_light+0xaf/0x190 [ 1315.093578][T25165] ? __fdget+0x2c/0x40 [ 1315.097641][T25165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1315.103929][T25165] __sys_sendmmsg+0x123/0x350 [ 1315.108652][T25165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1315.115033][T25165] ? fput_many+0xec/0x130 [ 1315.119446][T25165] ? fput+0x29/0x30 [ 1315.123293][T25165] ? ksys_write+0x145/0x1b0 [ 1315.127801][T25165] __x64_sys_sendmmsg+0x64/0x80 [ 1315.132895][T25165] do_syscall_64+0xcc/0x3a0 [ 1315.137532][T25165] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1315.143419][T25165] RIP: 0033:0x45aff9 [ 1315.147316][T25165] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1315.167005][T25165] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1315.175574][T25165] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1315.183647][T25165] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1315.191630][T25165] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1315.199598][T25165] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1315.207582][T25165] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000001a 11:03:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x4, 0x0, @remote, 0x2}, 0x1c) 11:03:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8701}, 0x0) 11:03:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x45, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:34 executing program 3 (fault-call:10 fault-nth:27): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 11:03:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x48, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1315.854932][T25202] FAULT_INJECTION: forcing a failure. [ 1315.854932][T25202] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.867887][T25202] CPU: 0 PID: 25202 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1315.876777][T25202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1315.886836][T25202] Call Trace: [ 1315.890857][T25202] dump_stack+0x11d/0x181 [ 1315.895295][T25202] should_fail.cold+0xa/0x1a [ 1315.900035][T25202] __should_failslab+0xee/0x130 [ 1315.904905][T25202] should_failslab+0x9/0x14 [ 1315.909471][T25202] kmem_cache_alloc+0x29/0x5d0 [ 1315.914266][T25202] ? fib6_node_lookup+0xed/0x120 [ 1315.919228][T25202] dst_alloc+0xad/0x149 [ 1315.923415][T25202] ip6_dst_alloc+0x3d/0x80 [ 1315.927838][T25202] ip6_rt_cache_alloc+0x12b/0x480 [ 1315.933139][T25202] ip6_pol_route+0x5d2/0x730 [ 1315.937774][T25202] ip6_pol_route_output+0x48/0x60 [ 1315.942841][T25202] fib6_rule_lookup+0x3d6/0x470 [ 1315.947705][T25202] ? ip6_pol_route_input+0x70/0x70 [ 1315.952888][T25202] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1315.958628][T25202] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1315.963860][T25202] ip6_route_output_flags_noref+0x16b/0x230 [ 1315.969779][T25202] ip6_route_output_flags+0x50/0x1a0 [ 1315.975083][T25202] ip6_dst_lookup_tail+0x25d/0xc50 [ 1315.980211][T25202] ? debug_smp_processor_id+0x43/0x137 [ 1315.985704][T25202] ? dst_destroy+0x210/0x210 [ 1315.990310][T25202] ? debug_smp_processor_id+0x43/0x137 [ 1315.995822][T25202] ? dst_destroy+0x210/0x210 [ 1316.000424][T25202] ? __call_rcu+0x153/0x390 [ 1316.004948][T25202] ip6_dst_lookup_flow+0x5c/0x110 [ 1316.009985][T25202] rawv6_sendmsg+0x9be/0x2340 [ 1316.014716][T25202] ? process_measurement+0x149/0x1190 [ 1316.020126][T25202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1316.026381][T25202] ? aa_label_sk_perm+0x89/0xe0 [ 1316.031260][T25202] ? aa_sk_perm+0x1d3/0x590 [ 1316.035890][T25202] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1316.042237][T25202] inet_sendmsg+0x6d/0x90 [ 1316.046590][T25202] ? inet_sendmsg+0x6d/0x90 11:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x200000}, 0x0) [ 1316.051114][T25202] ? inet_send_prepare+0x200/0x200 [ 1316.056267][T25202] sock_sendmsg+0x9f/0xc0 [ 1316.060617][T25202] ____sys_sendmsg+0x212/0x4d0 [ 1316.065409][T25202] ___sys_sendmsg+0xb5/0x100 [ 1316.070047][T25202] ? __fget+0xb8/0x1d0 [ 1316.074129][T25202] ? __fget_light+0xaf/0x190 [ 1316.078769][T25202] ? __fdget+0x2c/0x40 [ 1316.082856][T25202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1316.089119][T25202] __sys_sendmmsg+0x123/0x350 [ 1316.093893][T25202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1316.100229][T25202] ? fput_many+0xec/0x130 [ 1316.104649][T25202] ? fput+0x29/0x30 [ 1316.108471][T25202] ? ksys_write+0x145/0x1b0 [ 1316.113108][T25202] __x64_sys_sendmmsg+0x64/0x80 [ 1316.118099][T25202] do_syscall_64+0xcc/0x3a0 [ 1316.122657][T25202] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1316.128682][T25202] RIP: 0033:0x45aff9 [ 1316.132675][T25202] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:03:35 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5003, 0x0) 11:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 1316.152368][T25202] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1316.160899][T25202] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1316.168954][T25202] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1316.177042][T25202] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1316.185138][T25202] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1316.193118][T25202] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000001b 11:03:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x5, 0x0, @remote, 0x2}, 0x1c) 11:03:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 11:03:35 executing program 3 (fault-call:10 fault-nth:28): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 11:03:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4d, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:35 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5004, 0x0) 11:03:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x50, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 1316.953171][T25252] FAULT_INJECTION: forcing a failure. [ 1316.953171][T25252] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.965902][T25252] CPU: 1 PID: 25252 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1316.974667][T25252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1316.984726][T25252] Call Trace: [ 1316.988030][T25252] dump_stack+0x11d/0x181 [ 1316.992456][T25252] should_fail.cold+0xa/0x1a [ 1316.997297][T25252] __should_failslab+0xee/0x130 [ 1317.002166][T25252] should_failslab+0x9/0x14 [ 1317.006834][T25252] kmem_cache_alloc+0x29/0x5d0 [ 1317.011961][T25252] ? fib6_node_lookup+0xed/0x120 [ 1317.016918][T25252] dst_alloc+0xad/0x149 [ 1317.021098][T25252] ip6_dst_alloc+0x3d/0x80 [ 1317.025615][T25252] ip6_rt_cache_alloc+0x12b/0x480 [ 1317.030733][T25252] ip6_pol_route+0x5d2/0x730 [ 1317.035344][T25252] ip6_pol_route_output+0x48/0x60 [ 1317.040603][T25252] fib6_rule_lookup+0x3d6/0x470 [ 1317.045551][T25252] ? ip6_pol_route_input+0x70/0x70 [ 1317.050675][T25252] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1317.056445][T25252] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1317.061738][T25252] ip6_route_output_flags_noref+0x16b/0x230 [ 1317.067836][T25252] ip6_route_output_flags+0x50/0x1a0 [ 1317.073208][T25252] ip6_dst_lookup_tail+0x25d/0xc50 [ 1317.078342][T25252] ? debug_smp_processor_id+0x43/0x137 [ 1317.083907][T25252] ? dst_destroy+0x210/0x210 [ 1317.088509][T25252] ? debug_smp_processor_id+0x43/0x137 [ 1317.094094][T25252] ? dst_destroy+0x210/0x210 [ 1317.098704][T25252] ? __call_rcu+0x153/0x390 [ 1317.103222][T25252] ip6_dst_lookup_flow+0x5c/0x110 [ 1317.108276][T25252] rawv6_sendmsg+0x9be/0x2340 [ 1317.113034][T25252] ? process_measurement+0x149/0x1190 [ 1317.118521][T25252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1317.124859][T25252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1317.131156][T25252] ? aa_label_sk_perm+0x89/0xe0 [ 1317.136208][T25252] ? aa_sk_perm+0x1d3/0x590 [ 1317.140798][T25252] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1317.147246][T25252] inet_sendmsg+0x6d/0x90 [ 1317.151671][T25252] ? inet_sendmsg+0x6d/0x90 [ 1317.156382][T25252] ? inet_send_prepare+0x200/0x200 [ 1317.161548][T25252] sock_sendmsg+0x9f/0xc0 [ 1317.165901][T25252] ____sys_sendmsg+0x212/0x4d0 [ 1317.170918][T25252] ___sys_sendmsg+0xb5/0x100 [ 1317.175659][T25252] ? __fget+0xb8/0x1d0 [ 1317.179753][T25252] ? __fget_light+0xaf/0x190 [ 1317.184368][T25252] ? __fdget+0x2c/0x40 [ 1317.188452][T25252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1317.194706][T25252] __sys_sendmmsg+0x123/0x350 [ 1317.199400][T25252] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1317.205668][T25252] ? fput_many+0xec/0x130 [ 1317.210007][T25252] ? fput+0x29/0x30 [ 1317.214077][T25252] ? ksys_write+0x145/0x1b0 [ 1317.218609][T25252] __x64_sys_sendmmsg+0x64/0x80 [ 1317.223470][T25252] do_syscall_64+0xcc/0x3a0 [ 1317.228165][T25252] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1317.234067][T25252] RIP: 0033:0x45aff9 [ 1317.237970][T25252] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1317.257746][T25252] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1317.266160][T25252] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1317.274263][T25252] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1317.283604][T25252] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1317.291614][T25252] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:03:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1317.299716][T25252] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000001c 11:03:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x6, 0x0, @remote, 0x2}, 0x1c) 11:03:36 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5005, 0x0) 11:03:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 11:03:36 executing program 3 (fault-call:10 fault-nth:29): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x54, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 11:03:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) [ 1317.891312][T25288] FAULT_INJECTION: forcing a failure. [ 1317.891312][T25288] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.904273][T25288] CPU: 1 PID: 25288 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1317.912990][T25288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1317.923045][T25288] Call Trace: [ 1317.926369][T25288] dump_stack+0x11d/0x181 [ 1317.930723][T25288] should_fail.cold+0xa/0x1a [ 1317.935327][T25288] __should_failslab+0xee/0x130 [ 1317.940194][T25288] should_failslab+0x9/0x14 [ 1317.944712][T25288] kmem_cache_alloc+0x29/0x5d0 [ 1317.949635][T25288] ? fib6_node_lookup+0xed/0x120 [ 1317.954580][T25288] dst_alloc+0xad/0x149 [ 1317.958747][T25288] ip6_dst_alloc+0x3d/0x80 [ 1317.963184][T25288] ip6_rt_cache_alloc+0x12b/0x480 [ 1317.968328][T25288] ip6_pol_route+0x5d2/0x730 [ 1317.973011][T25288] ip6_pol_route_output+0x48/0x60 [ 1317.978126][T25288] fib6_rule_lookup+0x3d6/0x470 [ 1317.982983][T25288] ? ip6_pol_route_input+0x70/0x70 [ 1317.988275][T25288] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1317.994046][T25288] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1317.999317][T25288] ip6_route_output_flags_noref+0x16b/0x230 [ 1318.005205][T25288] ip6_route_output_flags+0x50/0x1a0 [ 1318.010642][T25288] ip6_dst_lookup_tail+0x25d/0xc50 [ 1318.015904][T25288] ? debug_smp_processor_id+0x43/0x137 [ 1318.021467][T25288] ? dst_destroy+0x210/0x210 [ 1318.026203][T25288] ? debug_smp_processor_id+0x43/0x137 [ 1318.031744][T25288] ? dst_destroy+0x210/0x210 [ 1318.036402][T25288] ? __call_rcu+0x153/0x390 [ 1318.041019][T25288] ip6_dst_lookup_flow+0x5c/0x110 [ 1318.046165][T25288] rawv6_sendmsg+0x9be/0x2340 [ 1318.051037][T25288] ? process_measurement+0x149/0x1190 [ 1318.056440][T25288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1318.062736][T25288] ? aa_label_sk_perm+0x89/0xe0 [ 1318.068010][T25288] ? aa_sk_perm+0x1d3/0x590 [ 1318.072566][T25288] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1318.078915][T25288] inet_sendmsg+0x6d/0x90 [ 1318.083303][T25288] ? inet_sendmsg+0x6d/0x90 [ 1318.087792][T25288] ? inet_send_prepare+0x200/0x200 [ 1318.092891][T25288] sock_sendmsg+0x9f/0xc0 [ 1318.097218][T25288] ____sys_sendmsg+0x212/0x4d0 [ 1318.102166][T25288] ___sys_sendmsg+0xb5/0x100 [ 1318.107234][T25288] ? __fget+0xb8/0x1d0 [ 1318.111297][T25288] ? __fget_light+0xaf/0x190 [ 1318.115968][T25288] ? __fdget+0x2c/0x40 [ 1318.120164][T25288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1318.126477][T25288] __sys_sendmmsg+0x123/0x350 [ 1318.131445][T25288] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1318.137708][T25288] ? fput_many+0xec/0x130 [ 1318.142160][T25288] ? fput+0x29/0x30 [ 1318.145974][T25288] ? ksys_write+0x145/0x1b0 [ 1318.150541][T25288] __x64_sys_sendmmsg+0x64/0x80 [ 1318.155404][T25288] do_syscall_64+0xcc/0x3a0 [ 1318.160049][T25288] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1318.165978][T25288] RIP: 0033:0x45aff9 [ 1318.169974][T25288] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1318.189654][T25288] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1318.198058][T25288] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1318.206045][T25288] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1318.214025][T25288] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1318.222006][T25288] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1318.230029][T25288] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000001d 11:03:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:37 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5006, 0x0) 11:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x7, 0x0, @remote, 0x2}, 0x1c) 11:03:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x60, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 11:03:37 executing program 3 (fault-call:10 fault-nth:30): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x61, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) [ 1318.927219][T25331] FAULT_INJECTION: forcing a failure. [ 1318.927219][T25331] name failslab, interval 1, probability 0, space 0, times 0 [ 1318.940028][T25331] CPU: 0 PID: 25331 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1318.948804][T25331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1318.958855][T25331] Call Trace: [ 1318.962154][T25331] dump_stack+0x11d/0x181 [ 1318.966571][T25331] should_fail.cold+0xa/0x1a [ 1318.971256][T25331] __should_failslab+0xee/0x130 [ 1318.976147][T25331] should_failslab+0x9/0x14 [ 1318.980693][T25331] kmem_cache_alloc+0x29/0x5d0 [ 1318.985474][T25331] ? fib6_node_lookup+0xed/0x120 [ 1318.990479][T25331] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1318.996206][T25331] ? ip6_dst_gc+0x1c4/0x220 [ 1319.000716][T25331] dst_alloc+0xad/0x149 [ 1319.004888][T25331] ip6_dst_alloc+0x3d/0x80 [ 1319.009351][T25331] ip6_rt_cache_alloc+0x12b/0x480 [ 1319.014389][T25331] ip6_pol_route+0x5d2/0x730 [ 1319.019118][T25331] ip6_pol_route_output+0x48/0x60 [ 1319.024151][T25331] fib6_rule_lookup+0x3d6/0x470 [ 1319.029006][T25331] ? ip6_pol_route_input+0x70/0x70 [ 1319.034141][T25331] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1319.039915][T25331] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1319.045355][T25331] ip6_route_output_flags_noref+0x16b/0x230 [ 1319.051299][T25331] ip6_route_output_flags+0x50/0x1a0 [ 1319.056597][T25331] ip6_dst_lookup_tail+0x25d/0xc50 [ 1319.061723][T25331] ? debug_smp_processor_id+0x43/0x137 [ 1319.067186][T25331] ? dst_destroy+0x210/0x210 [ 1319.071788][T25331] ? debug_smp_processor_id+0x43/0x137 [ 1319.077265][T25331] ? dst_destroy+0x210/0x210 [ 1319.081869][T25331] ? __call_rcu+0x153/0x390 [ 1319.086388][T25331] ip6_dst_lookup_flow+0x5c/0x110 [ 1319.091631][T25331] rawv6_sendmsg+0x9be/0x2340 [ 1319.096414][T25331] ? process_measurement+0x149/0x1190 [ 1319.101807][T25331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1319.108253][T25331] ? aa_label_sk_perm+0x89/0xe0 [ 1319.113115][T25331] ? aa_sk_perm+0x1d3/0x590 [ 1319.117662][T25331] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 11:03:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x64, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 1319.125063][T25331] inet_sendmsg+0x6d/0x90 [ 1319.129408][T25331] ? inet_sendmsg+0x6d/0x90 [ 1319.133931][T25331] ? inet_send_prepare+0x200/0x200 [ 1319.139103][T25331] sock_sendmsg+0x9f/0xc0 [ 1319.145362][T25331] ____sys_sendmsg+0x212/0x4d0 [ 1319.150246][T25331] ___sys_sendmsg+0xb5/0x100 [ 1319.154884][T25331] ? __fget+0xb8/0x1d0 [ 1319.158991][T25331] ? __fget_light+0xaf/0x190 [ 1319.163637][T25331] ? __fdget+0x2c/0x40 [ 1319.167717][T25331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1319.174047][T25331] __sys_sendmmsg+0x123/0x350 [ 1319.178747][T25331] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1319.185002][T25331] ? fput_many+0xec/0x130 [ 1319.189392][T25331] ? fput+0x29/0x30 [ 1319.193205][T25331] ? ksys_write+0x145/0x1b0 [ 1319.197745][T25331] __x64_sys_sendmmsg+0x64/0x80 [ 1319.202760][T25331] do_syscall_64+0xcc/0x3a0 [ 1319.207282][T25331] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1319.213301][T25331] RIP: 0033:0x45aff9 [ 1319.217223][T25331] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1319.236972][T25331] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1319.245437][T25331] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1319.254253][T25331] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1319.262335][T25331] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1319.270318][T25331] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1319.278373][T25331] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000001e 11:03:38 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5007, 0x0) 11:03:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x8, 0x0, @remote, 0x2}, 0x1c) 11:03:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) 11:03:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:38 executing program 3 (fault-call:10 fault-nth:31): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 11:03:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x74, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:38 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5008, 0x0) 11:03:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xc020000}, 0x0) 11:03:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x7c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1320.012399][T25375] FAULT_INJECTION: forcing a failure. [ 1320.012399][T25375] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.025361][T25375] CPU: 0 PID: 25375 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1320.034064][T25375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1320.044124][T25375] Call Trace: [ 1320.047480][T25375] dump_stack+0x11d/0x181 [ 1320.051845][T25375] should_fail.cold+0xa/0x1a [ 1320.056483][T25375] __should_failslab+0xee/0x130 [ 1320.061340][T25375] should_failslab+0x9/0x14 [ 1320.065970][T25375] kmem_cache_alloc+0x29/0x5d0 [ 1320.070772][T25375] ? fib6_node_lookup+0xed/0x120 [ 1320.075737][T25375] dst_alloc+0xad/0x149 [ 1320.080080][T25375] ip6_dst_alloc+0x3d/0x80 [ 1320.084585][T25375] ip6_rt_cache_alloc+0x12b/0x480 [ 1320.089657][T25375] ip6_pol_route+0x5d2/0x730 [ 1320.094292][T25375] ip6_pol_route_output+0x48/0x60 [ 1320.099480][T25375] fib6_rule_lookup+0x3d6/0x470 [ 1320.104346][T25375] ? ip6_pol_route_input+0x70/0x70 [ 1320.109487][T25375] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1320.115224][T25375] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1320.120544][T25375] ip6_route_output_flags_noref+0x16b/0x230 [ 1320.126442][T25375] ip6_route_output_flags+0x50/0x1a0 [ 1320.131731][T25375] ip6_dst_lookup_tail+0x25d/0xc50 [ 1320.136854][T25375] ? debug_smp_processor_id+0x43/0x137 [ 1320.142381][T25375] ? dst_destroy+0x210/0x210 [ 1320.146993][T25375] ? debug_smp_processor_id+0x43/0x137 [ 1320.153509][T25375] ? dst_destroy+0x210/0x210 [ 1320.158155][T25375] ? __call_rcu+0x153/0x390 [ 1320.162786][T25375] ip6_dst_lookup_flow+0x5c/0x110 [ 1320.167821][T25375] rawv6_sendmsg+0x9be/0x2340 [ 1320.172517][T25375] ? process_measurement+0x149/0x1190 [ 1320.178090][T25375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1320.184374][T25375] ? aa_label_sk_perm+0x89/0xe0 [ 1320.189340][T25375] ? aa_sk_perm+0x1d3/0x590 [ 1320.193858][T25375] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1320.200190][T25375] inet_sendmsg+0x6d/0x90 [ 1320.204517][T25375] ? inet_sendmsg+0x6d/0x90 [ 1320.209089][T25375] ? inet_send_prepare+0x200/0x200 [ 1320.214208][T25375] sock_sendmsg+0x9f/0xc0 [ 1320.218637][T25375] ____sys_sendmsg+0x212/0x4d0 [ 1320.223420][T25375] ___sys_sendmsg+0xb5/0x100 [ 1320.228023][T25375] ? __fget+0xb8/0x1d0 [ 1320.232104][T25375] ? __fget_light+0xaf/0x190 [ 1320.236703][T25375] ? __fdget+0x2c/0x40 [ 1320.240856][T25375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1320.248155][T25375] __sys_sendmmsg+0x123/0x350 [ 1320.252860][T25375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1320.259210][T25375] ? fput_many+0xec/0x130 [ 1320.263572][T25375] ? fput+0x29/0x30 [ 1320.267384][T25375] ? ksys_write+0x145/0x1b0 [ 1320.271905][T25375] __x64_sys_sendmmsg+0x64/0x80 [ 1320.276831][T25375] do_syscall_64+0xcc/0x3a0 [ 1320.281517][T25375] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1320.287838][T25375] RIP: 0033:0x45aff9 [ 1320.291816][T25375] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1320.311551][T25375] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1320.320079][T25375] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1320.328054][T25375] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1320.336055][T25375] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1320.344039][T25375] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1320.352256][T25375] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000001f 11:03:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x9, 0x0, @remote, 0x2}, 0x1c) 11:03:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:39 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x502f, 0x0) 11:03:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 11:03:39 executing program 3 (fault-call:10 fault-nth:32): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x84, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xe010000}, 0x0) 11:03:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x87, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1320.993146][T25418] FAULT_INJECTION: forcing a failure. [ 1320.993146][T25418] name failslab, interval 1, probability 0, space 0, times 0 [ 1321.005824][T25418] CPU: 1 PID: 25418 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1321.014609][T25418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1321.024663][T25418] Call Trace: [ 1321.028053][T25418] dump_stack+0x11d/0x181 [ 1321.033156][T25418] should_fail.cold+0xa/0x1a [ 1321.037765][T25418] __should_failslab+0xee/0x130 11:03:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 1321.042669][T25418] should_failslab+0x9/0x14 [ 1321.047299][T25418] kmem_cache_alloc+0x29/0x5d0 [ 1321.052143][T25418] ? fib6_node_lookup+0xed/0x120 [ 1321.057090][T25418] dst_alloc+0xad/0x149 [ 1321.061269][T25418] ip6_dst_alloc+0x3d/0x80 [ 1321.066479][T25418] ip6_rt_cache_alloc+0x12b/0x480 [ 1321.071814][T25418] ip6_pol_route+0x5d2/0x730 [ 1321.076480][T25418] ip6_pol_route_output+0x48/0x60 [ 1321.081582][T25418] fib6_rule_lookup+0x3d6/0x470 [ 1321.086496][T25418] ? ip6_pol_route_input+0x70/0x70 11:03:40 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0xff00, 0x0) [ 1321.091709][T25418] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1321.097566][T25418] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1321.102814][T25418] ip6_route_output_flags_noref+0x16b/0x230 [ 1321.108741][T25418] ip6_route_output_flags+0x50/0x1a0 [ 1321.114089][T25418] ip6_dst_lookup_tail+0x25d/0xc50 [ 1321.119199][T25418] ? debug_smp_processor_id+0x43/0x137 [ 1321.124773][T25418] ? dst_destroy+0x210/0x210 [ 1321.129393][T25418] ? debug_smp_processor_id+0x43/0x137 [ 1321.134926][T25418] ? dst_destroy+0x210/0x210 [ 1321.139528][T25418] ? __call_rcu+0x153/0x390 [ 1321.144152][T25418] ip6_dst_lookup_flow+0x5c/0x110 [ 1321.149193][T25418] rawv6_sendmsg+0x9be/0x2340 [ 1321.153932][T25418] ? process_measurement+0x149/0x1190 [ 1321.159444][T25418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1321.165714][T25418] ? aa_label_sk_perm+0x89/0xe0 [ 1321.170683][T25418] ? aa_sk_perm+0x1d3/0x590 [ 1321.175216][T25418] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1321.181540][T25418] inet_sendmsg+0x6d/0x90 [ 1321.185860][T25418] ? inet_sendmsg+0x6d/0x90 [ 1321.190426][T25418] ? inet_send_prepare+0x200/0x200 [ 1321.195538][T25418] sock_sendmsg+0x9f/0xc0 [ 1321.199865][T25418] ____sys_sendmsg+0x212/0x4d0 [ 1321.204625][T25418] ___sys_sendmsg+0xb5/0x100 [ 1321.209317][T25418] ? __fget+0xb8/0x1d0 [ 1321.213433][T25418] ? __fget_light+0xaf/0x190 [ 1321.218011][T25418] ? __fdget+0x2c/0x40 [ 1321.222097][T25418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1321.228363][T25418] __sys_sendmmsg+0x123/0x350 [ 1321.233130][T25418] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1321.239501][T25418] ? fput_many+0xec/0x130 [ 1321.243870][T25418] ? fput+0x29/0x30 [ 1321.247671][T25418] ? ksys_write+0x145/0x1b0 [ 1321.252303][T25418] __x64_sys_sendmmsg+0x64/0x80 [ 1321.257325][T25418] do_syscall_64+0xcc/0x3a0 [ 1321.262052][T25418] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1321.268005][T25418] RIP: 0033:0x45aff9 [ 1321.271896][T25418] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1321.291508][T25418] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1321.299959][T25418] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1321.307925][T25418] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1321.315974][T25418] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1321.323956][T25418] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1321.331947][T25418] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000020 11:03:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xa, 0x0, @remote, 0x2}, 0x1c) 11:03:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x94, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 11:03:40 executing program 3 (fault-call:10 fault-nth:33): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1321.837612][ T8915] tipc: TX() has been purged, node left! 11:03:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) [ 1322.024199][T25450] FAULT_INJECTION: forcing a failure. [ 1322.024199][T25450] name failslab, interval 1, probability 0, space 0, times 0 [ 1322.036926][T25450] CPU: 0 PID: 25450 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1322.045710][T25450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1322.055859][T25450] Call Trace: [ 1322.059190][T25450] dump_stack+0x11d/0x181 [ 1322.063545][T25450] should_fail.cold+0xa/0x1a [ 1322.068150][T25450] __should_failslab+0xee/0x130 [ 1322.073197][T25450] should_failslab+0x9/0x14 [ 1322.077829][T25450] kmem_cache_alloc+0x29/0x5d0 [ 1322.082636][T25450] ? fib6_node_lookup+0xed/0x120 [ 1322.087659][T25450] dst_alloc+0xad/0x149 [ 1322.091834][T25450] ip6_dst_alloc+0x3d/0x80 [ 1322.096269][T25450] ip6_rt_cache_alloc+0x12b/0x480 [ 1322.101306][T25450] ip6_pol_route+0x5d2/0x730 [ 1322.105958][T25450] ip6_pol_route_output+0x48/0x60 [ 1322.111119][T25450] fib6_rule_lookup+0x3d6/0x470 [ 1322.115982][T25450] ? ip6_pol_route_input+0x70/0x70 [ 1322.121120][T25450] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1322.127030][T25450] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1322.132266][T25450] ip6_route_output_flags_noref+0x16b/0x230 [ 1322.138179][T25450] ip6_route_output_flags+0x50/0x1a0 [ 1322.143624][T25450] ip6_dst_lookup_tail+0x25d/0xc50 [ 1322.148807][T25450] ? debug_smp_processor_id+0x43/0x137 [ 1322.154437][T25450] ? dst_destroy+0x210/0x210 [ 1322.159824][T25450] ? debug_smp_processor_id+0x43/0x137 [ 1322.165350][T25450] ? dst_destroy+0x210/0x210 [ 1322.169974][T25450] ? __call_rcu+0x153/0x390 [ 1322.174497][T25450] ip6_dst_lookup_flow+0x5c/0x110 [ 1322.179540][T25450] rawv6_sendmsg+0x9be/0x2340 [ 1322.184237][T25450] ? process_measurement+0x149/0x1190 [ 1322.189628][T25450] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1322.195977][T25450] ? aa_label_sk_perm+0x89/0xe0 [ 1322.200847][T25450] ? aa_sk_perm+0x1d3/0x590 [ 1322.205394][T25450] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1322.211828][T25450] inet_sendmsg+0x6d/0x90 [ 1322.216240][T25450] ? inet_sendmsg+0x6d/0x90 [ 1322.220795][T25450] ? inet_send_prepare+0x200/0x200 [ 1322.225939][T25450] sock_sendmsg+0x9f/0xc0 [ 1322.230286][T25450] ____sys_sendmsg+0x212/0x4d0 [ 1322.235130][T25450] ___sys_sendmsg+0xb5/0x100 [ 1322.239841][T25450] ? __fget+0xb8/0x1d0 [ 1322.244280][T25450] ? __fget_light+0xaf/0x190 [ 1322.248887][T25450] ? __fdget+0x2c/0x40 [ 1322.252964][T25450] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1322.259408][T25450] __sys_sendmmsg+0x123/0x350 [ 1322.264168][T25450] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1322.270458][T25450] ? fput_many+0xec/0x130 [ 1322.274871][T25450] ? fput+0x29/0x30 [ 1322.278694][T25450] ? ksys_write+0x145/0x1b0 [ 1322.283221][T25450] __x64_sys_sendmmsg+0x64/0x80 [ 1322.288081][T25450] do_syscall_64+0xcc/0x3a0 [ 1322.292633][T25450] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1322.298582][T25450] RIP: 0033:0x45aff9 [ 1322.302494][T25450] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:03:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x9c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1322.322365][T25450] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1322.330911][T25450] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1322.338901][T25450] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1322.347056][T25450] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1322.355047][T25450] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1322.363071][T25450] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000021 11:03:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x12000000}, 0x0) 11:03:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xe, 0x0, @remote, 0x2}, 0x1c) [ 1323.933307][ T8915] device bridge_slave_1 left promiscuous mode [ 1323.939924][ T8915] bridge0: port 2(bridge_slave_1) entered disabled state [ 1323.978350][ T8915] device bridge_slave_0 left promiscuous mode [ 1323.984756][ T8915] bridge0: port 1(bridge_slave_0) entered disabled state [ 1324.070205][ T8915] device veth1_vlan left promiscuous mode [ 1324.076002][ T8915] device veth0_vlan left promiscuous mode [ 1324.997849][ T8915] device hsr_slave_0 left promiscuous mode [ 1325.048294][ T8915] device hsr_slave_1 left promiscuous mode [ 1325.113939][ T8915] team0 (unregistering): Port device team_slave_1 removed [ 1325.124315][ T8915] team0 (unregistering): Port device team_slave_0 removed [ 1325.135263][ T8915] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1325.161613][ T8915] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1325.220490][ T8915] bond0 (unregistering): Released all slaves [ 1325.324785][T25472] IPVS: ftp: loaded support on port[0] = 21 [ 1325.374573][T25472] chnl_net:caif_netlink_parms(): no params data found [ 1325.404756][T25472] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.411906][T25472] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.420441][T25472] device bridge_slave_0 entered promiscuous mode [ 1325.428320][T25472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.435432][T25472] bridge0: port 2(bridge_slave_1) entered disabled state [ 1325.443424][T25472] device bridge_slave_1 entered promiscuous mode [ 1325.462634][T25472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1325.529071][T25472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1325.553123][T25472] team0: Port device team_slave_0 added [ 1325.563298][T25472] team0: Port device team_slave_1 added [ 1325.643230][T25472] device hsr_slave_0 entered promiscuous mode [ 1325.688041][T25472] device hsr_slave_1 entered promiscuous mode [ 1325.773476][T25472] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.780694][T25472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.788165][T25472] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.795210][T25472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.838174][T25472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1325.852470][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1325.862199][ T2513] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.871029][ T2513] bridge0: port 2(bridge_slave_1) entered disabled state [ 1325.887372][T25472] 8021q: adding VLAN 0 to HW filter on device team0 [ 1325.901142][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1325.910087][ T2513] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.917122][ T2513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.938924][T20822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1325.947278][T20822] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.954374][T20822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.963371][T20822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1325.972239][T20822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1325.981601][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1325.996338][T25472] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1326.008117][T25472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1326.020759][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1326.029500][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1326.038768][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1326.056012][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1326.063608][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1326.074933][T25472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1326.138985][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1326.156281][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1326.165330][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1326.173628][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1326.199165][T25472] device veth0_vlan entered promiscuous mode [ 1326.213050][T25472] device veth1_vlan entered promiscuous mode [ 1326.328091][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1326.336229][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 11:03:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x13000000}, 0x0) 11:03:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa4, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:45 executing program 3 (fault-call:10 fault-nth:34): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x10, 0x0, @remote, 0x2}, 0x1c) 11:03:45 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x14000000}, 0x0) [ 1326.614356][T25497] FAULT_INJECTION: forcing a failure. [ 1326.614356][T25497] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.627132][T25497] CPU: 0 PID: 25497 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1326.635829][T25497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1326.645889][T25497] Call Trace: [ 1326.649190][T25497] dump_stack+0x11d/0x181 [ 1326.653728][T25497] should_fail.cold+0xa/0x1a [ 1326.658339][T25497] __should_failslab+0xee/0x130 [ 1326.663207][T25497] should_failslab+0x9/0x14 [ 1326.667722][T25497] kmem_cache_alloc+0x29/0x5d0 [ 1326.672491][T25497] ? fib6_node_lookup+0xed/0x120 [ 1326.677520][T25497] dst_alloc+0xad/0x149 [ 1326.681844][T25497] ip6_dst_alloc+0x3d/0x80 [ 1326.686317][T25497] ip6_rt_cache_alloc+0x12b/0x480 [ 1326.691362][T25497] ip6_pol_route+0x5d2/0x730 [ 1326.696042][T25497] ip6_pol_route_output+0x48/0x60 [ 1326.701106][T25497] fib6_rule_lookup+0x3d6/0x470 [ 1326.706106][T25497] ? ip6_pol_route_input+0x70/0x70 [ 1326.711251][T25497] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1326.716987][T25497] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1326.724344][T25497] ip6_route_output_flags_noref+0x16b/0x230 [ 1326.730299][T25497] ip6_route_output_flags+0x50/0x1a0 [ 1326.735707][T25497] ip6_dst_lookup_tail+0x25d/0xc50 [ 1326.740927][T25497] ? debug_smp_processor_id+0x43/0x137 [ 1326.746411][T25497] ? dst_destroy+0x210/0x210 [ 1326.751036][T25497] ? debug_smp_processor_id+0x43/0x137 [ 1326.756553][T25497] ? dst_destroy+0x210/0x210 [ 1326.761244][T25497] ? __call_rcu+0x153/0x390 [ 1326.765766][T25497] ip6_dst_lookup_flow+0x5c/0x110 [ 1326.770831][T25497] rawv6_sendmsg+0x9be/0x2340 [ 1326.775537][T25497] ? process_measurement+0x149/0x1190 [ 1326.780972][T25497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1326.787334][T25497] ? aa_label_sk_perm+0x89/0xe0 [ 1326.792262][T25497] ? aa_sk_perm+0x1d3/0x590 [ 1326.796782][T25497] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1326.803197][T25497] inet_sendmsg+0x6d/0x90 [ 1326.807637][T25497] ? inet_sendmsg+0x6d/0x90 [ 1326.812251][T25497] ? inet_send_prepare+0x200/0x200 [ 1326.817461][T25497] sock_sendmsg+0x9f/0xc0 [ 1326.821848][T25497] ____sys_sendmsg+0x212/0x4d0 [ 1326.826652][T25497] ___sys_sendmsg+0xb5/0x100 [ 1326.831282][T25497] ? __fget+0xb8/0x1d0 [ 1326.835560][T25497] ? __fget_light+0xaf/0x190 [ 1326.840206][T25497] ? __fdget+0x2c/0x40 [ 1326.844378][T25497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1326.850643][T25497] __sys_sendmmsg+0x123/0x350 [ 1326.855342][T25497] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1326.861597][T25497] ? fput_many+0xec/0x130 [ 1326.865922][T25497] ? fput+0x29/0x30 [ 1326.869804][T25497] ? ksys_write+0x145/0x1b0 [ 1326.874370][T25497] __x64_sys_sendmmsg+0x64/0x80 [ 1326.879779][T25497] do_syscall_64+0xcc/0x3a0 [ 1326.884285][T25497] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1326.890186][T25497] RIP: 0033:0x45aff9 [ 1326.894155][T25497] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:03:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xac, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1326.914125][T25497] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1326.922946][T25497] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1326.931059][T25497] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1326.939034][T25497] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1326.947144][T25497] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1326.955125][T25497] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000022 11:03:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r5) r6 = gettid() r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000180)=0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$setregs(0xd, r10, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r10, 0x0, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r12 = syz_open_dev$dri(&(0x7f0000001fc0)='/dev/dri/card#\x00', 0xa67f, 0x222000) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r15, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r16 = gettid() ptrace$setopts(0x4206, r16, 0x0, 0x0) tkill(r16, 0x3c) ptrace$cont(0x18, r16, 0x0, 0x0) ptrace$setregs(0xd, r16, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r16, 0x0, 0x0) r17 = geteuid() r18 = getgid() r19 = gettid() ptrace$setopts(0x4206, r19, 0x0, 0x0) tkill(r19, 0x3c) ptrace$cont(0x18, r19, 0x0, 0x0) ptrace$setregs(0xd, r19, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r19, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x1, &(0x7f0000000240)=[r20]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)=0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000002080)=0x0) r23 = getgid() r24 = gettid() ptrace$setopts(0x4206, r24, 0x0, 0x0) tkill(r24, 0x3c) ptrace$cont(0x18, r24, 0x0, 0x0) ptrace$setregs(0xd, r24, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r24, 0x0, 0x0) clone3(&(0x7f0000002280)={0x2000000, &(0x7f00000020c0), &(0x7f0000002100)=0x0, &(0x7f0000002140), {0x38}, &(0x7f0000002180)=""/38, 0x26, &(0x7f00000021c0)=""/73, &(0x7f0000002240)=[r24], 0x1}, 0x50) r26 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r27) r28 = getgid() r29 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r29, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r30 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000002300)='/dev/video37\x00', 0x2, 0x0) r31 = gettid() ptrace$setopts(0x4206, r31, 0x0, 0x0) tkill(r31, 0x3c) ptrace$cont(0x18, r31, 0x0, 0x0) ptrace$setregs(0xd, r31, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r31, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r34, 0x0, 0x0) r35 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r35, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$netlink(r0, &(0x7f0000002500)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)=[{&(0x7f0000000380)={0x67c, 0x3c, 0x200, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x1a5, 0x8, 0x0, 0x1, [@typed={0x8, 0x4a, 0x0, 0x0, @pid=r1}, @generic="51d12b43dc4794f0a416cdad74945a75988089425ce8ccff762e206a38ef1b81efa85cc13845095dba776e2bba211f72badc547b283574b94185763bfea8317fcc7213411bc21febe61672c5260dfc469e77a018341f0679d8ff92851240d6e7131a99c4d2c3d08114e2d618b587322d1856178fe7e89b8b550297a7228eba527e655513f83b2fde537646ac628f39988c929603b1c967d1b841ce13b90faa3f2e8726b18f90b894742067e649ad", @generic="7fb9bec8887d0cd961c9372341a12cacdd58687de63c6804d46aafd143c60edf8c3f4709e98fc2a3e23ae461dffbd55b0225b820fb6b9c57cd4552bed7e18ddcc242a67e81c239cfcb064c601cf118d1b7a9f4887b5bc43bf9e43497bb656b0983fec4cbc96281ae260d9c9b9db640412e94a87ab5e99ab7b81d8a3d6470d107ab8df89acb77fc3df642f9f5bc85a1e9446f11591eda9a907fae7d81a17c87f337dcbb1503edca63e45f0ce3d91e5ed1f07d37e320aa55dd06", @generic="ba406616a6c87e944082f241f9541a7022ed2d84f5949ea1b9ae9c8a007daf0477408a8e89a65ea9b34d674a0a8a22f30358"]}, @generic="491722ae48d58b1477147c43c82a3b3a63ba9fcfa0c0c85f3c2517338bcec2600b5e4b9dc85729b439f1209e50841c87669eb5988ebc45b0fbe681a21d8d82b2ae22958ee2184d62c74e1ea76cd13787d2ad88d714e5fd8a5c74988281f4e6b69d63d664190be7729339e60870f627366c0c07912d28cae29d60390e7b7a951aae1e6087506a6c4f566d68f697c4b32f7a9e6d9d71d29948f9d5d60e524395174e39e7dc22e9661f76c54654d72650fc2e2fa3d489f0d705464fce581f7ab903a9f492e03191d3a03e4eb7df5b32da1fb01f2084fd71820c4e3c300f736700c49d9d3c6aaf240e3b8f94a809d971bcd31672ef22013c7b", @nested={0x112, 0x30, 0x0, 0x1, [@typed={0xc, 0x66, 0x0, 0x0, @u64=0x1d}, @generic, @generic="2797dc8dfdfe0be4ce81a6b8764f926a3e6d4b1bb5aafb96b34d356f79b86e8c6f86f3637d57b745f22bdf3b1ed4ea94731439203f4b1980dbd65cf5d15c0c077ca6ce1e61c73f6721a83ffa2eaa7bf52d183b40bd6f33aa3c372d512f2914", @typed={0x8, 0x65, 0x0, 0x0, @u32=0xe21}, @generic="a970c242c135cb4b4a2cc96b1b4fe5af9b16f63ae3c391712987b29850f8c117da8708b2e36e4a82108f97fdfecbafcb57f26b9db9bd88936bb1585156e34682652aa3b8eecd2c71577e90e67303ad8f094ad7d9a288aee77c1f43dc9c6b02cc3b9adb33ada91acac1317dec78ebcadaaeb0036fd17ebd1cd4bdea44da5ddf", @typed={0x8, 0x15, 0x0, 0x0, @uid=r3}, @typed={0x4, 0x35}, @generic="6f0fc8d124b315505069f4c11e11ec29"]}, @typed={0xc, 0x2b, 0x0, 0x0, @u64=0x1}, @generic="781939c42e3fc58ed77853aac5a9145b1b42d1a2d6175cb582d700f54c01696fb75f0bbbfa066031ae3baffd2f44243ff787948e941c6fa6bbccc75025eb936b956a388b83f95115dba06e7782997b87b44f790f2fd6cafb6d9726db347e632058a2edfb04ccacbbac36345afe8a8efdd6191067ff6024a41f92df", @nested={0x15e, 0x7e, 0x0, 0x1, [@typed={0x1e, 0x29, 0x0, 0x0, @binary="b4953770ab35a868fb9f04e3d10ada8c58b7f3af8dc961f956a0"}, @typed={0x8, 0x39, 0x0, 0x0, @uid=r5}, @generic="7ccdee67619141b6acb78af857476068aed70c3c1520d983d2a9697f8f7d4550fa62a9b75353857b3a214e72faf6b7b593743c5653f797daae3e5b", @typed={0x8, 0x92, 0x0, 0x0, @pid=r6}, @typed={0x4, 0x47}, @typed={0x33, 0x12, 0x0, 0x0, @binary="2f4ac938e5f42ddd6f00862c9cb7f4e4953aad88ac901053fdb82f379d100b476d5a358d75c7fd10f489706b5b7dc1"}, @generic="7d850c4e40890885e42f83590a1d456c2f3e324d6adf2002f2aab4df13cde72b4324cab521fda679b48472720a2c0ed2b2f00664fadcc4d8ade311cf9beadcbbc4759928ca92cf4d03d791643113d794945c343081a8c221bdd10aa249d52f49deb2da35f2fba582c647e307c8db30e947a69049ea83b160642646c5c44a9d7d5b48816d4cbc195552ad037377e6b422821f9d161f12d1", @typed={0x20, 0x36, 0x0, 0x0, @str='posix_acl_access*ppp0system\x00'}]}, @typed={0x8, 0x6f, 0x0, 0x0, @u32=0xd9f6}, @nested={0xc7, 0x68, 0x0, 0x1, [@generic="971562b39ee11c5816cfe4aee3a073912246df4f046e81471d99bac92a969a72afd5d33d95e7140c67a85c56e9f4c504", @generic="b7e89dd88a44487c6117c81ccac1f6e2ee193915bdb7b379c6ee620d799aaa72089096e08a405b85c5f71f25f46ecd092032cf35fc48911d969cc1cb35969715a7c398bef56e23922e8d25c9e991d011330de2d0f22909f84cee4acecfbd176ade2909acf34451740aab31be3059c06fc5363b28c09949cba9ec2cea4753b81fc3c552f02584b841b70e66338cbfb19c4069fe"]}]}, 0x67c}, {&(0x7f0000000a00)={0x1210, 0x22, 0x20, 0x8, 0x25dfdbfb, "", [@typed={0x8, 0x92, 0x0, 0x0, @u32=0x6}, @typed={0x14, 0x8e, 0x0, 0x0, @ipv6=@ipv4={[], [], @broadcast}}, @typed={0xc, 0x34, 0x0, 0x0, @u64=0x7fff}, @generic="374e3f61a2943dd79d1f7d1d2e41d2210ce7516cf58a08723213d3f8c75a2c99ce4fc5740a41a09e247c916c72ac91619154afb623bf5e1ac042596fa85d5c291096262abac60649c517275166cd335154b36935cb1a14bc3fa158c55240e965cbd4cc141c21f50421c67a5353158897430e55c10e438078c2f0f41bb3ad2c0218b6fa013b35944b07536df9d6e67db65dcd030bb1762a3117ed98462cdd798817c702182db8eb8fe5bf72878fd31c40790a20530ed170eaa60cfc0f19b0ca814576d18a27263a23f899754b79a58744659ea2a3b72e54179f70a578d10ce3b37f81a7b82f404ef61dc3c9de02d9c218cbfb0d58e5abdff8fda8786753190cea718d1a941d3b4007b837f7b86877df23a184c0afa89ee2476e7bf635abd2e446d23b1c3abd10d4144fafdce4838cc8939deaf40ebe77d29a508e46760a7f0eda92296a1269c1a17a72d7113d1d8bfecfba32dd0579be348790e3b1e21b9164cec303893d72600128c8a74ab41c3c35ae69a6f460cc04becd8e660ef7b46adea461040537af287d963579a46ee2a20f397bb2606d09cccb74d648aef2becd06a2aacc9a0c2ce345602d5f7eb6dcc99e44bdad5e18c0f151a98553e305b61cf9e5290bda32871cb440ddd015f45b08fb9950038d3c695030e7163ceae95625d74675be5e1268ed697cd838ba7122bd38cefbd33ac77bf5923f1ba27b0b95103ff5a48aadaa984eaa29d24ef01e8f8b8953711e0165994e3834fa3e69ba39e4004ddbfc955ebad5baa18c8226bb549a07c8703023db1c67717e88da04b23324720f7e73b002d79762a9e5fd5bb913fae0f69efee1cde718563a4c5d621d782066361ef9947f9ab796d2a60e00df23edb370b5156f7fc87ad3343c9ba0110f48d503fe2e1affa16da3e34a20d281a345cc70f911ba28f60d433dd88fe84ccb3fcb20d0a1dc1a341015908cfe9915bff21f5a5614016526419f85018525d1f7c62e6a188ac27b39b5f67270ffa6371b3eb33cf47ecce97507947631d2ecc9a1870a134f4b04c971fe9c373a8335c1d0d3dc341379ca0f88931e806a717fe64e9c454f95feec6780678477ff8e2a0adfb251b9ffc5debb7b09395035ce5e09cf5a0ccfc943a9298cd47230cd6f89e360c02865ec7ea04c8d0eed5a1232fbf8c8374d874a18e8531b6b5d8f4152b8068bf53d3e0a8bcb95aeb6905f515d64aed220e55183b893ff09271f0f724316cb95574307badea93c1e7dfe054d9c43acb1083385abd1502d8f9d8f22e41980239ed7db72edf23dd9767408f3719097dc01b11f5f99632324ea9787b514eacd05d8ca0e8553ada756d96897a6733ee0b4a623c0e25edf5274c62869682c4b39410d2c7598100dea8e7ff88384d87ff65ba1fae31541f9b67c12f39ecaefd540ce6bb1c186c5afb90e963c73727fe976f48ed6768601ae86f6f3cdf34ce0e8275cb0ede002fdf416ac59d1110acbe294e027d8977ac5daf765d82f4a16204bc3b911caf45dd2577f137abcbc896db858e00937079e244b90093af68bc593cca41db50006495a84df6448aeaa7931bc5e4e17cbebe1c9b83564e458e063ae417bf43a5c735670851e2d4d425c194ddcfd4faf96a51e044f3d6312d91e8b8874589746b9d1a4b6cfac6c94001b17fde8cbb34811e65ae69df51471d81dedf0cd49aad7e1a7be5d7b300a3c40d2d312760845263e002c7fe72d420d6f3a3eb4741e04a1599475f8ce5f1bee9a5da603cc5d4989e22f74c72b0d8cfc22dbcda5ab019aa16e6bdc26fb21ad895530775ad7220c0d37d19128a2caed1eabcdff7018fe36e6ad31cd9b0214ac379352f4d206b91f23de57f98dbf7050624f43810a7219af1fdb158bf992c36d6d6ca57be90c1565401cdd43a8d621f11116f4f60ca27929b4e56c1a17ee5b189c5877f53612b3f3bafb4f9c4747ec60cccd26a9075bc73d006885eaa7a774b06e1da916320c4b4b4f472b3d9a1aafaa01bf732988d7bf5e10d8fb919ca49bca71ff3330bd836c20cf94401bbc9f22c8d7f2905c6ab5ee57a9854ff1e5b233a4cb01386f4b557b1ccabc332b77f07a3a325b50441728429d9d6945bb0b28244cbf0c7588daf820cf0dd5df404748fceeb87dbd41bf84f0fc2065551d660404830004164d5e3c87034bc1ce043f49200b45110a446127ddfad61cbc253fd0f9a356b652403e51cda55aa7908fadee76dbd5a1fb7e400c47c74b98776807774eef48e5d41b0101cebba902f05684af0fd6600b3794512adb801602a2a3f361e5b82e848974df839708ff2b6c6dc89de44ee58fa558de5e6f63e09afe4d915df34631ddd7f28c9b3cef1698e24bc59e0c4cdfb834ca61f5c55c1543a4fd95192d2967be48e0e2e1b7c99517761fdc2dadd5c1fcc5c6fc62a12220d6dd9ba09c036a77826bc119c8040522946718a91b1717fcab65e6b1c74ab6783e13a4b1951dc87c8e749e201578f13342884a0b488b3625de97fdfd338f6689de7a950ff3b591efd395ba298b38380d06bf3bbb5c19755c1ef2071aa8e75fe5f37f2b8070545c4c17e51dbb6a6c0338d7493b0c6d12061390f406b55c566fffee1d885e0c0965753248fe4b9e55d1a97b0c3e9314044a1224b379c6029b6f2a15de1752a65d992b9082916c7336e9b7e893cb45bd4f0464fb84fa8ddeb97eb530f8086fdd4a1ce13884775e987e924138948b0d01ad5595755fe165a64b5bca2b23dcdd890b79b885341dd6775a0679f3874dd4b70a3f405bb455835c0a6baf01328d0e37454a2e39f2fcd9b0555b1d707224e28dfcd0379d2c731de106056ea77f0ebf1dcc8534a6c197f3fc1299fda37cadbf60401f87f0b8fd75e07388c92fd324eea712fd36580e558069535ffac9fa363431bc8d837f30ff7018e2e1bd5cf8a5edee01e577948e3d5d96c4b21c191ff61cfaaa86b89d5cfc45fd08096d7e92546430b9d1138819cffed52b6345df2e64d15afbc1e3337407823b9a7537ff9873439798044f297211b64e05e630f8191e6172b2a2aa36d5e4b8496d0d06740dd39b3f61a5bab63cc24b5a83142646c0a5f6e6b820beddb7c583a65fc92bb8a09c025bf1f63b6a9160e23361f55dbb82a88ced5f6c85ef198547b2f871091c967baeba6f38c3c9cf93d91b640a971b6efb2bf3862adad491d05b491335f61cbe0382d5d32ead0e90b80f59d01c9d50f345accc6aac3d6970238db95927dda2a112c7ec8aa8ddd0d19bdf2daa08a0404fb0529c7dd3fafb1f0bb7228c7435d7649ad2389b3310ef414ac8751e05762475a1c10506fd91dc7b3f05a74d3df12fbdd08c3ac227152c3b7c12beef3c4bf5c89e9def67deafab8516028e3cb441bf753d5887ebea9579ed9e93ba73a87cf73a54d05c0df52341308dba9eaeebdab0249a8eb5ceffba9053914e254da6e44fb01a40ad467435aebdf11ea2c9830243cf1eb2ff4c2e5306dc0264d878094537f734b006a6031befe458637da28b0a3bd2d44fe9868bfc088186f97e9bb05a9de7dc39febed33448c35c7293991a3b8f24ded8750f68635f4bf068d9db556e8aa7cb04302b69a30ceff55f5ab59b48c12dd1ceb84622317286479ae8bfd21a64ef76c9d22bca04922654f7ea99590ad2ce5ee897e7ac0cecf8f9bb0c7daae5a7fc4727cf09d3d13c625f2cce7a8cacf63234bf8d8a3ba452736e3b17404ae16ddd7c31cc5a4a18ce2ab15d8647b96b1f1ab745afed9d37be00068055ed367e3bf5aa6e14146f6ac6785eb6759c3104749d2842d141848ab17f8d237e50ca04f9a64094393c869c168c998f572fba2477a4144af97f59fd4f7dbcc64a050e6231a7a079adc12f61c70e5e3dff4eaf08ddab3acb490bf52d8d019aa76963d38424593346018b31c1d2ec39d0668ba1246770821b9aa3788a700b0fb7f5a7bf61fc351ac49095cd451a24cf97c8a3060d0f27a927f52667d3356cd228c04f1256ca6ab9be2e24cb124bf7cef99359c9eeb1df9e30390bef93d326ff6f5cf4307578cdf9516ec2c1809ebd5342cf4274c6a3aa7e1dfbfdb6e161f571b9fdea17dda03bdf012939c8a414760127943f1eec8280a469bb74381be96909de078ee7f9bbcf6c54c283e79957cab8280cca230ee3d6c8e20a48255eab1040d3d57a135679165e2d48cfd26005f0843570bc42fac2c9327b576151b3d8939f577e937bafed164104b2d82e0483657f4a02ff47cdd76e0027649757a94f66a119b1a7caa742327b97d93e2f375d1abb3955543d83a8bee8e9140146c114633b5e1d0d70f1d581b030610fd92647612ab18079a903301be81a11bee8d3211c89a80fd1e83e0543d8b0cdf94156b78dd04fcb4c5a4e299fb9a344b921d494d1f04c9543b366d58d189cee0d3f3857309893097730c09956a66e61d72520cc8f262d1d24b1ff6d6fafae4864a0c2d15654cc6e9833d90a710a97474c6a3a2b5b11e9e7675982dcf94977958578ca423d60f4776098bac719b7033b6e90d4915086c4a6b7afca0a2afe97ebdd1961c00b3c0e4e61270989aed5ebb8837325d4742c9b76bb9db0d83efbffd6a2791fdd89f0259e38ff9ac9a45bf1f14f0fed0589e5d538397e82c381dd153cd3021d21ad1d17b6e2ac3f446b744cd85dc8e1b6eb3e3a8a2058372ae95321259b9d5c4eaef2938ed831e896eaccaaafbb0d28a4032775b78fdbdaaad09495dc411fb0e1805a88f6bfd9c6e93f0f21bcc326ce57523539b39fd17ea85de5bb2e757af4c0cda157d837671bd658a9b33f6797af4367e88e3ac9d82cf5b41b36042f1c3f459b26eed02432c0261796a4d5af38d62fa37f151c80effd43c42f38bc135fb631f955a443b0550a627a29838285194cf142adbde9a8d61187c06b26c5fdee2f91e59355071a7d53758948f995a2bf7b5732c439f9663fc74568b0ff258028879cd59cc1da94a820307ca8b6740ebd6289e767f8b48631bb6a35f81d75d9e966b7bdb2f2a05b4761588c64e85d6132ad2d6281f291c9382655a298bd1cabbeced23a20aff6cc1b1a005d64aa83774e76efed05712609881ffed8ef7e82ddbf908d244e2a74fe5cb349abf8f92d33ea6e16839a0b2fc1671bf864d6e860ebfa84e9128b8a8df123793d9047fabd75378f57fc2cbf6448283d9d87880bc3188ede116d186807e4cc0847ddcf2df5ed033e5cce4436bfb8623703fec8649e1606f063fff34a6276cf199cfd6774f1dde7f3872246eae7f7172b987a171890c1bd717d89d5b73419686f682d2fccfdeb1dbabeb712b179b819ebc22537915e366591d2acff32d22c3f4a394f00f84b8fba53e3aebf8328341684197af43d3cedd9ffa0eadbdf594d40f9d42139348b06ad7bb73d8258a94f26528c572450c577c3f3b96a71cf54b9d3c1d42b8e51418fd19343fed6976a937cf359fc5d3b4cfc972cffe013a4a925a352c359c9e1ce92cbc51973fa8663f381203527c035cc2f500c1c339a51eddb00ab876cb1af4629ccb170274c15abe6284e6290b26c955bd1853d4a8fba979631bf276a3237c6d04132e238e2d0f8e3bf77d8db73ab6e159de5beb6573af6987e4c76131f8427c4e55d429839a6ea34f5777782b996ea6cd1a8c129791e214f12ee84412e567f277101d865180f800c455d24836434fb1a2b6356e5a6e2d5ab783f0359c90c41960c953451c21bb3c12a830e6887bc0bab45ec4c385302347e3f78ff43fd76c35639ca424ea7c4872f5ec7ba4048ff317a353e604b92897327a39cdbd450b9f385f21b257da46b359381182a852a", @typed={0x8, 0x34, 0x0, 0x0, @u32=0x7}, @generic="201467d8c72adbe00d88bc773fbab7f88282cb659ae2ab54daad9a0f1d96ffdd7e6f9d262c1b2601554e202acd5a04f79eeb90d642e2c70029abc73b35e4e4d1c17343bcb6c320b52f9717e9b4158660ce56306357ce55970822d1d4a1de58", @typed={0x8, 0x7f, 0x0, 0x0, @str='bpf\x00'}, @nested={0x167, 0x5, 0x0, 0x1, [@typed={0x8, 0x48, 0x0, 0x0, @u32=0x401}, @generic="0d06826ff1ce1ff34d148d3bf3b15a21fe5887329b1c659a38e27c3ecbbd682347876f95279c259282dbc78175dd799af39ecd0f93223af94baad8f3165c8d3881c8b7541705dbdeef9fc6f5ea0c45ea4f35f4f673fc0b418c1366c11365aff05816c5c825b0769775ddba672a7d76", @typed={0xd1, 0x3f, 0x0, 0x0, @binary="27643fefbe2309ff0bf04632146ad5b52fc1f102456732b0c004240eea09fde131d1ead5955af296e8e06d7ae5eee8d681dd716c5d2c973b9dc22741d65eba5a25080287327c11d0a286e766dc6772798961f8b746e04b794150b7c64a4f75cc2fe306a1d02f64a0e802aaaf62fc093be362fc41a83cd3b9f6bce4cfacc05b10c2bb2b12d1dca73a7435a88074980ab41aa74413c1b040e8bb52c1c603b2c4ed69af9e1f6fbfe3173d89d512fe1984598f5d4fe52c08a4c908cece865987fa52493a0bc7e56c9c5ff688b2448a"}, @typed={0x8, 0x8a, 0x0, 0x0, @pid=r8}, @typed={0x8, 0xb, 0x0, 0x0, @uid=r9}, @typed={0x8, 0x3d, 0x0, 0x0, @pid=r10}]}]}, 0x1210}], 0x2, &(0x7f00000023c0)=[@rights={{0x38, 0x1, 0x1, [r11, r0, r12, 0xffffffffffffffff, r0, r13, r0, r14, r0, r15]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, 0xffffffffffffffff, r20}}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r23}}}, @cred={{0x1c, 0x1, 0x2, {r25, r27, r28}}}, @rights={{0x14, 0x1, 0x1, [r29]}}, @rights={{0x14, 0x1, 0x1, [r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, r32, r34}}}, @rights={{0x1c, 0x1, 0x1, [r0, r35, 0xffffffffffffffff]}}], 0x128, 0x10}, 0x44) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) r36 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r36, &(0x7f0000002000)='/', 0x1) sendfile(r36, r36, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r36, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 11:03:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xb1, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:46 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000480)={0xf9, 0x6, 0x4, 0x4, 0x9, {}, {0x4, 0x0, 0x7, 0x7, 0x20, 0x7, "de3cca15"}, 0x8, 0x4, @offset=0x10000, 0x6, 0x0, r0}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000500)={0x2c, 0x4, 0x0, {0x6, 0x78, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xc, 0x46dd6f36edbe2915, r2, 0x5f00a000) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f0000000300)=0x1) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2040020}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r4, 0x108, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd9e8}]}, 0x1c}}, 0x4004020) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0xc4, r4, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3c6c}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x867f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0xc4}, 0x1, 0x0, 0x0, 0x2804}, 0x804) 11:03:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x24030000}, 0x0) 11:03:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:46 executing program 3 (fault-call:10 fault-nth:35): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x218, 0x0, @remote, 0x2}, 0x1c) 11:03:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x30000000}, 0x0) 11:03:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x300, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1327.665461][T25540] FAULT_INJECTION: forcing a failure. [ 1327.665461][T25540] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.678426][T25540] CPU: 0 PID: 25540 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1327.687238][T25540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.697399][T25540] Call Trace: [ 1327.700709][T25540] dump_stack+0x11d/0x181 [ 1327.705067][T25540] should_fail.cold+0xa/0x1a [ 1327.709761][T25540] __should_failslab+0xee/0x130 [ 1327.714743][T25540] should_failslab+0x9/0x14 [ 1327.719266][T25540] kmem_cache_alloc+0x29/0x5d0 [ 1327.724061][T25540] ? fib6_node_lookup+0xed/0x120 [ 1327.729083][T25540] dst_alloc+0xad/0x149 [ 1327.733255][T25540] ip6_dst_alloc+0x3d/0x80 [ 1327.737852][T25540] ip6_rt_cache_alloc+0x12b/0x480 [ 1327.742898][T25540] ip6_pol_route+0x5d2/0x730 [ 1327.747508][T25540] ip6_pol_route_output+0x48/0x60 [ 1327.752576][T25540] fib6_rule_lookup+0x3d6/0x470 [ 1327.757539][T25540] ? ip6_pol_route_input+0x70/0x70 [ 1327.762729][T25540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1327.768587][T25540] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1327.773804][T25540] ip6_route_output_flags_noref+0x16b/0x230 [ 1327.779731][T25540] ip6_route_output_flags+0x50/0x1a0 [ 1327.785066][T25540] ip6_dst_lookup_tail+0x25d/0xc50 [ 1327.790201][T25540] ? debug_smp_processor_id+0x43/0x137 [ 1327.795851][T25540] ? dst_destroy+0x210/0x210 [ 1327.800441][T25540] ? debug_smp_processor_id+0x43/0x137 [ 1327.805909][T25540] ? dst_destroy+0x210/0x210 [ 1327.810523][T25540] ? __call_rcu+0x153/0x390 [ 1327.815057][T25540] ip6_dst_lookup_flow+0x5c/0x110 [ 1327.820092][T25540] rawv6_sendmsg+0x9be/0x2340 [ 1327.824815][T25540] ? process_measurement+0x149/0x1190 [ 1327.830197][T25540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.836451][T25540] ? aa_label_sk_perm+0x89/0xe0 [ 1327.841395][T25540] ? aa_sk_perm+0x1d3/0x590 [ 1327.845910][T25540] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1327.852351][T25540] inet_sendmsg+0x6d/0x90 [ 1327.856682][T25540] ? inet_sendmsg+0x6d/0x90 [ 1327.861317][T25540] ? inet_send_prepare+0x200/0x200 [ 1327.866427][T25540] sock_sendmsg+0x9f/0xc0 [ 1327.870947][T25540] ____sys_sendmsg+0x212/0x4d0 [ 1327.875823][T25540] ___sys_sendmsg+0xb5/0x100 [ 1327.880442][T25540] ? __fget+0xb8/0x1d0 [ 1327.884636][T25540] ? __fget_light+0xaf/0x190 [ 1327.889251][T25540] ? __fdget+0x2c/0x40 [ 1327.893465][T25540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.899712][T25540] __sys_sendmmsg+0x123/0x350 [ 1327.904445][T25540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1327.910700][T25540] ? fput_many+0xec/0x130 [ 1327.915095][T25540] ? fput+0x29/0x30 [ 1327.918898][T25540] ? ksys_write+0x145/0x1b0 [ 1327.923408][T25540] __x64_sys_sendmmsg+0x64/0x80 [ 1327.928269][T25540] do_syscall_64+0xcc/0x3a0 [ 1327.932774][T25540] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1327.939134][T25540] RIP: 0033:0x45aff9 [ 1327.943030][T25540] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1327.962810][T25540] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1327.971531][T25540] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1327.979536][T25540] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1327.987626][T25540] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1327.995684][T25540] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1328.003674][T25540] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000023 11:03:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 11:03:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3a3, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:47 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) dup(r1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 11:03:47 executing program 3 (fault-call:10 fault-nth:36): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x240, 0x0, @remote, 0x2}, 0x1c) 11:03:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) [ 1328.655546][T25578] FAULT_INJECTION: forcing a failure. [ 1328.655546][T25578] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.668529][T25578] CPU: 0 PID: 25578 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1328.677235][T25578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1328.687376][T25578] Call Trace: [ 1328.690742][T25578] dump_stack+0x11d/0x181 [ 1328.695150][T25578] should_fail.cold+0xa/0x1a [ 1328.699892][T25578] __should_failslab+0xee/0x130 [ 1328.704784][T25578] should_failslab+0x9/0x14 [ 1328.709307][T25578] kmem_cache_alloc+0x29/0x5d0 [ 1328.714087][T25578] ? fib6_node_lookup+0xed/0x120 [ 1328.719035][T25578] dst_alloc+0xad/0x149 [ 1328.725557][T25578] ip6_dst_alloc+0x3d/0x80 [ 1328.730007][T25578] ip6_rt_cache_alloc+0x12b/0x480 [ 1328.735077][T25578] ip6_pol_route+0x5d2/0x730 [ 1328.739682][T25578] ip6_pol_route_output+0x48/0x60 [ 1328.744788][T25578] fib6_rule_lookup+0x3d6/0x470 [ 1328.749660][T25578] ? ip6_pol_route_input+0x70/0x70 [ 1328.754866][T25578] ? __const_udelay+0x36/0x40 [ 1328.759687][T25578] ? __udelay+0x10/0x20 [ 1328.763864][T25578] ip6_route_output_flags_noref+0x16b/0x230 [ 1328.769770][T25578] ip6_route_output_flags+0x50/0x1a0 [ 1328.775070][T25578] ip6_dst_lookup_tail+0x25d/0xc50 [ 1328.780189][T25578] ? debug_smp_processor_id+0x43/0x137 [ 1328.785822][T25578] ? dst_destroy+0x210/0x210 [ 1328.790424][T25578] ? debug_smp_processor_id+0x43/0x137 [ 1328.795890][T25578] ? dst_destroy+0x210/0x210 [ 1328.800504][T25578] ? __call_rcu+0x153/0x390 11:03:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1328.805036][T25578] ip6_dst_lookup_flow+0x5c/0x110 [ 1328.810081][T25578] rawv6_sendmsg+0x9be/0x2340 [ 1328.814779][T25578] ? process_measurement+0x149/0x1190 [ 1328.820172][T25578] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1328.826463][T25578] ? aa_label_sk_perm+0x89/0xe0 [ 1328.831343][T25578] ? aa_sk_perm+0x1d3/0x590 [ 1328.835884][T25578] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1328.842367][T25578] inet_sendmsg+0x6d/0x90 [ 1328.846710][T25578] ? inet_sendmsg+0x6d/0x90 [ 1328.851226][T25578] ? inet_send_prepare+0x200/0x200 [ 1328.856588][T25578] sock_sendmsg+0x9f/0xc0 [ 1328.861037][T25578] ____sys_sendmsg+0x212/0x4d0 [ 1328.865832][T25578] ___sys_sendmsg+0xb5/0x100 [ 1328.876693][T25578] ? __fget+0xb8/0x1d0 [ 1328.880786][T25578] ? __fget_light+0xaf/0x190 [ 1328.885436][T25578] ? __fdget+0x2c/0x40 [ 1328.889521][T25578] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1328.895773][T25578] __sys_sendmmsg+0x123/0x350 [ 1328.900516][T25578] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 11:03:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x500, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1328.906882][T25578] ? fput_many+0xec/0x130 [ 1328.911244][T25578] ? fput+0x29/0x30 [ 1328.915132][T25578] ? ksys_write+0x145/0x1b0 [ 1328.919687][T25578] __x64_sys_sendmmsg+0x64/0x80 [ 1328.924698][T25578] do_syscall_64+0xcc/0x3a0 [ 1328.929287][T25578] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1328.935194][T25578] RIP: 0033:0x45aff9 11:03:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) [ 1328.939112][T25578] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1328.958912][T25578] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1328.967336][T25578] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1328.975753][T25578] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1328.984950][T25578] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1328.992934][T25578] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1329.001046][T25578] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000024 11:03:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x300, 0x0, @remote, 0x2}, 0x1c) 11:03:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x600, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:48 executing program 0: r0 = memfd_create(&(0x7f0000000140)='\x97', 0x2) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$caif_seqpacket(0x25, 0x5, 0x3) sendfile(r1, r0, &(0x7f00000001c0), 0x80000000) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x95046, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r2, 0x5016, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f0000000280)) ioctl$PIO_CMAP(r5, 0x4b71, &(0x7f0000000100)={0x1ff, 0x4e, 0x200, 0x5, 0x5, 0x6}) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r7, 0x4140, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000080)={0x0, 0xb2d, 0x20, r4, 0x0, &(0x7f0000000040)={0x9c0905, 0x4, [], @ptr=0x4}}) ioctl$TCSETSF(r8, 0x5404, &(0x7f00000000c0)={0x2, 0x101, 0x6, 0x10001, 0xc, "aa88245ad7db0aa4127ecde619b9ab0adebceb"}) 11:03:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x87010000}, 0x0) 11:03:48 executing program 3 (fault-call:10 fault-nth:37): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x700, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 11:03:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:48 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1329.656810][T25621] FAULT_INJECTION: forcing a failure. [ 1329.656810][T25621] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.669569][T25621] CPU: 1 PID: 25621 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1329.678251][T25621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1329.688329][T25621] Call Trace: [ 1329.691707][T25621] dump_stack+0x11d/0x181 [ 1329.696064][T25621] should_fail.cold+0xa/0x1a [ 1329.701555][T25621] __should_failslab+0xee/0x130 [ 1329.706425][T25621] should_failslab+0x9/0x14 [ 1329.710953][T25621] kmem_cache_alloc+0x29/0x5d0 [ 1329.715743][T25621] ? __const_udelay+0x36/0x40 [ 1329.720530][T25621] ? __udelay+0x10/0x20 [ 1329.724780][T25621] dst_alloc+0xad/0x149 [ 1329.728961][T25621] ip6_dst_alloc+0x3d/0x80 [ 1329.733407][T25621] ip6_rt_cache_alloc+0x12b/0x480 [ 1329.738634][T25621] ip6_pol_route+0x5d2/0x730 [ 1329.743272][T25621] ip6_pol_route_output+0x48/0x60 [ 1329.748384][T25621] fib6_rule_lookup+0x3d6/0x470 [ 1329.753321][T25621] ? ip6_pol_route_input+0x70/0x70 [ 1329.758481][T25621] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1329.764255][T25621] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1329.769494][T25621] ip6_route_output_flags_noref+0x16b/0x230 [ 1329.775452][T25621] ip6_route_output_flags+0x50/0x1a0 [ 1329.780766][T25621] ip6_dst_lookup_tail+0x25d/0xc50 [ 1329.785944][T25621] ? debug_smp_processor_id+0x43/0x137 [ 1329.791443][T25621] ? dst_destroy+0x210/0x210 [ 1329.796175][T25621] ? debug_smp_processor_id+0x43/0x137 [ 1329.801926][T25621] ? dst_destroy+0x210/0x210 [ 1329.806530][T25621] ? __call_rcu+0x153/0x390 [ 1329.811110][T25621] ip6_dst_lookup_flow+0x5c/0x110 [ 1329.816327][T25621] rawv6_sendmsg+0x9be/0x2340 [ 1329.821219][T25621] ? process_measurement+0x149/0x1190 [ 1329.826620][T25621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1329.833015][T25621] ? aa_label_sk_perm+0x89/0xe0 [ 1329.837877][T25621] ? aa_sk_perm+0x1d3/0x590 [ 1329.842539][T25621] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1329.849919][T25621] inet_sendmsg+0x6d/0x90 [ 1329.855380][T25621] ? inet_sendmsg+0x6d/0x90 [ 1329.859916][T25621] ? inet_send_prepare+0x200/0x200 [ 1329.865144][T25621] sock_sendmsg+0x9f/0xc0 [ 1329.869493][T25621] ____sys_sendmsg+0x212/0x4d0 [ 1329.874345][T25621] ___sys_sendmsg+0xb5/0x100 [ 1329.878931][T25621] ? __fget+0xb8/0x1d0 [ 1329.883574][T25621] ? __fget_light+0xaf/0x190 [ 1329.888229][T25621] ? __fdget+0x2c/0x40 [ 1329.892297][T25621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1329.898565][T25621] __sys_sendmmsg+0x123/0x350 [ 1329.903254][T25621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1329.910188][T25621] ? fput_many+0xec/0x130 [ 1329.914814][T25621] ? fput+0x29/0x30 [ 1329.918614][T25621] ? ksys_write+0x145/0x1b0 [ 1329.923228][T25621] __x64_sys_sendmmsg+0x64/0x80 [ 1329.928169][T25621] do_syscall_64+0xcc/0x3a0 [ 1329.932748][T25621] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1329.938705][T25621] RIP: 0033:0x45aff9 [ 1329.942612][T25621] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1329.963307][T25621] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1329.971713][T25621] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1329.980095][T25621] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1329.988366][T25621] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:03:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x500, 0x0, @remote, 0x2}, 0x1c) [ 1330.001256][T25621] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1330.009601][T25621] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000025 11:03:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x900, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 11:03:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 11:03:49 executing program 3 (fault-call:10 fault-nth:38): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xb00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xc00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 11:03:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1330.757200][T25662] FAULT_INJECTION: forcing a failure. [ 1330.757200][T25662] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.770010][T25662] CPU: 0 PID: 25662 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1330.778782][T25662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1330.788843][T25662] Call Trace: [ 1330.792201][T25662] dump_stack+0x11d/0x181 [ 1330.796552][T25662] should_fail.cold+0xa/0x1a [ 1330.801503][T25662] __should_failslab+0xee/0x130 [ 1330.806369][T25662] should_failslab+0x9/0x14 [ 1330.810892][T25662] kmem_cache_alloc+0x29/0x5d0 [ 1330.815749][T25662] ? fib6_node_lookup+0xed/0x120 [ 1330.820782][T25662] dst_alloc+0xad/0x149 [ 1330.824977][T25662] ip6_dst_alloc+0x3d/0x80 [ 1330.829632][T25662] ip6_rt_cache_alloc+0x12b/0x480 [ 1330.834678][T25662] ip6_pol_route+0x5d2/0x730 [ 1330.839329][T25662] ? __const_udelay+0x36/0x40 [ 1330.844051][T25662] ip6_pol_route_output+0x48/0x60 [ 1330.849223][T25662] fib6_rule_lookup+0x3d6/0x470 [ 1330.854178][T25662] ? ip6_pol_route_input+0x70/0x70 [ 1330.859429][T25662] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1330.865781][T25662] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1330.870985][T25662] ip6_route_output_flags_noref+0x16b/0x230 [ 1330.876935][T25662] ip6_route_output_flags+0x50/0x1a0 [ 1330.882230][T25662] ip6_dst_lookup_tail+0x25d/0xc50 [ 1330.887564][T25662] ? debug_smp_processor_id+0x43/0x137 [ 1330.895793][T25662] ? dst_destroy+0x210/0x210 [ 1330.900412][T25662] ? debug_smp_processor_id+0x43/0x137 [ 1330.905888][T25662] ? dst_destroy+0x210/0x210 [ 1330.910726][T25662] ? __call_rcu+0x153/0x390 [ 1330.915251][T25662] ip6_dst_lookup_flow+0x5c/0x110 [ 1330.920291][T25662] rawv6_sendmsg+0x9be/0x2340 [ 1330.924994][T25662] ? process_measurement+0x149/0x1190 [ 1330.930472][T25662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1330.936747][T25662] ? aa_label_sk_perm+0x89/0xe0 [ 1330.941615][T25662] ? aa_sk_perm+0x1d3/0x590 [ 1330.946145][T25662] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1330.952567][T25662] inet_sendmsg+0x6d/0x90 [ 1330.956911][T25662] ? inet_sendmsg+0x6d/0x90 [ 1330.961508][T25662] ? inet_send_prepare+0x200/0x200 [ 1330.966637][T25662] sock_sendmsg+0x9f/0xc0 [ 1330.970972][T25662] ____sys_sendmsg+0x212/0x4d0 [ 1330.975816][T25662] ___sys_sendmsg+0xb5/0x100 [ 1330.980425][T25662] ? __fget+0xb8/0x1d0 [ 1330.984509][T25662] ? __fget_light+0xaf/0x190 [ 1330.989973][T25662] ? __fdget+0x2c/0x40 [ 1330.994055][T25662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1331.000329][T25662] __sys_sendmmsg+0x123/0x350 [ 1331.005192][T25662] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1331.011532][T25662] ? fput_many+0xec/0x130 [ 1331.015924][T25662] ? fput+0x29/0x30 [ 1331.019811][T25662] ? ksys_write+0x145/0x1b0 [ 1331.024338][T25662] __x64_sys_sendmmsg+0x64/0x80 [ 1331.029205][T25662] do_syscall_64+0xcc/0x3a0 [ 1331.033736][T25662] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1331.039641][T25662] RIP: 0033:0x45aff9 [ 1331.043549][T25662] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1331.063233][T25662] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1331.071660][T25662] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1331.079648][T25662] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1331.088154][T25662] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1331.099177][T25662] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1331.107157][T25662] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000026 11:03:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x600, 0x0, @remote, 0x2}, 0x1c) 11:03:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:50 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000280)={0x6}, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000000)) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x13, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000140)={0x7f, 0x30, 0xd55907e1393d2a1a, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)={0x7fff, 0x8, 0x1, 0x0, 0x0, [{{r5}, 0xf1}]}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xe00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 11:03:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 11:03:50 executing program 3 (fault-call:10 fault-nth:39): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xf00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 11:03:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1100, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1331.753653][T25704] FAULT_INJECTION: forcing a failure. [ 1331.753653][T25704] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.766398][T25704] CPU: 0 PID: 25704 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1331.775124][T25704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1331.785185][T25704] Call Trace: [ 1331.788486][T25704] dump_stack+0x11d/0x181 [ 1331.792904][T25704] should_fail.cold+0xa/0x1a [ 1331.797559][T25704] __should_failslab+0xee/0x130 [ 1331.802425][T25704] should_failslab+0x9/0x14 [ 1331.807032][T25704] kmem_cache_alloc+0x29/0x5d0 [ 1331.811810][T25704] ? fib6_node_lookup+0xed/0x120 [ 1331.816875][T25704] dst_alloc+0xad/0x149 [ 1331.821077][T25704] ip6_dst_alloc+0x3d/0x80 [ 1331.825506][T25704] ip6_rt_cache_alloc+0x12b/0x480 [ 1331.830734][T25704] ip6_pol_route+0x5d2/0x730 [ 1331.835747][T25704] ip6_pol_route_output+0x48/0x60 [ 1331.840790][T25704] fib6_rule_lookup+0x3d6/0x470 [ 1331.846528][T25704] ? ip6_pol_route_input+0x70/0x70 [ 1331.851677][T25704] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1331.857426][T25704] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1331.862774][T25704] ip6_route_output_flags_noref+0x16b/0x230 [ 1331.868680][T25704] ip6_route_output_flags+0x50/0x1a0 [ 1331.873978][T25704] ip6_dst_lookup_tail+0x25d/0xc50 [ 1331.879105][T25704] ? debug_smp_processor_id+0x43/0x137 [ 1331.884577][T25704] ? dst_destroy+0x210/0x210 [ 1331.889182][T25704] ? debug_smp_processor_id+0x43/0x137 [ 1331.894673][T25704] ? dst_destroy+0x210/0x210 [ 1331.899333][T25704] ? __call_rcu+0x153/0x390 [ 1331.903850][T25704] ip6_dst_lookup_flow+0x5c/0x110 [ 1331.908991][T25704] rawv6_sendmsg+0x9be/0x2340 [ 1331.913680][T25704] ? __const_udelay+0x36/0x40 [ 1331.918833][T25704] ? __udelay+0x10/0x20 [ 1331.923005][T25704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1331.929274][T25704] ? aa_label_sk_perm+0x89/0xe0 [ 1331.935114][T25704] ? aa_sk_perm+0x1d3/0x590 [ 1331.939662][T25704] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1331.946055][T25704] inet_sendmsg+0x6d/0x90 [ 1331.950388][T25704] ? inet_sendmsg+0x6d/0x90 [ 1331.954900][T25704] ? inet_send_prepare+0x200/0x200 [ 1331.960068][T25704] sock_sendmsg+0x9f/0xc0 [ 1331.964509][T25704] ____sys_sendmsg+0x212/0x4d0 [ 1331.969293][T25704] ___sys_sendmsg+0xb5/0x100 [ 1331.973967][T25704] ? __fget+0xb8/0x1d0 [ 1331.978057][T25704] ? __fget_light+0xaf/0x190 [ 1331.982658][T25704] ? __fdget+0x2c/0x40 [ 1331.986784][T25704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1331.994869][T25704] __sys_sendmmsg+0x123/0x350 [ 1331.999585][T25704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1332.006778][T25704] ? fput_many+0xec/0x130 [ 1332.011161][T25704] ? fput+0x29/0x30 [ 1332.015023][T25704] ? ksys_write+0x145/0x1b0 [ 1332.019582][T25704] __x64_sys_sendmmsg+0x64/0x80 [ 1332.024501][T25704] do_syscall_64+0xcc/0x3a0 [ 1332.029022][T25704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1332.034923][T25704] RIP: 0033:0x45aff9 [ 1332.038863][T25704] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1332.063717][T25704] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1332.072429][T25704] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1332.080748][T25704] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1332.088712][T25704] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1332.096811][T25704] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1332.108954][T25704] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000027 11:03:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x700, 0x0, @remote, 0x2}, 0x1c) 11:03:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x2) 11:03:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1200, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:51 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) inotify_init() write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x201526d0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x9db7333d238059d) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{0x0, 0x20, 0x0, 0xf373}, 'syz1\x00'}) getpid() sched_setattr(0x0, 0x0, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self\x00', 0x7140, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x50}, {}]}, 0x10) accept$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) connect$can_bcm(r1, &(0x7f0000000580)={0x1d, r4}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000480)=0x20004) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:51 executing program 3 (fault-call:10 fault-nth:40): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x3) 11:03:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1300, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x4) 11:03:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1332.697617][ C0] net_ratelimit: 2 callbacks suppressed [ 1332.697627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1332.709138][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:03:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1332.848763][T25747] FAULT_INJECTION: forcing a failure. [ 1332.848763][T25747] name failslab, interval 1, probability 0, space 0, times 0 [ 1332.862178][T25747] CPU: 1 PID: 25747 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1332.870920][T25747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.880980][T25747] Call Trace: [ 1332.884264][T25747] dump_stack+0x11d/0x181 [ 1332.888650][T25747] should_fail.cold+0xa/0x1a [ 1332.893378][T25747] __should_failslab+0xee/0x130 [ 1332.898220][T25747] should_failslab+0x9/0x14 [ 1332.903194][T25747] kmem_cache_alloc+0x29/0x5d0 [ 1332.908002][T25747] ? fib6_node_lookup+0xed/0x120 [ 1332.912955][T25747] dst_alloc+0xad/0x149 [ 1332.917594][T25747] ip6_dst_alloc+0x3d/0x80 [ 1332.922036][T25747] ip6_rt_cache_alloc+0x12b/0x480 [ 1332.927123][T25747] ip6_pol_route+0x5d2/0x730 [ 1332.931831][T25747] ip6_pol_route_output+0x48/0x60 [ 1332.936901][T25747] fib6_rule_lookup+0x3d6/0x470 [ 1332.941846][T25747] ? ip6_pol_route_input+0x70/0x70 [ 1332.946978][T25747] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1332.953444][T25747] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1332.958798][T25747] ip6_route_output_flags_noref+0x16b/0x230 [ 1332.964745][T25747] ip6_route_output_flags+0x50/0x1a0 [ 1332.970077][T25747] ip6_dst_lookup_tail+0x25d/0xc50 [ 1332.975205][T25747] ? debug_smp_processor_id+0x43/0x137 [ 1332.980676][T25747] ? dst_destroy+0x210/0x210 [ 1332.985367][T25747] ? debug_smp_processor_id+0x43/0x137 [ 1332.991031][T25747] ? dst_destroy+0x210/0x210 [ 1332.996076][T25747] ? __call_rcu+0x153/0x390 [ 1333.000595][T25747] ip6_dst_lookup_flow+0x5c/0x110 [ 1333.005687][T25747] rawv6_sendmsg+0x9be/0x2340 [ 1333.011533][T25747] ? process_measurement+0x149/0x1190 [ 1333.017117][T25747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1333.023549][T25747] ? aa_label_sk_perm+0x89/0xe0 [ 1333.028420][T25747] ? aa_sk_perm+0x1d3/0x590 [ 1333.033368][T25747] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1333.039883][T25747] inet_sendmsg+0x6d/0x90 [ 1333.044395][T25747] ? inet_sendmsg+0x6d/0x90 [ 1333.049096][T25747] ? inet_send_prepare+0x200/0x200 [ 1333.054281][T25747] sock_sendmsg+0x9f/0xc0 [ 1333.058628][T25747] ____sys_sendmsg+0x212/0x4d0 [ 1333.063449][T25747] ___sys_sendmsg+0xb5/0x100 [ 1333.068044][T25747] ? __fget+0xb8/0x1d0 [ 1333.073286][T25747] ? __fget_light+0xaf/0x190 [ 1333.078072][T25747] ? __fdget+0x2c/0x40 [ 1333.082340][T25747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1333.088771][T25747] __sys_sendmmsg+0x123/0x350 [ 1333.093544][T25747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1333.099855][T25747] ? fput_many+0xec/0x130 [ 1333.104206][T25747] ? fput+0x29/0x30 [ 1333.108020][T25747] ? ksys_write+0x145/0x1b0 [ 1333.112676][T25747] __x64_sys_sendmmsg+0x64/0x80 [ 1333.117648][T25747] do_syscall_64+0xcc/0x3a0 [ 1333.122252][T25747] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1333.128672][T25747] RIP: 0033:0x45aff9 [ 1333.132734][T25747] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1333.153140][T25747] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1333.161758][T25747] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1333.169750][T25747] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1333.177864][T25747] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1333.185833][T25747] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:03:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x900, 0x0, @remote, 0x2}, 0x1c) [ 1333.193854][T25747] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000028 11:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x5) 11:03:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x0}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:52 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='proc\x00') r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000040)={0x0, 0x40000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f00000000c0)=[0x0, 0x0], 0x2}) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1500, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x6) 11:03:52 executing program 3 (fault-call:10 fault-nth:41): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x2}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1600, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x8) 11:03:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x3}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1333.854703][T25781] FAULT_INJECTION: forcing a failure. [ 1333.854703][T25781] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.868110][T25781] CPU: 0 PID: 25781 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1333.876927][T25781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.887166][T25781] Call Trace: [ 1333.890514][T25781] dump_stack+0x11d/0x181 [ 1333.897041][T25781] should_fail.cold+0xa/0x1a [ 1333.901671][T25781] __should_failslab+0xee/0x130 [ 1333.908883][T25781] should_failslab+0x9/0x14 [ 1333.913556][T25781] kmem_cache_alloc+0x29/0x5d0 [ 1333.918427][T25781] ? fib6_node_lookup+0xed/0x120 [ 1333.923441][T25781] dst_alloc+0xad/0x149 [ 1333.927617][T25781] ip6_dst_alloc+0x3d/0x80 [ 1333.932172][T25781] ip6_rt_cache_alloc+0x12b/0x480 [ 1333.937438][T25781] ip6_pol_route+0x5d2/0x730 [ 1333.942235][T25781] ip6_pol_route_output+0x48/0x60 [ 1333.947371][T25781] fib6_rule_lookup+0x3d6/0x470 [ 1333.952779][T25781] ? ip6_pol_route_input+0x70/0x70 [ 1333.957910][T25781] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1333.963681][T25781] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1333.968916][T25781] ip6_route_output_flags_noref+0x16b/0x230 [ 1333.976712][T25781] ip6_route_output_flags+0x50/0x1a0 [ 1333.982009][T25781] ip6_dst_lookup_tail+0x25d/0xc50 [ 1333.987144][T25781] ? debug_smp_processor_id+0x43/0x137 [ 1333.992973][T25781] ? dst_destroy+0x210/0x210 [ 1333.997787][T25781] ? debug_smp_processor_id+0x43/0x137 [ 1334.003363][T25781] ? dst_destroy+0x210/0x210 [ 1334.007970][T25781] ? __call_rcu+0x153/0x390 [ 1334.012538][T25781] ip6_dst_lookup_flow+0x5c/0x110 [ 1334.017653][T25781] rawv6_sendmsg+0x9be/0x2340 [ 1334.022360][T25781] ? process_measurement+0x149/0x1190 [ 1334.027748][T25781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1334.034165][T25781] ? aa_label_sk_perm+0x89/0xe0 [ 1334.039037][T25781] ? aa_sk_perm+0x1d3/0x590 [ 1334.043624][T25781] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1334.050100][T25781] inet_sendmsg+0x6d/0x90 [ 1334.054442][T25781] ? inet_sendmsg+0x6d/0x90 [ 1334.058957][T25781] ? inet_send_prepare+0x200/0x200 [ 1334.064078][T25781] sock_sendmsg+0x9f/0xc0 [ 1334.068561][T25781] ____sys_sendmsg+0x212/0x4d0 [ 1334.073416][T25781] ___sys_sendmsg+0xb5/0x100 [ 1334.078149][T25781] ? __fget+0xb8/0x1d0 [ 1334.082288][T25781] ? __fget_light+0xaf/0x190 [ 1334.086926][T25781] ? __fdget+0x2c/0x40 [ 1334.091066][T25781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1334.097347][T25781] __sys_sendmmsg+0x123/0x350 [ 1334.102102][T25781] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1334.108469][T25781] ? fput_many+0xec/0x130 [ 1334.112793][T25781] ? fput+0x29/0x30 [ 1334.116598][T25781] ? ksys_write+0x145/0x1b0 [ 1334.121232][T25781] __x64_sys_sendmmsg+0x64/0x80 [ 1334.126310][T25781] do_syscall_64+0xcc/0x3a0 [ 1334.130818][T25781] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1334.136701][T25781] RIP: 0033:0x45aff9 [ 1334.140609][T25781] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1334.160412][T25781] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1334.168822][T25781] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1334.176810][T25781] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1334.184796][T25781] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1334.192905][T25781] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1334.200926][T25781] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000029 11:03:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xa00, 0x0, @remote, 0x2}, 0x1c) 11:03:53 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x5}, 0x8) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 11:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x9) 11:03:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x5}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xa) 11:03:53 executing program 3 (fault-call:10 fault-nth:42): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1d00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x9}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xb) 11:03:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x10}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1334.924002][T25823] FAULT_INJECTION: forcing a failure. [ 1334.924002][T25823] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.936813][T25823] CPU: 1 PID: 25823 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1334.945502][T25823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.955563][T25823] Call Trace: [ 1334.958863][T25823] dump_stack+0x11d/0x181 [ 1334.963313][T25823] should_fail.cold+0xa/0x1a [ 1334.967932][T25823] __should_failslab+0xee/0x130 [ 1334.972795][T25823] should_failslab+0x9/0x14 [ 1334.977307][T25823] kmem_cache_alloc+0x29/0x5d0 [ 1334.982105][T25823] ? fib6_node_lookup+0xed/0x120 [ 1334.987062][T25823] dst_alloc+0xad/0x149 [ 1334.991232][T25823] ip6_dst_alloc+0x3d/0x80 [ 1334.995656][T25823] ip6_rt_cache_alloc+0x12b/0x480 [ 1335.000796][T25823] ip6_pol_route+0x5d2/0x730 [ 1335.005414][T25823] ip6_pol_route_output+0x48/0x60 [ 1335.010543][T25823] fib6_rule_lookup+0x3d6/0x470 [ 1335.015405][T25823] ? ip6_pol_route_input+0x70/0x70 11:03:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1335.020684][T25823] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1335.026521][T25823] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1335.031873][T25823] ip6_route_output_flags_noref+0x16b/0x230 [ 1335.037781][T25823] ip6_route_output_flags+0x50/0x1a0 [ 1335.043078][T25823] ip6_dst_lookup_tail+0x25d/0xc50 [ 1335.048243][T25823] ? debug_smp_processor_id+0x43/0x137 [ 1335.053734][T25823] ? dst_destroy+0x210/0x210 [ 1335.058431][T25823] ? debug_smp_processor_id+0x43/0x137 [ 1335.064127][T25823] ? dst_destroy+0x210/0x210 [ 1335.068736][T25823] ? __call_rcu+0x153/0x390 [ 1335.073283][T25823] ip6_dst_lookup_flow+0x5c/0x110 [ 1335.078299][T25823] rawv6_sendmsg+0x9be/0x2340 [ 1335.083874][T25823] ? process_measurement+0x149/0x1190 [ 1335.089255][T25823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1335.097282][T25823] ? aa_label_sk_perm+0x89/0xe0 [ 1335.102252][T25823] ? aa_sk_perm+0x1d3/0x590 [ 1335.106771][T25823] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1335.113102][T25823] inet_sendmsg+0x6d/0x90 [ 1335.117429][T25823] ? inet_sendmsg+0x6d/0x90 [ 1335.121986][T25823] ? inet_send_prepare+0x200/0x200 [ 1335.127132][T25823] sock_sendmsg+0x9f/0xc0 [ 1335.131602][T25823] ____sys_sendmsg+0x212/0x4d0 [ 1335.136717][T25823] ___sys_sendmsg+0xb5/0x100 [ 1335.145074][T25823] ? __fget+0xb8/0x1d0 [ 1335.149153][T25823] ? __fget_light+0xaf/0x190 [ 1335.153846][T25823] ? __fdget+0x2c/0x40 [ 1335.158034][T25823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1335.164272][T25823] __sys_sendmmsg+0x123/0x350 [ 1335.168968][T25823] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 11:03:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xe00, 0x0, @remote, 0x2}, 0x1c) [ 1335.175209][T25823] ? fput_many+0xec/0x130 [ 1335.179748][T25823] ? fput+0x29/0x30 [ 1335.183561][T25823] ? ksys_write+0x145/0x1b0 [ 1335.188157][T25823] __x64_sys_sendmmsg+0x64/0x80 [ 1335.193048][T25823] do_syscall_64+0xcc/0x3a0 [ 1335.197569][T25823] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1335.203470][T25823] RIP: 0033:0x45aff9 [ 1335.207481][T25823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1335.227172][T25823] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1335.235777][T25823] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1335.243789][T25823] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1335.251887][T25823] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1335.259983][T25823] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1335.267958][T25823] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000002a 11:03:54 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x40000, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480)='/dev/bsg\x00', 0x915040, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000440)=0x6e) setfsuid(r2) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x40, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000380)={&(0x7f0000000000/0x3000)=nil, 0x3000}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000300)={0xa20000, 0x9, 0x8d, r5, 0x0, &(0x7f0000000180)={0x990a94, 0x3, [], @string=&(0x7f0000000140)=0x6}}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x14}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc) 11:03:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2100, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:54 executing program 3 (fault-call:10 fault-nth:43): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe) 11:03:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x16}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1335.907769][T25861] FAULT_INJECTION: forcing a failure. [ 1335.907769][T25861] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.922193][T25861] CPU: 0 PID: 25861 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1335.931099][T25861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.941280][T25861] Call Trace: [ 1335.944581][T25861] dump_stack+0x11d/0x181 [ 1335.949051][T25861] should_fail.cold+0xa/0x1a [ 1335.953671][T25861] __should_failslab+0xee/0x130 [ 1335.958883][T25861] should_failslab+0x9/0x14 [ 1335.963430][T25861] kmem_cache_alloc+0x29/0x5d0 [ 1335.970492][T25861] ? fib6_node_lookup+0xed/0x120 [ 1335.975567][T25861] dst_alloc+0xad/0x149 [ 1335.980402][T25861] ip6_dst_alloc+0x3d/0x80 [ 1335.985089][T25861] ip6_rt_cache_alloc+0x12b/0x480 [ 1335.990227][T25861] ip6_pol_route+0x5d2/0x730 [ 1335.995265][T25861] ip6_pol_route_output+0x48/0x60 [ 1336.001212][T25861] fib6_rule_lookup+0x3d6/0x470 [ 1336.007061][T25861] ? ip6_pol_route_input+0x70/0x70 [ 1336.012892][T25861] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1336.018787][T25861] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1336.024001][T25861] ip6_route_output_flags_noref+0x16b/0x230 [ 1336.030807][T25861] ip6_route_output_flags+0x50/0x1a0 [ 1336.036143][T25861] ip6_dst_lookup_tail+0x25d/0xc50 [ 1336.041268][T25861] ? debug_smp_processor_id+0x43/0x137 [ 1336.046741][T25861] ? dst_destroy+0x210/0x210 [ 1336.051528][T25861] ? debug_smp_processor_id+0x43/0x137 [ 1336.057077][T25861] ? dst_destroy+0x210/0x210 [ 1336.062111][T25861] ? __call_rcu+0x153/0x390 [ 1336.066735][T25861] ip6_dst_lookup_flow+0x5c/0x110 [ 1336.071848][T25861] rawv6_sendmsg+0x9be/0x2340 [ 1336.076978][T25861] ? process_measurement+0x149/0x1190 [ 1336.082362][T25861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1336.088707][T25861] ? aa_label_sk_perm+0x89/0xe0 [ 1336.093739][T25861] ? aa_sk_perm+0x1d3/0x590 [ 1336.098358][T25861] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1336.104888][T25861] inet_sendmsg+0x6d/0x90 [ 1336.109420][T25861] ? inet_sendmsg+0x6d/0x90 [ 1336.114074][T25861] ? inet_send_prepare+0x200/0x200 [ 1336.119246][T25861] sock_sendmsg+0x9f/0xc0 [ 1336.123578][T25861] ____sys_sendmsg+0x212/0x4d0 [ 1336.128526][T25861] ___sys_sendmsg+0xb5/0x100 [ 1336.133209][T25861] ? __fget+0xb8/0x1d0 [ 1336.137434][T25861] ? __fget_light+0xaf/0x190 [ 1336.142052][T25861] ? __fdget+0x2c/0x40 [ 1336.146124][T25861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1336.152467][T25861] __sys_sendmmsg+0x123/0x350 [ 1336.157247][T25861] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1336.164838][T25861] ? fput_many+0xec/0x130 [ 1336.169224][T25861] ? fput+0x29/0x30 [ 1336.173228][T25861] ? ksys_write+0x145/0x1b0 [ 1336.177756][T25861] __x64_sys_sendmmsg+0x64/0x80 [ 1336.182650][T25861] do_syscall_64+0xcc/0x3a0 [ 1336.187188][T25861] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1336.193716][T25861] RIP: 0033:0x45aff9 [ 1336.197638][T25861] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1336.218345][T25861] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1336.226863][T25861] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1336.234928][T25861] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1336.242988][T25861] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1336.251032][T25861] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:03:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xf) [ 1336.259290][T25861] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000002b 11:03:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x1802, 0x0, @remote, 0x2}, 0x1c) 11:03:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2500, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:55 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x4000) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=""/109, &(0x7f0000000040)=0x6d) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0xb7410000) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xb478644c9808da14}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x2004e6b6e4d26041, 0x0, 0x0, {0x2, 0x0, 0x2}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc00}, 0x80) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x26}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x10) 11:03:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2800, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1={0xff, 0x1, [], 0x63}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:55 executing program 3 (fault-call:10 fault-nth:44): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x11) [ 1336.910724][T25898] FAULT_INJECTION: forcing a failure. [ 1336.910724][T25898] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.924354][T25898] CPU: 0 PID: 25898 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1336.933095][T25898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.943266][T25898] Call Trace: [ 1336.946579][T25898] dump_stack+0x11d/0x181 [ 1336.951485][T25898] should_fail.cold+0xa/0x1a [ 1336.956129][T25898] __should_failslab+0xee/0x130 [ 1336.961040][T25898] should_failslab+0x9/0x14 [ 1336.966552][T25898] kmem_cache_alloc+0x29/0x5d0 [ 1336.971694][T25898] ? fib6_node_lookup+0xed/0x120 [ 1336.976722][T25898] dst_alloc+0xad/0x149 [ 1336.980984][T25898] ip6_dst_alloc+0x3d/0x80 [ 1336.986603][T25898] ip6_rt_cache_alloc+0x12b/0x480 [ 1336.991998][T25898] ip6_pol_route+0x5d2/0x730 [ 1336.996641][T25898] ip6_pol_route_output+0x48/0x60 [ 1337.001772][T25898] fib6_rule_lookup+0x3d6/0x470 [ 1337.006667][T25898] ? ip6_pol_route_input+0x70/0x70 [ 1337.011905][T25898] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1337.017655][T25898] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1337.022881][T25898] ip6_route_output_flags_noref+0x16b/0x230 [ 1337.028976][T25898] ip6_route_output_flags+0x50/0x1a0 [ 1337.034327][T25898] ip6_dst_lookup_tail+0x25d/0xc50 [ 1337.039496][T25898] ? debug_smp_processor_id+0x43/0x137 [ 1337.045005][T25898] ? dst_destroy+0x210/0x210 [ 1337.049612][T25898] ? debug_smp_processor_id+0x43/0x137 [ 1337.055157][T25898] ? dst_destroy+0x210/0x210 [ 1337.059769][T25898] ? __call_rcu+0x153/0x390 [ 1337.064297][T25898] ip6_dst_lookup_flow+0x5c/0x110 [ 1337.069462][T25898] rawv6_sendmsg+0x9be/0x2340 [ 1337.074231][T25898] ? process_measurement+0x149/0x1190 [ 1337.079630][T25898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1337.085900][T25898] ? aa_label_sk_perm+0x89/0xe0 [ 1337.090905][T25898] ? aa_sk_perm+0x1d3/0x590 [ 1337.095438][T25898] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1337.101899][T25898] inet_sendmsg+0x6d/0x90 [ 1337.106310][T25898] ? inet_sendmsg+0x6d/0x90 [ 1337.110829][T25898] ? inet_send_prepare+0x200/0x200 [ 1337.116101][T25898] sock_sendmsg+0x9f/0xc0 [ 1337.120454][T25898] ____sys_sendmsg+0x212/0x4d0 [ 1337.125705][T25898] ___sys_sendmsg+0xb5/0x100 [ 1337.130317][T25898] ? __fget+0xb8/0x1d0 [ 1337.134442][T25898] ? __fget_light+0xaf/0x190 [ 1337.139149][T25898] ? __fdget+0x2c/0x40 [ 1337.143328][T25898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1337.149650][T25898] __sys_sendmmsg+0x123/0x350 [ 1337.154607][T25898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1337.160891][T25898] ? fput_many+0xec/0x130 [ 1337.165665][T25898] ? fput+0x29/0x30 [ 1337.169482][T25898] ? ksys_write+0x145/0x1b0 [ 1337.174002][T25898] __x64_sys_sendmmsg+0x64/0x80 [ 1337.179633][T25898] do_syscall_64+0xcc/0x3a0 [ 1337.184349][T25898] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1337.191141][T25898] RIP: 0033:0x45aff9 [ 1337.195103][T25898] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1337.215252][T25898] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1337.223710][T25898] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1337.231687][T25898] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1337.240188][T25898] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1337.248192][T25898] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:03:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x12) 11:03:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1337.256259][T25898] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000002c 11:03:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x2000, 0x0, @remote, 0x2}, 0x1c) 11:03:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x2, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2d00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:56 executing program 0: r0 = memfd_create(&(0x7f0000000300)='#\'%ndev\x00\x95\t\xd7i\xbe\x84M\xa9\xac!\xb13f7C\x06\x00\x00\x00\xef\xbbL\xee\x87\xc6\xe6\x0f', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = dup2(0xffffffffffffffff, r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f00000000c0)={r4, 0xc5b}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000580)=[@in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @rand_addr=0x9}, 0x4}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e22, 0x4, @mcast1, 0x25d63d2}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xbd8}, @in6={0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1969ca0e}, @in6={0xa, 0x4e20, 0x7, @mcast2}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0x5c, @empty, 0x1}], 0xc8) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000180)={0xe, 0x3, 0xfa00, @id_resuseaddr={&(0x7f0000000480)=0x1, r7, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000540)={0xe, 0x302, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r8, 0x0, 0x1, 0x4}}, 0x6ee1f56b) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x0, r8, 0x10, 0x1, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x7}}}, 0xa0) 11:03:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x13) 11:03:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x3, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2fff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:56 executing program 3 (fault-call:10 fault-nth:45): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x14) 11:03:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1337.973020][T25945] FAULT_INJECTION: forcing a failure. [ 1337.973020][T25945] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.986032][T25945] CPU: 1 PID: 25945 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1337.994763][T25945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.005409][T25945] Call Trace: [ 1338.008743][T25945] dump_stack+0x11d/0x181 [ 1338.013362][T25945] should_fail.cold+0xa/0x1a [ 1338.018845][T25945] __should_failslab+0xee/0x130 [ 1338.023733][T25945] should_failslab+0x9/0x14 [ 1338.028287][T25945] kmem_cache_alloc+0x29/0x5d0 [ 1338.033175][T25945] ? fib6_node_lookup+0xed/0x120 [ 1338.038483][T25945] dst_alloc+0xad/0x149 [ 1338.042661][T25945] ip6_dst_alloc+0x3d/0x80 [ 1338.047086][T25945] ip6_rt_cache_alloc+0x12b/0x480 [ 1338.052124][T25945] ip6_pol_route+0x5d2/0x730 [ 1338.056728][T25945] ? __const_udelay+0x36/0x40 [ 1338.061433][T25945] ip6_pol_route_output+0x48/0x60 [ 1338.066483][T25945] fib6_rule_lookup+0x3d6/0x470 [ 1338.071379][T25945] ? ip6_pol_route_input+0x70/0x70 [ 1338.076578][T25945] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1338.082416][T25945] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1338.088379][T25945] ip6_route_output_flags_noref+0x16b/0x230 [ 1338.094347][T25945] ip6_route_output_flags+0x50/0x1a0 [ 1338.100180][T25945] ip6_dst_lookup_tail+0x25d/0xc50 [ 1338.105309][T25945] ? debug_smp_processor_id+0x43/0x137 [ 1338.110840][T25945] ? dst_destroy+0x210/0x210 [ 1338.115525][T25945] ? debug_smp_processor_id+0x43/0x137 [ 1338.120998][T25945] ? dst_destroy+0x210/0x210 [ 1338.125657][T25945] ? __call_rcu+0x153/0x390 [ 1338.130183][T25945] ip6_dst_lookup_flow+0x5c/0x110 [ 1338.135213][T25945] rawv6_sendmsg+0x9be/0x2340 [ 1338.139980][T25945] ? __const_udelay+0x36/0x40 [ 1338.144679][T25945] ? __udelay+0x10/0x20 [ 1338.148851][T25945] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1338.155108][T25945] ? aa_label_sk_perm+0x89/0xe0 [ 1338.159976][T25945] ? aa_sk_perm+0x1d3/0x590 [ 1338.164485][T25945] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 11:03:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x5, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1338.170833][T25945] inet_sendmsg+0x6d/0x90 [ 1338.175220][T25945] ? inet_sendmsg+0x6d/0x90 [ 1338.179750][T25945] ? inet_send_prepare+0x200/0x200 [ 1338.184887][T25945] sock_sendmsg+0x9f/0xc0 [ 1338.189253][T25945] ____sys_sendmsg+0x212/0x4d0 [ 1338.194105][T25945] ___sys_sendmsg+0xb5/0x100 [ 1338.198783][T25945] ? __fget+0xb8/0x1d0 [ 1338.202873][T25945] ? __fget_light+0xaf/0x190 [ 1338.207474][T25945] ? __fdget+0x2c/0x40 [ 1338.211602][T25945] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1338.217884][T25945] __sys_sendmmsg+0x123/0x350 [ 1338.222568][T25945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1338.228859][T25945] ? fput_many+0xec/0x130 [ 1338.233237][T25945] ? fput+0x29/0x30 [ 1338.237173][T25945] ? ksys_write+0x145/0x1b0 [ 1338.241687][T25945] __x64_sys_sendmmsg+0x64/0x80 [ 1338.246529][T25945] do_syscall_64+0xcc/0x3a0 [ 1338.251029][T25945] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1338.256915][T25945] RIP: 0033:0x45aff9 [ 1338.260838][T25945] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1338.280516][T25945] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1338.288966][T25945] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1338.296974][T25945] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1338.305007][T25945] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1338.312986][T25945] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:03:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x2ee0, 0x0, @remote, 0x2}, 0x1c) 11:03:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x30) [ 1338.321700][T25945] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000002d 11:03:57 executing program 0: write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xfec) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ipvlan0\x00', 0x1}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x60) 11:03:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3200, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x6, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:57 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000004, 0x13, r0, 0xb0f47000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:57 executing program 3 (fault-call:10 fault-nth:46): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x10e) 11:03:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x7, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1339.004291][T25985] FAULT_INJECTION: forcing a failure. [ 1339.004291][T25985] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.017203][T25985] CPU: 1 PID: 25985 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1339.025892][T25985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.036094][T25985] Call Trace: [ 1339.039416][T25985] dump_stack+0x11d/0x181 [ 1339.043833][T25985] should_fail.cold+0xa/0x1a [ 1339.048449][T25985] __should_failslab+0xee/0x130 [ 1339.053396][T25985] should_failslab+0x9/0x14 [ 1339.057946][T25985] kmem_cache_alloc+0x29/0x5d0 [ 1339.062888][T25985] ? fib6_node_lookup+0xed/0x120 [ 1339.067836][T25985] dst_alloc+0xad/0x149 [ 1339.072023][T25985] ip6_dst_alloc+0x3d/0x80 [ 1339.076890][T25985] ip6_rt_cache_alloc+0x12b/0x480 [ 1339.081986][T25985] ip6_pol_route+0x5d2/0x730 [ 1339.086603][T25985] ip6_pol_route_output+0x48/0x60 [ 1339.092452][T25985] fib6_rule_lookup+0x3d6/0x470 [ 1339.097401][T25985] ? ip6_pol_route_input+0x70/0x70 [ 1339.102593][T25985] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1339.109014][T25985] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1339.114258][T25985] ip6_route_output_flags_noref+0x16b/0x230 [ 1339.124334][T25985] ip6_route_output_flags+0x50/0x1a0 [ 1339.129894][T25985] ip6_dst_lookup_tail+0x25d/0xc50 [ 1339.138438][T25985] ? debug_smp_processor_id+0x43/0x137 [ 1339.144428][T25985] ? dst_destroy+0x210/0x210 [ 1339.149034][T25985] ? debug_smp_processor_id+0x43/0x137 11:03:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x187) [ 1339.154734][T25985] ? dst_destroy+0x210/0x210 [ 1339.159561][T25985] ? __call_rcu+0x153/0x390 [ 1339.164265][T25985] ip6_dst_lookup_flow+0x5c/0x110 [ 1339.170797][T25985] rawv6_sendmsg+0x9be/0x2340 [ 1339.176710][T25985] ? process_measurement+0x149/0x1190 [ 1339.182134][T25985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1339.188716][T25985] ? aa_label_sk_perm+0x89/0xe0 [ 1339.194266][T25985] ? aa_sk_perm+0x1d3/0x590 [ 1339.198881][T25985] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1339.205211][T25985] inet_sendmsg+0x6d/0x90 [ 1339.209727][T25985] ? inet_sendmsg+0x6d/0x90 [ 1339.214351][T25985] ? inet_send_prepare+0x200/0x200 [ 1339.219550][T25985] sock_sendmsg+0x9f/0xc0 [ 1339.223998][T25985] ____sys_sendmsg+0x212/0x4d0 [ 1339.228867][T25985] ___sys_sendmsg+0xb5/0x100 [ 1339.233551][T25985] ? __fget+0xb8/0x1d0 [ 1339.237719][T25985] ? __fget_light+0xaf/0x190 [ 1339.242352][T25985] ? __fdget+0x2c/0x40 [ 1339.247037][T25985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1339.253278][T25985] __sys_sendmmsg+0x123/0x350 [ 1339.258069][T25985] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1339.264742][T25985] ? fput_many+0xec/0x130 [ 1339.269138][T25985] ? fput+0x29/0x30 [ 1339.273107][T25985] ? ksys_write+0x145/0x1b0 [ 1339.277861][T25985] __x64_sys_sendmmsg+0x64/0x80 [ 1339.282776][T25985] do_syscall_64+0xcc/0x3a0 [ 1339.287566][T25985] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1339.293675][T25985] RIP: 0033:0x45aff9 11:03:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x3f00, 0x0, @remote, 0x2}, 0x1c) 11:03:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3500, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:58 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1339.297637][T25985] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1339.317405][T25985] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1339.327008][T25985] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1339.336326][T25985] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1339.344850][T25985] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1339.353508][T25985] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1339.361743][T25985] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000002e 11:03:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x8, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0xb, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x20c) 11:03:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:58 executing program 3 (fault-call:10 fault-nth:47): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:58 executing program 0: write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xfec) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x9}]) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x40) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) io_submit(r1, 0x4, &(0x7f0000001300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x1, r2, &(0x7f0000000000)="8fd73ff1179c83e97e503fa31647c7165501509c8e0e074e330e123b54cab8d736a12fd9d8fbfe008ecb1405c1ad64d46ea97dc8d64a05cbe2782402dc0faec5e52c6e8435a8", 0x46, 0x0, 0x0, 0x1, r3}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x7759, r4, &(0x7f0000000200)="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", 0x1000, 0x6c, 0x0, 0x0, r5}, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x5, 0x5, 0xffffffffffffffff, &(0x7f0000000180)="91bfd5ed1cc4bdb2f9e935b7f6a33b68183ff3585df713324dca7940c30fb2c586d6062603bb8df11efe1344b7d92b55b879283aff39bea0ad0097", 0x3b, 0x0, 0x0, 0x0, r6}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000001240)="2c81e014d495fd09f538b236f29c306b75b4027b4a119d2b12c1b78f47b6158c7b0e8c04136257e4826057b567e4c0be8ab7b1326adde08f7be89f820a9f667696affb3584", 0x45, 0x10000, 0x0, 0x0, r7}]) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x48, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x300) 11:03:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3d00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1340.089224][T26027] FAULT_INJECTION: forcing a failure. [ 1340.089224][T26027] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.102384][T26027] CPU: 0 PID: 26027 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1340.111147][T26027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.121646][T26027] Call Trace: [ 1340.124973][T26027] dump_stack+0x11d/0x181 [ 1340.129323][T26027] should_fail.cold+0xa/0x1a [ 1340.133921][T26027] __should_failslab+0xee/0x130 [ 1340.140936][T26027] should_failslab+0x9/0x14 [ 1340.145590][T26027] kmem_cache_alloc+0x29/0x5d0 [ 1340.150372][T26027] ? fib6_node_lookup+0xed/0x120 [ 1340.155407][T26027] dst_alloc+0xad/0x149 [ 1340.159578][T26027] ip6_dst_alloc+0x3d/0x80 [ 1340.164145][T26027] ip6_rt_cache_alloc+0x12b/0x480 [ 1340.170156][T26027] ip6_pol_route+0x5d2/0x730 [ 1340.175386][T26027] ? __const_udelay+0x36/0x40 [ 1340.180152][T26027] ip6_pol_route_output+0x48/0x60 [ 1340.185667][T26027] fib6_rule_lookup+0x3d6/0x470 [ 1340.190714][T26027] ? ip6_pol_route_input+0x70/0x70 [ 1340.195868][T26027] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1340.201607][T26027] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1340.207953][T26027] ip6_route_output_flags_noref+0x16b/0x230 [ 1340.214066][T26027] ip6_route_output_flags+0x50/0x1a0 [ 1340.220404][T26027] ip6_dst_lookup_tail+0x25d/0xc50 [ 1340.225718][T26027] ? debug_smp_processor_id+0x43/0x137 [ 1340.231205][T26027] ? dst_destroy+0x210/0x210 [ 1340.235837][T26027] ? debug_smp_processor_id+0x43/0x137 [ 1340.241343][T26027] ? dst_destroy+0x210/0x210 [ 1340.246743][T26027] ? __call_rcu+0x153/0x390 [ 1340.251264][T26027] ip6_dst_lookup_flow+0x5c/0x110 [ 1340.257382][T26027] rawv6_sendmsg+0x9be/0x2340 [ 1340.262074][T26027] ? process_measurement+0x149/0x1190 [ 1340.267651][T26027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1340.274009][T26027] ? aa_label_sk_perm+0x89/0xe0 [ 1340.278874][T26027] ? aa_sk_perm+0x1d3/0x590 [ 1340.284076][T26027] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1340.290434][T26027] inet_sendmsg+0x6d/0x90 [ 1340.294784][T26027] ? inet_sendmsg+0x6d/0x90 [ 1340.299304][T26027] ? inet_send_prepare+0x200/0x200 [ 1340.304517][T26027] sock_sendmsg+0x9f/0xc0 [ 1340.308867][T26027] ____sys_sendmsg+0x212/0x4d0 [ 1340.313735][T26027] ___sys_sendmsg+0xb5/0x100 [ 1340.318424][T26027] ? __fget+0xb8/0x1d0 [ 1340.322608][T26027] ? __fget_light+0xaf/0x190 [ 1340.327393][T26027] ? __fdget+0x2c/0x40 [ 1340.331685][T26027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1340.339022][T26027] __sys_sendmmsg+0x123/0x350 [ 1340.343736][T26027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1340.350141][T26027] ? fput_many+0xec/0x130 [ 1340.354600][T26027] ? fput+0x29/0x30 [ 1340.358467][T26027] ? ksys_write+0x145/0x1b0 [ 1340.363802][T26027] __x64_sys_sendmmsg+0x64/0x80 [ 1340.368813][T26027] do_syscall_64+0xcc/0x3a0 [ 1340.373437][T26027] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1340.379340][T26027] RIP: 0033:0x45aff9 [ 1340.383566][T26027] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1340.404138][T26027] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1340.412557][T26027] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1340.420581][T26027] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1340.428583][T26027] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:03:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x4000, 0x0, @remote, 0x2}, 0x1c) 11:03:59 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x4e6502) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:03:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4c, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1340.436810][T26027] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1340.445756][T26027] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000002f 11:03:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x324) 11:03:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x68, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:03:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3f00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:03:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x500) 11:03:59 executing program 3 (fault-call:10 fault-nth:48): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:03:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x6c, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x600) 11:04:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1341.154233][T26068] FAULT_INJECTION: forcing a failure. [ 1341.154233][T26068] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.168039][T26068] CPU: 1 PID: 26068 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1341.176808][T26068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.187063][T26068] Call Trace: [ 1341.190363][T26068] dump_stack+0x11d/0x181 [ 1341.194724][T26068] should_fail.cold+0xa/0x1a [ 1341.199435][T26068] __should_failslab+0xee/0x130 [ 1341.204463][T26068] should_failslab+0x9/0x14 [ 1341.209068][T26068] kmem_cache_alloc+0x29/0x5d0 [ 1341.213911][T26068] ? fib6_node_lookup+0xed/0x120 [ 1341.218871][T26068] dst_alloc+0xad/0x149 [ 1341.223995][T26068] ip6_dst_alloc+0x3d/0x80 [ 1341.228444][T26068] ip6_rt_cache_alloc+0x12b/0x480 [ 1341.233714][T26068] ip6_pol_route+0x5d2/0x730 [ 1341.238377][T26068] ip6_pol_route_output+0x48/0x60 [ 1341.243493][T26068] fib6_rule_lookup+0x3d6/0x470 [ 1341.248363][T26068] ? ip6_pol_route_input+0x70/0x70 [ 1341.253497][T26068] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1341.259368][T26068] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1341.264591][T26068] ip6_route_output_flags_noref+0x16b/0x230 [ 1341.270500][T26068] ip6_route_output_flags+0x50/0x1a0 [ 1341.275804][T26068] ip6_dst_lookup_tail+0x25d/0xc50 [ 1341.282064][T26068] ? debug_smp_processor_id+0x43/0x137 [ 1341.287591][T26068] ? dst_destroy+0x210/0x210 [ 1341.292204][T26068] ? debug_smp_processor_id+0x43/0x137 [ 1341.297753][T26068] ? dst_destroy+0x210/0x210 [ 1341.302364][T26068] ? __call_rcu+0x153/0x390 [ 1341.306884][T26068] ip6_dst_lookup_flow+0x5c/0x110 [ 1341.311988][T26068] rawv6_sendmsg+0x9be/0x2340 [ 1341.316671][T26068] ? process_measurement+0x149/0x1190 [ 1341.322168][T26068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1341.328424][T26068] ? aa_label_sk_perm+0x89/0xe0 [ 1341.333522][T26068] ? aa_sk_perm+0x1d3/0x590 [ 1341.338030][T26068] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1341.345222][T26068] inet_sendmsg+0x6d/0x90 [ 1341.349736][T26068] ? inet_sendmsg+0x6d/0x90 [ 1341.354333][T26068] ? inet_send_prepare+0x200/0x200 [ 1341.359474][T26068] sock_sendmsg+0x9f/0xc0 [ 1341.363810][T26068] ____sys_sendmsg+0x212/0x4d0 [ 1341.368657][T26068] ___sys_sendmsg+0xb5/0x100 [ 1341.373304][T26068] ? __fget+0xb8/0x1d0 [ 1341.377499][T26068] ? __fget_light+0xaf/0x190 [ 1341.382077][T26068] ? __fdget+0x2c/0x40 [ 1341.386212][T26068] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1341.392565][T26068] __sys_sendmmsg+0x123/0x350 [ 1341.397295][T26068] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1341.403538][T26068] ? fput_many+0xec/0x130 [ 1341.407872][T26068] ? fput+0x29/0x30 [ 1341.411692][T26068] ? ksys_write+0x145/0x1b0 [ 1341.416299][T26068] __x64_sys_sendmmsg+0x64/0x80 [ 1341.421159][T26068] do_syscall_64+0xcc/0x3a0 [ 1341.425677][T26068] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1341.431577][T26068] RIP: 0033:0x45aff9 [ 1341.435475][T26068] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x4002, 0x0, @remote, 0x2}, 0x1c) 11:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x900) 11:04:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x74, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:00 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000200)=""/156) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1341.455243][T26068] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1341.463654][T26068] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1341.471672][T26068] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1341.479631][T26068] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1341.487699][T26068] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1341.495766][T26068] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000030 11:04:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4500, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x7a, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xa00) 11:04:00 executing program 3 (fault-call:10 fault-nth:49): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4800, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xb00) 11:04:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x300, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r2 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) write(r2, &(0x7f0000002000)='/', 0x1) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="5800000030004ff600000000000000000000000044000100400001000800010062706600300002801800020000000000000000000000000000000000000000000400040008000500", @ANYRES32, @ANYBLOB="0600030000000000040006007013406bf1327c789d37978ce3bd6d158dbd6dbdf64e00da6f3fea439746bb7793bec9f2a2f4d3b14695a3e2f65f4201ac9d68f2b7da4a89769263329bb32f441ddbcb874d9024a25d66ccad5834b665914203047ac00000"], 0x58}}, 0x0) sendfile(r2, r3, &(0x7f00000001c0), 0x1000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000000000)={0x2, @broadcast, 0x4e21, 0x3, 'sed\x00', 0x10, 0x0, 0x22}, 0x2c) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1342.135987][T26102] FAULT_INJECTION: forcing a failure. [ 1342.135987][T26102] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.149053][T26102] CPU: 1 PID: 26102 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1342.157729][T26102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.167789][T26102] Call Trace: [ 1342.171105][T26102] dump_stack+0x11d/0x181 [ 1342.175500][T26102] should_fail.cold+0xa/0x1a [ 1342.180172][T26102] __should_failslab+0xee/0x130 [ 1342.185059][T26102] should_failslab+0x9/0x14 [ 1342.189590][T26102] kmem_cache_alloc+0x29/0x5d0 [ 1342.194380][T26102] ? fib6_node_lookup+0xed/0x120 [ 1342.199330][T26102] dst_alloc+0xad/0x149 [ 1342.203508][T26102] ip6_dst_alloc+0x3d/0x80 [ 1342.207989][T26102] ip6_rt_cache_alloc+0x12b/0x480 [ 1342.213084][T26102] ip6_pol_route+0x5d2/0x730 [ 1342.217712][T26102] ip6_pol_route_output+0x48/0x60 [ 1342.222846][T26102] fib6_rule_lookup+0x3d6/0x470 [ 1342.227707][T26102] ? ip6_pol_route_input+0x70/0x70 [ 1342.232869][T26102] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1342.238605][T26102] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1342.243897][T26102] ip6_route_output_flags_noref+0x16b/0x230 [ 1342.249783][T26102] ip6_route_output_flags+0x50/0x1a0 [ 1342.255202][T26102] ip6_dst_lookup_tail+0x25d/0xc50 [ 1342.260317][T26102] ? debug_smp_processor_id+0x43/0x137 [ 1342.265811][T26102] ? dst_destroy+0x210/0x210 [ 1342.270525][T26102] ? debug_smp_processor_id+0x43/0x137 [ 1342.276065][T26102] ? dst_destroy+0x210/0x210 [ 1342.280667][T26102] ? __call_rcu+0x153/0x390 [ 1342.285262][T26102] ip6_dst_lookup_flow+0x5c/0x110 [ 1342.290296][T26102] rawv6_sendmsg+0x9be/0x2340 [ 1342.295083][T26102] ? __const_udelay+0x36/0x40 [ 1342.299769][T26102] ? __udelay+0x10/0x20 [ 1342.303934][T26102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1342.310321][T26102] ? aa_label_sk_perm+0x89/0xe0 [ 1342.315182][T26102] ? aa_sk_perm+0x1d3/0x590 [ 1342.319695][T26102] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1342.326048][T26102] inet_sendmsg+0x6d/0x90 [ 1342.330391][T26102] ? inet_sendmsg+0x6d/0x90 [ 1342.334914][T26102] ? inet_send_prepare+0x200/0x200 [ 1342.340046][T26102] sock_sendmsg+0x9f/0xc0 [ 1342.344385][T26102] ____sys_sendmsg+0x212/0x4d0 [ 1342.349213][T26102] ___sys_sendmsg+0xb5/0x100 [ 1342.353846][T26102] ? __fget+0xb8/0x1d0 [ 1342.357950][T26102] ? __fget_light+0xaf/0x190 [ 1342.362548][T26102] ? __fdget+0x2c/0x40 [ 1342.366616][T26102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1342.372888][T26102] __sys_sendmmsg+0x123/0x350 [ 1342.377633][T26102] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1342.383881][T26102] ? fput_many+0xec/0x130 [ 1342.388220][T26102] ? fput+0x29/0x30 [ 1342.392028][T26102] ? ksys_write+0x145/0x1b0 [ 1342.396569][T26102] __x64_sys_sendmmsg+0x64/0x80 [ 1342.401592][T26102] do_syscall_64+0xcc/0x3a0 [ 1342.406103][T26102] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1342.411993][T26102] RIP: 0033:0x45aff9 [ 1342.415960][T26102] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.436428][T26102] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1342.444897][T26102] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1342.452954][T26102] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1342.461035][T26102] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1342.469013][T26102] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1342.476995][T26102] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000031 11:04:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x80fe, 0x0, @remote, 0x2}, 0x1c) 11:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc00) 11:04:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x500, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:01 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022bbd7000ffdbdf25190000000500a300010000000c009900df0d00000100000006006d000900000005001e000000000008000100000000000500a20001000000"], 0x48}, 0x1, 0x0, 0x0, 0x20040001}, 0x4000080) 11:04:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc02) 11:04:01 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x600, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:01 executing program 3 (fault-call:10 fault-nth:50): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4d00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe00) 11:04:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1343.167781][T26145] FAULT_INJECTION: forcing a failure. [ 1343.167781][T26145] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.180563][T26145] CPU: 0 PID: 26145 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1343.189254][T26145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.199402][T26145] Call Trace: [ 1343.202705][T26145] dump_stack+0x11d/0x181 [ 1343.207107][T26145] should_fail.cold+0xa/0x1a [ 1343.211762][T26145] __should_failslab+0xee/0x130 [ 1343.216739][T26145] should_failslab+0x9/0x14 [ 1343.221376][T26145] kmem_cache_alloc+0x29/0x5d0 [ 1343.226221][T26145] ? fib6_node_lookup+0xed/0x120 [ 1343.231171][T26145] dst_alloc+0xad/0x149 [ 1343.235502][T26145] ip6_dst_alloc+0x3d/0x80 [ 1343.240022][T26145] ip6_rt_cache_alloc+0x12b/0x480 [ 1343.245077][T26145] ip6_pol_route+0x5d2/0x730 [ 1343.249824][T26145] ip6_pol_route_output+0x48/0x60 [ 1343.254984][T26145] fib6_rule_lookup+0x3d6/0x470 [ 1343.261072][T26145] ? ip6_pol_route_input+0x70/0x70 [ 1343.266211][T26145] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1343.272063][T26145] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1343.277346][T26145] ip6_route_output_flags_noref+0x16b/0x230 [ 1343.283269][T26145] ip6_route_output_flags+0x50/0x1a0 [ 1343.288740][T26145] ip6_dst_lookup_tail+0x25d/0xc50 [ 1343.293871][T26145] ? debug_smp_processor_id+0x43/0x137 [ 1343.299334][T26145] ? dst_destroy+0x210/0x210 [ 1343.304025][T26145] ? debug_smp_processor_id+0x43/0x137 [ 1343.309594][T26145] ? dst_destroy+0x210/0x210 [ 1343.314250][T26145] ? __call_rcu+0x153/0x390 [ 1343.318871][T26145] ip6_dst_lookup_flow+0x5c/0x110 [ 1343.323908][T26145] rawv6_sendmsg+0x9be/0x2340 [ 1343.328668][T26145] ? process_measurement+0x149/0x1190 [ 1343.334064][T26145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1343.340326][T26145] ? aa_label_sk_perm+0x89/0xe0 [ 1343.345226][T26145] ? aa_sk_perm+0x1d3/0x590 [ 1343.349744][T26145] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1343.357164][T26145] inet_sendmsg+0x6d/0x90 [ 1343.361576][T26145] ? inet_sendmsg+0x6d/0x90 [ 1343.366100][T26145] ? inet_send_prepare+0x200/0x200 [ 1343.371226][T26145] sock_sendmsg+0x9f/0xc0 [ 1343.375580][T26145] ____sys_sendmsg+0x212/0x4d0 [ 1343.381406][T26145] ___sys_sendmsg+0xb5/0x100 [ 1343.386237][T26145] ? __fget+0xb8/0x1d0 [ 1343.390320][T26145] ? __fget_light+0xaf/0x190 [ 1343.394947][T26145] ? __fdget+0x2c/0x40 [ 1343.399096][T26145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1343.405388][T26145] __sys_sendmmsg+0x123/0x350 [ 1343.410132][T26145] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1343.416959][T26145] ? fput_many+0xec/0x130 [ 1343.421301][T26145] ? fput+0x29/0x30 [ 1343.425139][T26145] ? ksys_write+0x145/0x1b0 [ 1343.429759][T26145] __x64_sys_sendmmsg+0x64/0x80 [ 1343.434646][T26145] do_syscall_64+0xcc/0x3a0 [ 1343.439209][T26145] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1343.445100][T26145] RIP: 0033:0x45aff9 [ 1343.449063][T26145] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe01) 11:04:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xe02e, 0x0, @remote, 0x2}, 0x1c) 11:04:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x700, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:02 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0x0, 0x8, {{0xb97, 0x0, 0x2, r2}}}, 0x28) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1343.468787][T26145] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1343.477341][T26145] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1343.485320][T26145] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1343.493739][T26145] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1343.501720][T26145] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1343.509720][T26145] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000032 11:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xf00) 11:04:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0xb00, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1100) 11:04:03 executing program 3 (fault-call:10 fault-nth:51): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1200) 11:04:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5865, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x3f00, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1300) [ 1344.236396][T26191] FAULT_INJECTION: forcing a failure. [ 1344.236396][T26191] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.249355][T26191] CPU: 1 PID: 26191 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1344.258084][T26191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.268315][T26191] Call Trace: [ 1344.271734][T26191] dump_stack+0x11d/0x181 [ 1344.276217][T26191] should_fail.cold+0xa/0x1a [ 1344.280927][T26191] __should_failslab+0xee/0x130 [ 1344.285836][T26191] should_failslab+0x9/0x14 [ 1344.290447][T26191] kmem_cache_alloc+0x29/0x5d0 [ 1344.295237][T26191] ? fib6_node_lookup+0xed/0x120 [ 1344.300208][T26191] dst_alloc+0xad/0x149 [ 1344.304406][T26191] ip6_dst_alloc+0x3d/0x80 [ 1344.308854][T26191] ip6_rt_cache_alloc+0x12b/0x480 [ 1344.313914][T26191] ip6_pol_route+0x5d2/0x730 [ 1344.318619][T26191] ip6_pol_route_output+0x48/0x60 [ 1344.323670][T26191] fib6_rule_lookup+0x3d6/0x470 [ 1344.328603][T26191] ? ip6_pol_route_input+0x70/0x70 [ 1344.333824][T26191] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1344.339908][T26191] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1344.345210][T26191] ip6_route_output_flags_noref+0x16b/0x230 [ 1344.351290][T26191] ip6_route_output_flags+0x50/0x1a0 [ 1344.356589][T26191] ip6_dst_lookup_tail+0x25d/0xc50 [ 1344.361969][T26191] ? debug_smp_processor_id+0x43/0x137 [ 1344.367690][T26191] ? dst_destroy+0x210/0x210 [ 1344.373946][T26191] ? debug_smp_processor_id+0x43/0x137 [ 1344.379417][T26191] ? dst_destroy+0x210/0x210 [ 1344.384268][T26191] ? __call_rcu+0x153/0x390 [ 1344.388930][T26191] ip6_dst_lookup_flow+0x5c/0x110 [ 1344.394229][T26191] rawv6_sendmsg+0x9be/0x2340 [ 1344.399028][T26191] ? __const_udelay+0x36/0x40 [ 1344.403799][T26191] ? __udelay+0x10/0x20 [ 1344.408571][T26191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1344.415779][T26191] ? aa_label_sk_perm+0x89/0xe0 [ 1344.421777][T26191] ? aa_sk_perm+0x1d3/0x590 [ 1344.426338][T26191] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 11:04:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xfe80, 0x0, @remote, 0x2}, 0x1c) 11:04:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1344.433881][T26191] inet_sendmsg+0x6d/0x90 [ 1344.438237][T26191] ? inet_sendmsg+0x6d/0x90 [ 1344.442804][T26191] ? inet_send_prepare+0x200/0x200 [ 1344.448454][T26191] sock_sendmsg+0x9f/0xc0 [ 1344.452893][T26191] ____sys_sendmsg+0x212/0x4d0 [ 1344.457827][T26191] ___sys_sendmsg+0xb5/0x100 [ 1344.462475][T26191] ? __fget+0xb8/0x1d0 [ 1344.466599][T26191] ? __fget_light+0xaf/0x190 [ 1344.471224][T26191] ? __fdget+0x2c/0x40 [ 1344.475542][T26191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1344.481854][T26191] __sys_sendmmsg+0x123/0x350 [ 1344.486690][T26191] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1344.492947][T26191] ? fput_many+0xec/0x130 [ 1344.497303][T26191] ? fput+0x29/0x30 [ 1344.501168][T26191] ? ksys_write+0x145/0x1b0 [ 1344.505744][T26191] __x64_sys_sendmmsg+0x64/0x80 [ 1344.510605][T26191] do_syscall_64+0xcc/0x3a0 [ 1344.515221][T26191] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1344.521509][T26191] RIP: 0033:0x45aff9 [ 1344.525754][T26191] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1344.546144][T26191] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1344.555609][T26191] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1344.564141][T26191] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1344.572225][T26191] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1344.580295][T26191] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1344.588351][T26191] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000033 11:04:03 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) prctl$PR_SET_TSC(0x1a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1400) 11:04:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4800, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:04 executing program 3 (fault-call:10 fault-nth:52): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6100, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x2000) 11:04:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4c00, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x2403) [ 1345.262462][T26229] FAULT_INJECTION: forcing a failure. [ 1345.262462][T26229] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.276089][T26229] CPU: 1 PID: 26229 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1345.285882][T26229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.295945][T26229] Call Trace: [ 1345.299273][T26229] dump_stack+0x11d/0x181 [ 1345.303704][T26229] should_fail.cold+0xa/0x1a [ 1345.308306][T26229] __should_failslab+0xee/0x130 [ 1345.313323][T26229] should_failslab+0x9/0x14 [ 1345.317890][T26229] kmem_cache_alloc+0x29/0x5d0 [ 1345.322698][T26229] ? fib6_node_lookup+0xed/0x120 [ 1345.327685][T26229] dst_alloc+0xad/0x149 [ 1345.331926][T26229] ip6_dst_alloc+0x3d/0x80 [ 1345.336603][T26229] ip6_rt_cache_alloc+0x12b/0x480 [ 1345.341745][T26229] ip6_pol_route+0x5d2/0x730 [ 1345.346494][T26229] ? __const_udelay+0x36/0x40 [ 1345.351192][T26229] ip6_pol_route_output+0x48/0x60 [ 1345.356261][T26229] fib6_rule_lookup+0x3d6/0x470 [ 1345.361224][T26229] ? ip6_pol_route_input+0x70/0x70 [ 1345.366354][T26229] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1345.372096][T26229] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1345.377322][T26229] ip6_route_output_flags_noref+0x16b/0x230 [ 1345.383288][T26229] ip6_route_output_flags+0x50/0x1a0 [ 1345.388598][T26229] ip6_dst_lookup_tail+0x25d/0xc50 [ 1345.393729][T26229] ? debug_smp_processor_id+0x43/0x137 [ 1345.399233][T26229] ? dst_destroy+0x210/0x210 [ 1345.403841][T26229] ? debug_smp_processor_id+0x43/0x137 [ 1345.409304][T26229] ? dst_destroy+0x210/0x210 [ 1345.414137][T26229] ? __call_rcu+0x153/0x390 [ 1345.418684][T26229] ip6_dst_lookup_flow+0x5c/0x110 [ 1345.423877][T26229] rawv6_sendmsg+0x9be/0x2340 [ 1345.428566][T26229] ? process_measurement+0x149/0x1190 [ 1345.434062][T26229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1345.440312][T26229] ? aa_label_sk_perm+0x89/0xe0 [ 1345.445180][T26229] ? aa_sk_perm+0x1d3/0x590 [ 1345.450410][T26229] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1345.457022][T26229] inet_sendmsg+0x6d/0x90 [ 1345.461377][T26229] ? inet_sendmsg+0x6d/0x90 [ 1345.465898][T26229] ? inet_send_prepare+0x200/0x200 [ 1345.471195][T26229] sock_sendmsg+0x9f/0xc0 [ 1345.475518][T26229] ____sys_sendmsg+0x212/0x4d0 [ 1345.480368][T26229] ___sys_sendmsg+0xb5/0x100 [ 1345.484996][T26229] ? __fget+0xb8/0x1d0 [ 1345.489071][T26229] ? __fget_light+0xaf/0x190 [ 1345.493725][T26229] ? __fdget+0x2c/0x40 [ 1345.497869][T26229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1345.504229][T26229] __sys_sendmmsg+0x123/0x350 [ 1345.508952][T26229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1345.515199][T26229] ? fput_many+0xec/0x130 [ 1345.519534][T26229] ? fput+0x29/0x30 [ 1345.523335][T26229] ? ksys_write+0x145/0x1b0 [ 1345.527844][T26229] __x64_sys_sendmmsg+0x64/0x80 [ 1345.532714][T26229] do_syscall_64+0xcc/0x3a0 [ 1345.537211][T26229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1345.543089][T26229] RIP: 0033:0x45aff9 11:04:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0xff0f, 0x0, @remote, 0x2}, 0x1c) 11:04:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:04 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) prctl$PR_SVE_GET_VL(0x33, 0x3363) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000000)={0x8, 0x723189e1637a0e12, 0x4, 0x400, 0x8, {0x77359400}, {0x6, 0xc, 0x1, 0x1, 0x1f, 0x1, "ed78dc92"}, 0x0, 0x4, @userptr, 0x4, 0x0, r0}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1345.547115][T26229] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1345.566746][T26229] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1345.575152][T26229] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1345.583138][T26229] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1345.591162][T26229] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1345.599229][T26229] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1345.607205][T26229] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000034 11:04:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x6800, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x3000) 11:04:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6558, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:05 executing program 3 (fault-call:10 fault-nth:53): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x6c00, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x4000) [ 1346.240562][T26265] FAULT_INJECTION: forcing a failure. [ 1346.240562][T26265] name failslab, interval 1, probability 0, space 0, times 0 [ 1346.253384][T26265] CPU: 1 PID: 26265 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1346.262165][T26265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1346.272569][T26265] Call Trace: [ 1346.275949][T26265] dump_stack+0x11d/0x181 [ 1346.280359][T26265] should_fail.cold+0xa/0x1a [ 1346.285050][T26265] __should_failslab+0xee/0x130 11:04:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x5865) [ 1346.289941][T26265] should_failslab+0x9/0x14 [ 1346.294477][T26265] kmem_cache_alloc+0x29/0x5d0 [ 1346.299296][T26265] ? fib6_node_lookup+0xed/0x120 [ 1346.304314][T26265] dst_alloc+0xad/0x149 [ 1346.308657][T26265] ip6_dst_alloc+0x3d/0x80 [ 1346.313087][T26265] ip6_rt_cache_alloc+0x12b/0x480 [ 1346.318205][T26265] ip6_pol_route+0x5d2/0x730 [ 1346.322934][T26265] ip6_pol_route_output+0x48/0x60 [ 1346.327976][T26265] fib6_rule_lookup+0x3d6/0x470 [ 1346.332942][T26265] ? ip6_pol_route_input+0x70/0x70 [ 1346.338074][T26265] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1346.343807][T26265] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1346.349070][T26265] ip6_route_output_flags_noref+0x16b/0x230 [ 1346.354979][T26265] ip6_route_output_flags+0x50/0x1a0 [ 1346.360285][T26265] ip6_dst_lookup_tail+0x25d/0xc50 [ 1346.365414][T26265] ? debug_smp_processor_id+0x43/0x137 [ 1346.370861][T26265] ? dst_destroy+0x210/0x210 [ 1346.375481][T26265] ? debug_smp_processor_id+0x43/0x137 [ 1346.381007][T26265] ? dst_destroy+0x210/0x210 [ 1346.386039][T26265] ? __call_rcu+0x153/0x390 [ 1346.390581][T26265] ip6_dst_lookup_flow+0x5c/0x110 [ 1346.395685][T26265] rawv6_sendmsg+0x9be/0x2340 [ 1346.400373][T26265] ? __const_udelay+0x36/0x40 [ 1346.405070][T26265] ? __udelay+0x10/0x20 [ 1346.409228][T26265] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1346.415563][T26265] ? aa_label_sk_perm+0x89/0xe0 [ 1346.420421][T26265] ? aa_sk_perm+0x1d3/0x590 [ 1346.424974][T26265] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1346.431318][T26265] inet_sendmsg+0x6d/0x90 [ 1346.435651][T26265] ? inet_sendmsg+0x6d/0x90 [ 1346.440218][T26265] ? inet_send_prepare+0x200/0x200 [ 1346.445429][T26265] sock_sendmsg+0x9f/0xc0 [ 1346.449845][T26265] ____sys_sendmsg+0x212/0x4d0 [ 1346.454672][T26265] ___sys_sendmsg+0xb5/0x100 [ 1346.459371][T26265] ? __fget+0xb8/0x1d0 [ 1346.463444][T26265] ? __fget_light+0xaf/0x190 [ 1346.468040][T26265] ? __fdget+0x2c/0x40 [ 1346.472123][T26265] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1346.478425][T26265] __sys_sendmmsg+0x123/0x350 [ 1346.483203][T26265] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1346.489473][T26265] ? fput_many+0xec/0x130 [ 1346.493803][T26265] ? fput+0x29/0x30 [ 1346.497668][T26265] ? ksys_write+0x145/0x1b0 [ 1346.502240][T26265] __x64_sys_sendmmsg+0x64/0x80 [ 1346.507155][T26265] do_syscall_64+0xcc/0x3a0 [ 1346.511696][T26265] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1346.517594][T26265] RIP: 0033:0x45aff9 [ 1346.521564][T26265] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 1346.541162][T26265] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1346.549674][T26265] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1346.557648][T26265] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1346.565608][T26265] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1346.573669][T26265] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1346.581712][T26265] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000035 11:04:05 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000000)=0x200000, 0xfe9) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x4010, r1, 0x3726c000) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x7400, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x7400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:05 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2002}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x8c, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8917}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xd}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1f}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x80000000}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8914}]}, 0x8c}, 0x1, 0x0, 0x0, 0x26008831}, 0xc001) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x6000) 11:04:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x7a00, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:06 executing program 3 (fault-call:10 fault-nth:54): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x7c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x6558) [ 1347.271835][T26305] FAULT_INJECTION: forcing a failure. [ 1347.271835][T26305] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.285670][T26305] CPU: 0 PID: 26305 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1347.294341][T26305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.304398][T26305] Call Trace: [ 1347.307707][T26305] dump_stack+0x11d/0x181 [ 1347.312112][T26305] should_fail.cold+0xa/0x1a [ 1347.316762][T26305] __should_failslab+0xee/0x130 [ 1347.321632][T26305] should_failslab+0x9/0x14 [ 1347.326286][T26305] kmem_cache_alloc+0x29/0x5d0 [ 1347.331067][T26305] ? fib6_node_lookup+0xed/0x120 [ 1347.336065][T26305] dst_alloc+0xad/0x149 [ 1347.340281][T26305] ip6_dst_alloc+0x3d/0x80 [ 1347.344724][T26305] ip6_rt_cache_alloc+0x12b/0x480 [ 1347.349761][T26305] ip6_pol_route+0x5d2/0x730 [ 1347.354388][T26305] ip6_pol_route_output+0x48/0x60 [ 1347.359545][T26305] fib6_rule_lookup+0x3d6/0x470 [ 1347.364628][T26305] ? ip6_pol_route_input+0x70/0x70 [ 1347.369768][T26305] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1347.375580][T26305] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1347.381044][T26305] ip6_route_output_flags_noref+0x16b/0x230 [ 1347.387053][T26305] ip6_route_output_flags+0x50/0x1a0 [ 1347.392439][T26305] ip6_dst_lookup_tail+0x25d/0xc50 [ 1347.397567][T26305] ? debug_smp_processor_id+0x43/0x137 [ 1347.403040][T26305] ? dst_destroy+0x210/0x210 [ 1347.407643][T26305] ? debug_smp_processor_id+0x43/0x137 [ 1347.413146][T26305] ? dst_destroy+0x210/0x210 [ 1347.417841][T26305] ? __call_rcu+0x153/0x390 [ 1347.422418][T26305] ip6_dst_lookup_flow+0x5c/0x110 [ 1347.427455][T26305] rawv6_sendmsg+0x9be/0x2340 [ 1347.432205][T26305] ? process_measurement+0x149/0x1190 [ 1347.437598][T26305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1347.443926][T26305] ? aa_label_sk_perm+0x89/0xe0 [ 1347.448789][T26305] ? aa_sk_perm+0x1d3/0x590 [ 1347.454257][T26305] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1347.460660][T26305] inet_sendmsg+0x6d/0x90 [ 1347.465002][T26305] ? inet_sendmsg+0x6d/0x90 [ 1347.469545][T26305] ? inet_send_prepare+0x200/0x200 [ 1347.474668][T26305] sock_sendmsg+0x9f/0xc0 [ 1347.479088][T26305] ____sys_sendmsg+0x212/0x4d0 [ 1347.483869][T26305] ___sys_sendmsg+0xb5/0x100 [ 1347.488475][T26305] ? __fget+0xb8/0x1d0 [ 1347.492568][T26305] ? __fget_light+0xaf/0x190 [ 1347.497268][T26305] ? __fdget+0x2c/0x40 [ 1347.501356][T26305] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1347.507664][T26305] __sys_sendmmsg+0x123/0x350 [ 1347.512410][T26305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1347.518650][T26305] ? fput_many+0xec/0x130 [ 1347.522979][T26305] ? fput+0x29/0x30 [ 1347.526864][T26305] ? ksys_write+0x145/0x1b0 [ 1347.531401][T26305] __x64_sys_sendmmsg+0x64/0x80 [ 1347.536267][T26305] do_syscall_64+0xcc/0x3a0 [ 1347.540853][T26305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1347.546759][T26305] RIP: 0033:0x45aff9 [ 1347.550693][T26305] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0xff00, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x8100) 11:04:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x2, @remote, 0x2}, 0x1c) 11:04:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x8701) 11:04:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x1000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1347.570362][T26305] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1347.578867][T26305] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1347.586863][T26305] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1347.594838][T26305] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1347.602817][T26305] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1347.610877][T26305] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000036 11:04:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x8100, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:06 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x50, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x34000) 11:04:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x2000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:07 executing program 3 (fault-call:10 fault-nth:55): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x8400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x200000) 11:04:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x3000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x400300) [ 1348.286316][T26350] FAULT_INJECTION: forcing a failure. [ 1348.286316][T26350] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.299045][T26350] CPU: 0 PID: 26350 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1348.307715][T26350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1348.317773][T26350] Call Trace: [ 1348.321168][T26350] dump_stack+0x11d/0x181 [ 1348.325530][T26350] should_fail.cold+0xa/0x1a [ 1348.330137][T26350] __should_failslab+0xee/0x130 [ 1348.335004][T26350] should_failslab+0x9/0x14 [ 1348.339524][T26350] kmem_cache_alloc+0x29/0x5d0 [ 1348.344314][T26350] ? fib6_node_lookup+0xed/0x120 [ 1348.349266][T26350] dst_alloc+0xad/0x149 [ 1348.353435][T26350] ip6_dst_alloc+0x3d/0x80 [ 1348.357918][T26350] ip6_rt_cache_alloc+0x12b/0x480 [ 1348.362955][T26350] ip6_pol_route+0x5d2/0x730 [ 1348.367562][T26350] ? __const_udelay+0x36/0x40 [ 1348.372248][T26350] ip6_pol_route_output+0x48/0x60 [ 1348.377345][T26350] fib6_rule_lookup+0x3d6/0x470 [ 1348.382211][T26350] ? ip6_pol_route_input+0x70/0x70 [ 1348.387337][T26350] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1348.393118][T26350] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1348.398378][T26350] ip6_route_output_flags_noref+0x16b/0x230 [ 1348.404442][T26350] ip6_route_output_flags+0x50/0x1a0 [ 1348.409854][T26350] ip6_dst_lookup_tail+0x25d/0xc50 [ 1348.415032][T26350] ? debug_smp_processor_id+0x43/0x137 [ 1348.420637][T26350] ? dst_destroy+0x210/0x210 [ 1348.425344][T26350] ? debug_smp_processor_id+0x43/0x137 [ 1348.430895][T26350] ? dst_destroy+0x210/0x210 [ 1348.435495][T26350] ? __call_rcu+0x153/0x390 [ 1348.440014][T26350] ip6_dst_lookup_flow+0x5c/0x110 [ 1348.445048][T26350] rawv6_sendmsg+0x9be/0x2340 [ 1348.449819][T26350] ? process_measurement+0x149/0x1190 [ 1348.455211][T26350] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1348.461470][T26350] ? aa_label_sk_perm+0x89/0xe0 [ 1348.466337][T26350] ? aa_sk_perm+0x1d3/0x590 [ 1348.470878][T26350] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1348.477247][T26350] inet_sendmsg+0x6d/0x90 [ 1348.481589][T26350] ? inet_sendmsg+0x6d/0x90 [ 1348.486112][T26350] ? inet_send_prepare+0x200/0x200 [ 1348.491315][T26350] sock_sendmsg+0x9f/0xc0 [ 1348.495654][T26350] ____sys_sendmsg+0x212/0x4d0 [ 1348.500496][T26350] ___sys_sendmsg+0xb5/0x100 [ 1348.505102][T26350] ? __fget+0xb8/0x1d0 [ 1348.509190][T26350] ? __fget_light+0xaf/0x190 [ 1348.513874][T26350] ? __fdget+0x2c/0x40 [ 1348.517965][T26350] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1348.524228][T26350] __sys_sendmmsg+0x123/0x350 [ 1348.528931][T26350] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1348.535258][T26350] ? fput_many+0xec/0x130 [ 1348.539647][T26350] ? fput+0x29/0x30 [ 1348.543466][T26350] ? ksys_write+0x145/0x1b0 [ 1348.547985][T26350] __x64_sys_sendmmsg+0x64/0x80 [ 1348.552908][T26350] do_syscall_64+0xcc/0x3a0 [ 1348.557431][T26350] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1348.563395][T26350] RIP: 0033:0x45aff9 [ 1348.567306][T26350] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x3, @remote, 0x2}, 0x1c) 11:04:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x8700, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:07 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#/%nod\x00\x00\x00', 0x1) write(r0, &(0x7f0000002000)='/', 0x1) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x6000) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0xc2000) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="5800000030004ff600000000000000000013fc8df94a00000044000100400001000800010062706600300002801800020000000000000000000000000000000000000000000400040008000500", @ANYRES32=r0, @ANYBLOB="060003000000000004000600b70652a92435bda437652ae32fcf3b64506467ac3f6c2b6cb8fea9893149ec0e1b34d8046b91ff2bfaf0166be920086dd52d642163dfa875bf3dba6c49670c7fb241"], 0x3}}, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/69, 0x45, 0x3) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x80813, r0, 0x0) 11:04:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1000000) [ 1348.586989][T26350] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1348.595417][T26350] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1348.603397][T26350] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1348.611370][T26350] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1348.619357][T26350] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1348.627328][T26350] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000037 11:04:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x9400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:07 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f00000000c0)="1f22b61d4bcccf85969fcf5ec9bd1c", 0xfffffffffffffd92) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x200000000000007, 0xa8400) unshare(0x42050100) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) sendfile(r1, r0, &(0x7f00000001c0), 0xfec) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000140)) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000200)=""/221, &(0x7f0000000000)=0xdd) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:08 executing program 3 (fault-call:10 fault-nth:56): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x2000000) 11:04:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x5000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x9c00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:08 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = inotify_init() ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={{0x1, 0x0, @reserved="71c7789b4bea110ebbe3a2f1bdf6c9750afc649c5f0b52a1784a9fec773c81ef"}}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1349.199354][T26393] FAULT_INJECTION: forcing a failure. [ 1349.199354][T26393] name failslab, interval 1, probability 0, space 0, times 0 [ 1349.212719][T26393] CPU: 1 PID: 26393 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1349.221420][T26393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1349.231478][T26393] Call Trace: [ 1349.234874][T26393] dump_stack+0x11d/0x181 [ 1349.239211][T26393] should_fail.cold+0xa/0x1a [ 1349.244872][T26393] __should_failslab+0xee/0x130 [ 1349.249858][T26393] should_failslab+0x9/0x14 [ 1349.254397][T26393] kmem_cache_alloc+0x29/0x5d0 [ 1349.259224][T26393] ? fib6_node_lookup+0xed/0x120 [ 1349.264191][T26393] dst_alloc+0xad/0x149 [ 1349.268436][T26393] ip6_dst_alloc+0x3d/0x80 [ 1349.272874][T26393] ip6_rt_cache_alloc+0x12b/0x480 [ 1349.277926][T26393] ip6_pol_route+0x5d2/0x730 [ 1349.282534][T26393] ip6_pol_route_output+0x48/0x60 [ 1349.287776][T26393] fib6_rule_lookup+0x3d6/0x470 [ 1349.292635][T26393] ? ip6_pol_route_input+0x70/0x70 [ 1349.297916][T26393] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1349.303699][T26393] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1349.308920][T26393] ip6_route_output_flags_noref+0x16b/0x230 [ 1349.314827][T26393] ip6_route_output_flags+0x50/0x1a0 [ 1349.320162][T26393] ip6_dst_lookup_tail+0x25d/0xc50 [ 1349.325340][T26393] ? debug_smp_processor_id+0x43/0x137 [ 1349.330817][T26393] ? dst_destroy+0x210/0x210 [ 1349.335418][T26393] ? debug_smp_processor_id+0x43/0x137 [ 1349.340987][T26393] ? dst_destroy+0x210/0x210 [ 1349.345590][T26393] ? __call_rcu+0x153/0x390 [ 1349.350123][T26393] ip6_dst_lookup_flow+0x5c/0x110 [ 1349.355143][T26393] rawv6_sendmsg+0x9be/0x2340 [ 1349.359812][T26393] ? process_measurement+0x149/0x1190 [ 1349.365173][T26393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1349.371404][T26393] ? aa_label_sk_perm+0x89/0xe0 [ 1349.376427][T26393] ? aa_sk_perm+0x1d3/0x590 [ 1349.381534][T26393] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1349.387875][T26393] inet_sendmsg+0x6d/0x90 [ 1349.392204][T26393] ? inet_sendmsg+0x6d/0x90 [ 1349.396839][T26393] ? inet_send_prepare+0x200/0x200 [ 1349.401954][T26393] sock_sendmsg+0x9f/0xc0 [ 1349.406271][T26393] ____sys_sendmsg+0x212/0x4d0 [ 1349.411144][T26393] ___sys_sendmsg+0xb5/0x100 [ 1349.415743][T26393] ? __fget+0xb8/0x1d0 [ 1349.419801][T26393] ? __fget_light+0xaf/0x190 [ 1349.424385][T26393] ? __fdget+0x2c/0x40 [ 1349.428513][T26393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1349.434788][T26393] __sys_sendmmsg+0x123/0x350 [ 1349.439473][T26393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1349.445808][T26393] ? fput_many+0xec/0x130 [ 1349.450142][T26393] ? fput+0x29/0x30 [ 1349.454189][T26393] ? ksys_write+0x145/0x1b0 [ 1349.458810][T26393] __x64_sys_sendmmsg+0x64/0x80 [ 1349.463669][T26393] do_syscall_64+0xcc/0x3a0 [ 1349.468256][T26393] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1349.474208][T26393] RIP: 0033:0x45aff9 [ 1349.478157][T26393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x4, @remote, 0x2}, 0x1c) 11:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x3000000) 11:04:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa303, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x6000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1349.499035][T26393] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1349.507633][T26393] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1349.515713][T26393] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1349.523679][T26393] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1349.531678][T26393] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1349.539741][T26393] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000038 11:04:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x4000000) 11:04:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x7000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:09 executing program 3 (fault-call:10 fault-nth:57): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x5000000) 11:04:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xac00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x8000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1350.240703][T26433] FAULT_INJECTION: forcing a failure. [ 1350.240703][T26433] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.253481][T26433] CPU: 1 PID: 26433 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1350.262153][T26433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1350.272217][T26433] Call Trace: [ 1350.275514][T26433] dump_stack+0x11d/0x181 [ 1350.279865][T26433] should_fail.cold+0xa/0x1a [ 1350.284478][T26433] __should_failslab+0xee/0x130 [ 1350.289345][T26433] should_failslab+0x9/0x14 [ 1350.294079][T26433] kmem_cache_alloc+0x29/0x5d0 [ 1350.298973][T26433] ? fib6_node_lookup+0xed/0x120 [ 1350.303969][T26433] dst_alloc+0xad/0x149 [ 1350.308142][T26433] ip6_dst_alloc+0x3d/0x80 [ 1350.312572][T26433] ip6_rt_cache_alloc+0x12b/0x480 [ 1350.317674][T26433] ip6_pol_route+0x5d2/0x730 [ 1350.322342][T26433] ip6_pol_route_output+0x48/0x60 [ 1350.327426][T26433] fib6_rule_lookup+0x3d6/0x470 [ 1350.332330][T26433] ? ip6_pol_route_input+0x70/0x70 11:04:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x6000000) [ 1350.337567][T26433] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1350.343340][T26433] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1350.348707][T26433] ip6_route_output_flags_noref+0x16b/0x230 [ 1350.354650][T26433] ip6_route_output_flags+0x50/0x1a0 [ 1350.359952][T26433] ip6_dst_lookup_tail+0x25d/0xc50 [ 1350.365079][T26433] ? debug_smp_processor_id+0x43/0x137 [ 1350.370604][T26433] ? dst_destroy+0x210/0x210 [ 1350.375205][T26433] ? debug_smp_processor_id+0x43/0x137 [ 1350.380695][T26433] ? dst_destroy+0x210/0x210 [ 1350.385316][T26433] ? __call_rcu+0x153/0x390 [ 1350.389821][T26433] ip6_dst_lookup_flow+0x5c/0x110 [ 1350.394850][T26433] rawv6_sendmsg+0x9be/0x2340 [ 1350.399536][T26433] ? debug_smp_processor_id+0x43/0x137 [ 1350.405051][T26433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1350.411303][T26433] ? aa_label_sk_perm+0x89/0xe0 [ 1350.416218][T26433] ? aa_sk_perm+0x1d3/0x590 [ 1350.420798][T26433] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1350.427208][T26433] inet_sendmsg+0x6d/0x90 [ 1350.431655][T26433] ? inet_sendmsg+0x6d/0x90 [ 1350.436249][T26433] ? inet_send_prepare+0x200/0x200 [ 1350.441367][T26433] sock_sendmsg+0x9f/0xc0 [ 1350.445756][T26433] ____sys_sendmsg+0x212/0x4d0 [ 1350.450550][T26433] ___sys_sendmsg+0xb5/0x100 [ 1350.455198][T26433] ? __fget+0xb8/0x1d0 [ 1350.459258][T26433] ? __fget_light+0xaf/0x190 [ 1350.463960][T26433] ? __fdget+0x2c/0x40 [ 1350.468027][T26433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1350.474319][T26433] __sys_sendmmsg+0x123/0x350 [ 1350.479168][T26433] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1350.485400][T26433] ? fput_many+0xec/0x130 11:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x5, @remote, 0x2}, 0x1c) 11:04:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0xb000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xb100, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:09 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x500) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000340)=0x6, 0x4) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xd79167aba5d8a3e9, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000200)=0xff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = open(&(0x7f0000000240)='./file0\x00', 0x200, 0x100) r5 = syz_open_dev$rtc(&(0x7f00000002c0)='/dev/rtc#\x00', 0x6fc, 0x101400) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002040)={0x3d8, 0x22, 0x400, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x4, 0x1}, @nested={0x36f, 0x1d, 0x0, 0x1, [@typed={0xc9, 0x10, 0x0, 0x0, @binary="1fc4a56d1604bcb6beaa5c5ff3caf0f4bd264623e6da9cb735c84bc1c7d9250d7de9d36e799ef15d8e6acae4786bc9e1ec56a6d8bcd114134d5bd9553ca7cd2f26ecfdd5bb7ea71783d5fdb9964091664aabb931345df58b08ddda86c50ef7285f2ff37d3990f2b69e89ea4bf1df95b486a8f1def8ebd7c02521817debc5d4f4e4e758b9b4afb791e5e5458326b30ca2ba9d77df718b237036f61a5b673f3633f5b72ed543e2e68910270b147bcdadd916659706b898aff9b575e84abaf7f5ffe49556ae97"}, @typed={0x8, 0x33, 0x0, 0x0, @uid}, @typed={0x8, 0x67, 0x0, 0x0, @u32=0xc43}, @typed={0x8, 0x7e, 0x0, 0x0, @ipv4=@empty}, @generic="b65c4a690fc287255f47be43cc0f27b9fed0b4004a72000a6855c630bddf831834aa34672f62948c1be72494ac3caca3c6c7ef1e9c6d0acb83c971cb793dd0ec61fbc1ffebb73b6ead43cdd4031f80a091c78bb220071006579439ed780edf55ba65f308ebe9c95600227d6a1dc8ae2ce5f53b4a48895312fbae178765396300442492c9b532fbb17cc5b403f7f592521a05a4dc7ff573e56706ddc7c50197e62865af", @generic="320a193d7ff06c30e264d398d4baf101feae1b0f616f03a18c4f5afc4116e68d717bdeea1069169388677afec11dd858aff9318bb8c20361b8c2e6a55251380f704b8aa491634db8c091f9e2a6a7efe2a03a30bc821f244039a28d05b0da230495ea7441216aa103f9e2ab9337d02e1eb9af858e3b3c7c5c01dd5788bb00f12907b4901046a528a8b6433d552cb152f4368871023fde495bf33e88ac0d72455079ad862141513c0560402257161c662aed6e636471a217e5060ab0b8d39f", @generic="ea1cbc2b3fa611bed80a304e3dc2e2dfc93b95792c024a403257f0227701da505487577da4fccab8bbc64ef6eceabad9f284cf7d68ac146de0fbc0118222a9fbd029b26d3dad120eecfc9af26258510028d574e5f94c141fb39903e955d062971dc3c18957e5abcb49c147d01823459813d7c5fc2846587c377b780695518691dddb20e7437d59078fd7afb287128aa7ae9f6e3cd9cc3ba3de1c9d6689ded8deeaf632a91ff0bddc8b8744f7735baa2559b4bb71", @generic="48305807a4b65a1ad15b94d817fe03e1b43d65c4495fa65bc7559f1ba22d50a6543e118e2867845dfe050dee62d51d84f38963bb6b0170d46423f0a939d1763913b8f0bf93ffe494a8179d6cc026dfed504db622a83db13e9f7d531b0c2ab83f15e2ba76dc14912c3a6976a6c431c68abca9"]}, @nested={0x3a, 0x42, 0x0, 0x1, [@typed={0x8, 0x4f, 0x0, 0x0, @u32=0x916}, @typed={0xc, 0x13, 0x0, 0x0, @u64=0x2}, @generic="b7884de1a42529863551a480882db4fea88673328932af526562", @typed={0x8, 0x24, 0x0, 0x0, @fd=r5}]}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@ipv4={[], [], @empty}}]}, 0x3d8}, 0x1, 0xfdffffff00000000}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f00000000c0)={0x0, 0x55, &(0x7f0000000080)={&(0x7f0000000040)={0xfffffd47, r7, 0x560f36c1cd2edf17, 0x70bd28}, 0x14}}, 0x4000) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r7, 0x300, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_MRU={0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x20) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="20002abd7000fbdbdf2501000000050004003f00000006001c0000130002000000"], 0x34}, 0x1, 0x0, 0x0, 0x4004008}, 0x400) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) [ 1350.489765][T26433] ? fput+0x29/0x30 [ 1350.493591][T26433] ? ksys_write+0x145/0x1b0 [ 1350.498100][T26433] __x64_sys_sendmmsg+0x64/0x80 [ 1350.503119][T26433] do_syscall_64+0xcc/0x3a0 [ 1350.507633][T26433] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1350.513537][T26433] RIP: 0033:0x45aff9 [ 1350.517505][T26433] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1350.537119][T26433] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1350.545696][T26433] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1350.553676][T26433] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1350.561690][T26433] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1350.569671][T26433] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1350.577645][T26433] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000039 11:04:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x3f000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xff2f, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x8000000) 11:04:10 executing program 3 (fault-call:10 fault-nth:58): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x40000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x22000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x9000000) 11:04:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x48000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1351.289855][T26477] FAULT_INJECTION: forcing a failure. [ 1351.289855][T26477] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.302564][T26477] CPU: 0 PID: 26477 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1351.311248][T26477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1351.321480][T26477] Call Trace: [ 1351.324777][T26477] dump_stack+0x11d/0x181 [ 1351.329123][T26477] should_fail.cold+0xa/0x1a [ 1351.333731][T26477] __should_failslab+0xee/0x130 [ 1351.338733][T26477] should_failslab+0x9/0x14 [ 1351.343265][T26477] kmem_cache_alloc+0x29/0x5d0 [ 1351.348049][T26477] ? fib6_node_lookup+0xed/0x120 [ 1351.353266][T26477] dst_alloc+0xad/0x149 [ 1351.357450][T26477] ip6_dst_alloc+0x3d/0x80 [ 1351.361935][T26477] ip6_rt_cache_alloc+0x12b/0x480 [ 1351.366985][T26477] ip6_pol_route+0x5d2/0x730 [ 1351.371618][T26477] ip6_pol_route_output+0x48/0x60 [ 1351.376682][T26477] fib6_rule_lookup+0x3d6/0x470 [ 1351.381547][T26477] ? ip6_pol_route_input+0x70/0x70 [ 1351.386687][T26477] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1351.392428][T26477] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1351.397989][T26477] ip6_route_output_flags_noref+0x16b/0x230 [ 1351.403923][T26477] ip6_route_output_flags+0x50/0x1a0 [ 1351.409255][T26477] ip6_dst_lookup_tail+0x25d/0xc50 [ 1351.414389][T26477] ? debug_smp_processor_id+0x43/0x137 [ 1351.419893][T26477] ? dst_destroy+0x210/0x210 [ 1351.424531][T26477] ? debug_smp_processor_id+0x43/0x137 [ 1351.429999][T26477] ? dst_destroy+0x210/0x210 [ 1351.434607][T26477] ? __call_rcu+0x153/0x390 [ 1351.439184][T26477] ip6_dst_lookup_flow+0x5c/0x110 [ 1351.444252][T26477] rawv6_sendmsg+0x9be/0x2340 [ 1351.449080][T26477] ? __const_udelay+0x36/0x40 [ 1351.453876][T26477] ? __udelay+0x10/0x20 [ 1351.458078][T26477] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1351.464344][T26477] ? aa_label_sk_perm+0x89/0xe0 [ 1351.469476][T26477] ? aa_sk_perm+0x1d3/0x590 [ 1351.474203][T26477] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1351.480559][T26477] inet_sendmsg+0x6d/0x90 [ 1351.484923][T26477] ? inet_sendmsg+0x6d/0x90 [ 1351.489516][T26477] ? inet_send_prepare+0x200/0x200 [ 1351.494632][T26477] sock_sendmsg+0x9f/0xc0 [ 1351.498951][T26477] ____sys_sendmsg+0x212/0x4d0 [ 1351.503758][T26477] ___sys_sendmsg+0xb5/0x100 [ 1351.508341][T26477] ? __fget+0xb8/0x1d0 [ 1351.512534][T26477] ? __fget_light+0xaf/0x190 [ 1351.517153][T26477] ? __fdget+0x2c/0x40 [ 1351.521352][T26477] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1351.527592][T26477] __sys_sendmmsg+0x123/0x350 [ 1351.532411][T26477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1351.538833][T26477] ? fput_many+0xec/0x130 [ 1351.543202][T26477] ? fput+0x29/0x30 [ 1351.547048][T26477] ? ksys_write+0x145/0x1b0 [ 1351.551613][T26477] __x64_sys_sendmmsg+0x64/0x80 [ 1351.556598][T26477] do_syscall_64+0xcc/0x3a0 [ 1351.561171][T26477] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1351.567117][T26477] RIP: 0033:0x45aff9 [ 1351.571048][T26477] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x6, @remote, 0x2}, 0x1c) 11:04:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xa000000) 11:04:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x46000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:10 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x72, "d9cbe2ed53388fadb53db8b02ce68b34834cb72f501a77d8b373d5ef698271ad22ca7027dad6d0bbd2def033906015a8b9c6a53940fd89586019a94504feb7a93b5fd7a8a37fcd1be7b1dbcd55d5c26db6434da8d4be312a49a070a4b66dc6c9e7347f422c071c12c4d80101d1d8e32d457b"}, &(0x7f00000000c0)=0x7a) connect$nfc_raw(0xffffffffffffffff, &(0x7f0000000200)={0x27, 0x0, 0x1, 0x7}, 0x10) r2 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x1, 0x200) r3 = syz_open_dev$vcsu(&(0x7f00000002c0)='/dev/vcsu#\x00', 0x100000000, 0x400100) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000300)=0x1c, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000280)={0x5, 0x0, 0x1005, 0x3, 0x3, {0x6, 0x7f97}, 0x1}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={r1, 0x3}, &(0x7f0000000180)=0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x4c000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1351.590763][T26477] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1351.599387][T26477] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1351.607454][T26477] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1351.615444][T26477] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1351.623428][T26477] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1351.631416][T26477] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000003a 11:04:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xb000000) 11:04:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xada29, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x68000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x102000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:11 executing program 3 (fault-call:10 fault-nth:59): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc000000) 11:04:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x200000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1352.237772][T26515] FAULT_INJECTION: forcing a failure. [ 1352.237772][T26515] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.250517][T26515] CPU: 1 PID: 26515 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1352.259259][T26515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.269404][T26515] Call Trace: [ 1352.272721][T26515] dump_stack+0x11d/0x181 [ 1352.277086][T26515] should_fail.cold+0xa/0x1a [ 1352.281710][T26515] __should_failslab+0xee/0x130 [ 1352.286588][T26515] should_failslab+0x9/0x14 [ 1352.291146][T26515] kmem_cache_alloc+0x29/0x5d0 [ 1352.296140][T26515] ? fib6_node_lookup+0xed/0x120 [ 1352.301074][T26515] dst_alloc+0xad/0x149 [ 1352.305226][T26515] ip6_dst_alloc+0x3d/0x80 [ 1352.309647][T26515] ip6_rt_cache_alloc+0x12b/0x480 [ 1352.314689][T26515] ip6_pol_route+0x5d2/0x730 [ 1352.320009][T26515] ? kcsan_setup_watchpoint+0x1d4/0x460 [ 1352.325576][T26515] ip6_pol_route_output+0x48/0x60 [ 1352.330704][T26515] fib6_rule_lookup+0x3d6/0x470 [ 1352.335549][T26515] ? ip6_pol_route_input+0x70/0x70 [ 1352.340826][T26515] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1352.346650][T26515] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1352.351946][T26515] ip6_route_output_flags_noref+0x16b/0x230 [ 1352.357936][T26515] ip6_route_output_flags+0x50/0x1a0 [ 1352.363219][T26515] ip6_dst_lookup_tail+0x25d/0xc50 [ 1352.368385][T26515] ? debug_smp_processor_id+0x43/0x137 [ 1352.373899][T26515] ? dst_destroy+0x210/0x210 [ 1352.378602][T26515] ? debug_smp_processor_id+0x43/0x137 [ 1352.384947][T26515] ? dst_destroy+0x210/0x210 [ 1352.389571][T26515] ? __call_rcu+0x153/0x390 [ 1352.394075][T26515] ip6_dst_lookup_flow+0x5c/0x110 [ 1352.399120][T26515] rawv6_sendmsg+0x9be/0x2340 [ 1352.403808][T26515] ? process_measurement+0x149/0x1190 [ 1352.409194][T26515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1352.415434][T26515] ? aa_label_sk_perm+0x89/0xe0 [ 1352.420341][T26515] ? aa_sk_perm+0x1d3/0x590 [ 1352.424861][T26515] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1352.431200][T26515] inet_sendmsg+0x6d/0x90 [ 1352.435620][T26515] ? inet_sendmsg+0x6d/0x90 [ 1352.440152][T26515] ? inet_send_prepare+0x200/0x200 [ 1352.445252][T26515] sock_sendmsg+0x9f/0xc0 [ 1352.449683][T26515] ____sys_sendmsg+0x212/0x4d0 [ 1352.454500][T26515] ___sys_sendmsg+0xb5/0x100 [ 1352.459154][T26515] ? __fget+0xb8/0x1d0 [ 1352.463317][T26515] ? __fget_light+0xaf/0x190 [ 1352.467935][T26515] ? __fdget+0x2c/0x40 [ 1352.472240][T26515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1352.478515][T26515] __sys_sendmmsg+0x123/0x350 [ 1352.483250][T26515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1352.489622][T26515] ? fput_many+0xec/0x130 [ 1352.493950][T26515] ? fput+0x29/0x30 [ 1352.497821][T26515] ? ksys_write+0x145/0x1b0 [ 1352.502355][T26515] __x64_sys_sendmmsg+0x64/0x80 [ 1352.507214][T26515] do_syscall_64+0xcc/0x3a0 [ 1352.511720][T26515] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1352.517628][T26515] RIP: 0033:0x45aff9 [ 1352.521550][T26515] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1352.541235][T26515] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1352.549695][T26515] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1352.557738][T26515] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1352.565788][T26515] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1352.573800][T26515] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x7, @remote, 0x2}, 0x1c) 11:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc020000) 11:04:11 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#\'%nodev\x00', 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) socket$rxrpc(0x21, 0x2, 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x40010, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000100)={r4}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/protocols\x00') 11:04:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x6c000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1352.581775][T26515] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000003b 11:04:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe000000) 11:04:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x200200, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x74000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:12 executing program 3 (fault-call:10 fault-nth:60): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:12 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = syz_open_dev$evdev(&(0x7f0000000780)='/dev/input/event#\x00', 0x20, 0x8a2) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000007c0)=0x4c9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="5840000030004ff6000000000000000000000000440001004000010008000100627066003000028018000200f0ffffff080000000000000000000900000000000400040008000500", @ANYRES32, @ANYBLOB="060003000000000004000600"], 0x58}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000003000000000000000000100000000000044000100400001000800010062706600300002801800020000000000000000000000000000000000000000000400040008000500", @ANYRES32, @ANYBLOB="060003000000000004000600"], 0x58}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="5800000030004ff60000000090e271d42dbd898c00000000000000004400010040000100080001006270660030000000180002000000000000000000000000000000000000000000581d0ce92fdbdaf8", @ANYRES32, @ANYBLOB="060003000000000004000600"], 0x58}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtaction={0x68, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x54, 0x1, @m_bpf={0x50, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{0x81, 0x1, 0x5}, {0x6, 0x9, 0x40, 0x10001}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x68}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESHEX=0x0, @ANYPTR64, @ANYRES32=r2]], @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES64, @ANYRES64, @ANYRESHEX=r3, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRES64=0x0, @ANYRESOCT, @ANYRESOCT=r4, @ANYRESOCT=r2, @ANYRESOCT, @ANYRESHEX=0x0, @ANYRES32=r5], @ANYRES16=r0, @ANYRESDEC=r6, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESDEC=0x0, @ANYRESHEX], @ANYBLOB="a130a64ad9c435d9e3151127f57ccfa2bedc2ebdcd0e8e28782fa08f1c5fffff33571828b038a0c8ebd1103349b7e664873305c6212cea168640b97fd4aae1f549a1d0c098ae6098f1e57ebc5da168b43503a60f34ef81214e6b1a9e2e26b7a12dc4df2f21b7ef2ad30d23b96262fbe8a5b905d0b65592c96e272cc88eef098a4a925cd6f45ac2b785e6c91d9ab7624032", @ANYRES16=r7]], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5000, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) r9 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x1, 0x400) write$UHID_CREATE2(r9, &(0x7f0000000580)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0xdc, 0x4, 0x5, 0x1, 0x3f, 0x3c, "00512d47d2e37714a20acbaa53b445bc38380c0812fc245a9bf12bc45f5844bbd2e42c969e02adf3826f58a8542d1dbea85b17fc212809ce468937c86aa6c08d47d86f91648bcf61fc021b6843e4563ee8ef0eebf303408ac130346c570077608653fd9284164b20c051584540eb9a3c93b384b53054f5884d667613062b94fdd49a39d4e36f7100e823a56f836fb4c28d5c661c759dc6c3ba3c3a23ca7beced39f5433f444b4ee787579bb3bde7217591f361c6fc7f565b76ff08e982e82d383dddaefb87984d1ca970678c300f9f47855fb895e81a74b9b2ee2d85"}}, 0x1f4) setsockopt$TIPC_IMPORTANCE(r8, 0x10f, 0x7f, &(0x7f0000000000), 0x4) 11:04:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe010000) 11:04:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x201000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x7a000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1353.297048][T26557] FAULT_INJECTION: forcing a failure. [ 1353.297048][T26557] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.309756][T26557] CPU: 0 PID: 26557 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1353.318432][T26557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.328609][T26557] Call Trace: [ 1353.331920][T26557] dump_stack+0x11d/0x181 [ 1353.336447][T26557] should_fail.cold+0xa/0x1a [ 1353.341100][T26557] __should_failslab+0xee/0x130 [ 1353.346056][T26557] should_failslab+0x9/0x14 [ 1353.350683][T26557] kmem_cache_alloc+0x29/0x5d0 [ 1353.355572][T26557] ? fib6_node_lookup+0xed/0x120 [ 1353.360542][T26557] dst_alloc+0xad/0x149 [ 1353.364726][T26557] ip6_dst_alloc+0x3d/0x80 [ 1353.369171][T26557] ip6_rt_cache_alloc+0x12b/0x480 [ 1353.374202][T26557] ip6_pol_route+0x5d2/0x730 [ 1353.378891][T26557] ip6_pol_route_output+0x48/0x60 [ 1353.384026][T26557] fib6_rule_lookup+0x3d6/0x470 [ 1353.388931][T26557] ? ip6_pol_route_input+0x70/0x70 [ 1353.394096][T26557] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1353.399846][T26557] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1353.405154][T26557] ip6_route_output_flags_noref+0x16b/0x230 [ 1353.411074][T26557] ip6_route_output_flags+0x50/0x1a0 [ 1353.416397][T26557] ip6_dst_lookup_tail+0x25d/0xc50 [ 1353.421515][T26557] ? debug_smp_processor_id+0x43/0x137 [ 1353.426993][T26557] ? dst_destroy+0x210/0x210 [ 1353.431646][T26557] ? debug_smp_processor_id+0x43/0x137 [ 1353.437160][T26557] ? dst_destroy+0x210/0x210 [ 1353.441796][T26557] ? __call_rcu+0x153/0x390 [ 1353.446446][T26557] ip6_dst_lookup_flow+0x5c/0x110 [ 1353.451506][T26557] rawv6_sendmsg+0x9be/0x2340 [ 1353.456178][T26557] ? process_measurement+0x149/0x1190 [ 1353.461552][T26557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1353.467813][T26557] ? aa_label_sk_perm+0x89/0xe0 [ 1353.472681][T26557] ? aa_sk_perm+0x1d3/0x590 [ 1353.477201][T26557] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1353.483655][T26557] inet_sendmsg+0x6d/0x90 [ 1353.488023][T26557] ? inet_sendmsg+0x6d/0x90 [ 1353.492544][T26557] ? inet_send_prepare+0x200/0x200 11:04:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x8, @remote, 0x2}, 0x1c) 11:04:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xf000000) 11:04:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x600000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0xff000000, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1353.497677][T26557] sock_sendmsg+0x9f/0xc0 [ 1353.502037][T26557] ____sys_sendmsg+0x212/0x4d0 [ 1353.506854][T26557] ___sys_sendmsg+0xb5/0x100 [ 1353.511465][T26557] ? __fget+0xb8/0x1d0 [ 1353.515642][T26557] ? __fget_light+0xaf/0x190 [ 1353.520245][T26557] ? __fdget+0x2c/0x40 [ 1353.524356][T26557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1353.530766][T26557] __sys_sendmmsg+0x123/0x350 [ 1353.535467][T26557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1353.541722][T26557] ? fput_many+0xec/0x130 [ 1353.546095][T26557] ? fput+0x29/0x30 [ 1353.549923][T26557] ? ksys_write+0x145/0x1b0 [ 1353.554517][T26557] __x64_sys_sendmmsg+0x64/0x80 [ 1353.559394][T26557] do_syscall_64+0xcc/0x3a0 [ 1353.564035][T26557] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1353.569933][T26557] RIP: 0033:0x45aff9 [ 1353.573851][T26557] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x10000000) [ 1353.594085][T26557] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1353.602684][T26557] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1353.610856][T26557] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1353.618865][T26557] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1353.626923][T26557] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1353.634901][T26557] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000003c 11:04:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x2, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x600400, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:13 executing program 3 (fault-call:10 fault-nth:61): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x11000000) 11:04:13 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x3, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x800000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1354.263871][T26598] FAULT_INJECTION: forcing a failure. [ 1354.263871][T26598] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.276542][T26598] CPU: 0 PID: 26598 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1354.285218][T26598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.295262][T26598] Call Trace: [ 1354.298548][T26598] dump_stack+0x11d/0x181 [ 1354.302917][T26598] should_fail.cold+0xa/0x1a [ 1354.307530][T26598] __should_failslab+0xee/0x130 [ 1354.312417][T26598] should_failslab+0x9/0x14 [ 1354.316916][T26598] kmem_cache_alloc+0x29/0x5d0 [ 1354.321981][T26598] ? fib6_node_lookup+0xed/0x120 [ 1354.327071][T26598] dst_alloc+0xad/0x149 [ 1354.331279][T26598] ip6_dst_alloc+0x3d/0x80 [ 1354.335790][T26598] ip6_rt_cache_alloc+0x12b/0x480 [ 1354.340921][T26598] ip6_pol_route+0x5d2/0x730 [ 1354.345592][T26598] ip6_pol_route_output+0x48/0x60 [ 1354.350779][T26598] fib6_rule_lookup+0x3d6/0x470 [ 1354.355651][T26598] ? ip6_pol_route_input+0x70/0x70 [ 1354.360788][T26598] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1354.366746][T26598] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1354.371948][T26598] ip6_route_output_flags_noref+0x16b/0x230 [ 1354.377967][T26598] ip6_route_output_flags+0x50/0x1a0 [ 1354.383389][T26598] ip6_dst_lookup_tail+0x25d/0xc50 [ 1354.388520][T26598] ? debug_smp_processor_id+0x43/0x137 [ 1354.394006][T26598] ? dst_destroy+0x210/0x210 [ 1354.398609][T26598] ? debug_smp_processor_id+0x43/0x137 [ 1354.404068][T26598] ? dst_destroy+0x210/0x210 [ 1354.408724][T26598] ? __call_rcu+0x153/0x390 [ 1354.413235][T26598] ip6_dst_lookup_flow+0x5c/0x110 [ 1354.418270][T26598] rawv6_sendmsg+0x9be/0x2340 [ 1354.423513][T26598] ? __const_udelay+0x36/0x40 [ 1354.428281][T26598] ? __udelay+0x10/0x20 [ 1354.432467][T26598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1354.438789][T26598] ? aa_label_sk_perm+0x89/0xe0 [ 1354.443659][T26598] ? aa_sk_perm+0x1d3/0x590 [ 1354.448182][T26598] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1354.454621][T26598] inet_sendmsg+0x6d/0x90 [ 1354.459092][T26598] ? inet_sendmsg+0x6d/0x90 [ 1354.463610][T26598] ? inet_send_prepare+0x200/0x200 [ 1354.468824][T26598] sock_sendmsg+0x9f/0xc0 [ 1354.473183][T26598] ____sys_sendmsg+0x212/0x4d0 [ 1354.477987][T26598] ___sys_sendmsg+0xb5/0x100 [ 1354.482670][T26598] ? __fget+0xb8/0x1d0 [ 1354.486774][T26598] ? __fget_light+0xaf/0x190 [ 1354.491446][T26598] ? __fdget+0x2c/0x40 [ 1354.495715][T26598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1354.502237][T26598] __sys_sendmmsg+0x123/0x350 [ 1354.506941][T26598] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1354.513336][T26598] ? fput_many+0xec/0x130 [ 1354.517680][T26598] ? fput+0x29/0x30 [ 1354.521556][T26598] ? ksys_write+0x145/0x1b0 [ 1354.526084][T26598] __x64_sys_sendmmsg+0x64/0x80 [ 1354.530998][T26598] do_syscall_64+0xcc/0x3a0 [ 1354.535645][T26598] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1354.541544][T26598] RIP: 0033:0x45aff9 [ 1354.545562][T26598] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x9, @remote, 0x2}, 0x1c) 11:04:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x6, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x12000000) [ 1354.565411][T26598] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1354.573984][T26598] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1354.582065][T26598] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1354.590060][T26598] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1354.598062][T26598] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1354.606120][T26598] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000003d 11:04:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x13000000) 11:04:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x8, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:14 executing program 3 (fault-call:10 fault-nth:62): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:14 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5, 0x80010, r2, 0x73c3d000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x14000000) 11:04:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x10, 0x4, 0x0, 0x0, 0x10000000280}) [ 1355.259205][T26639] FAULT_INJECTION: forcing a failure. [ 1355.259205][T26639] name failslab, interval 1, probability 0, space 0, times 0 [ 1355.272007][T26639] CPU: 1 PID: 26639 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1355.280735][T26639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.290824][T26639] Call Trace: [ 1355.294152][T26639] dump_stack+0x11d/0x181 [ 1355.298504][T26639] should_fail.cold+0xa/0x1a [ 1355.303101][T26639] __should_failslab+0xee/0x130 [ 1355.307962][T26639] should_failslab+0x9/0x14 [ 1355.312482][T26639] kmem_cache_alloc+0x29/0x5d0 [ 1355.317305][T26639] ? fib6_node_lookup+0xed/0x120 [ 1355.322343][T26639] dst_alloc+0xad/0x149 [ 1355.326520][T26639] ip6_dst_alloc+0x3d/0x80 [ 1355.331100][T26639] ip6_rt_cache_alloc+0x12b/0x480 [ 1355.336180][T26639] ip6_pol_route+0x5d2/0x730 [ 1355.340786][T26639] ? __const_udelay+0x36/0x40 [ 1355.345585][T26639] ip6_pol_route_output+0x48/0x60 [ 1355.350624][T26639] fib6_rule_lookup+0x3d6/0x470 [ 1355.355620][T26639] ? ip6_pol_route_input+0x70/0x70 [ 1355.360756][T26639] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1355.366961][T26639] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1355.372185][T26639] ip6_route_output_flags_noref+0x16b/0x230 [ 1355.378093][T26639] ip6_route_output_flags+0x50/0x1a0 [ 1355.383481][T26639] ip6_dst_lookup_tail+0x25d/0xc50 [ 1355.388681][T26639] ? debug_smp_processor_id+0x43/0x137 [ 1355.394216][T26639] ? dst_destroy+0x210/0x210 [ 1355.398934][T26639] ? debug_smp_processor_id+0x43/0x137 [ 1355.404534][T26639] ? dst_destroy+0x210/0x210 [ 1355.409130][T26639] ? __call_rcu+0x153/0x390 [ 1355.413702][T26639] ip6_dst_lookup_flow+0x5c/0x110 [ 1355.418919][T26639] rawv6_sendmsg+0x9be/0x2340 [ 1355.423642][T26639] ? __const_udelay+0x36/0x40 [ 1355.428327][T26639] ? __udelay+0x10/0x20 [ 1355.432567][T26639] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1355.438977][T26639] ? aa_label_sk_perm+0x89/0xe0 [ 1355.443969][T26639] ? aa_sk_perm+0x1d3/0x590 [ 1355.448568][T26639] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1355.454920][T26639] inet_sendmsg+0x6d/0x90 [ 1355.459261][T26639] ? inet_sendmsg+0x6d/0x90 [ 1355.463774][T26639] ? inet_send_prepare+0x200/0x200 [ 1355.468901][T26639] sock_sendmsg+0x9f/0xc0 [ 1355.473289][T26639] ____sys_sendmsg+0x212/0x4d0 [ 1355.478088][T26639] ___sys_sendmsg+0xb5/0x100 [ 1355.482706][T26639] ? __fget+0xb8/0x1d0 [ 1355.486802][T26639] ? __fget_light+0xaf/0x190 [ 1355.491543][T26639] ? __fdget+0x2c/0x40 [ 1355.495666][T26639] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1355.501915][T26639] __sys_sendmmsg+0x123/0x350 [ 1355.506628][T26639] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1355.512977][T26639] ? fput_many+0xec/0x130 [ 1355.517353][T26639] ? fput+0x29/0x30 [ 1355.521291][T26639] ? ksys_write+0x145/0x1b0 [ 1355.525819][T26639] __x64_sys_sendmmsg+0x64/0x80 [ 1355.530787][T26639] do_syscall_64+0xcc/0x3a0 [ 1355.535337][T26639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1355.541293][T26639] RIP: 0033:0x45aff9 11:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xa, @remote, 0x2}, 0x1c) 11:04:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x14, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x20000000) 11:04:14 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) accept4$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80400) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x50, r1, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r3, 0x4122, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) ioprio_get$uid(0x1948212c2ecc392a, 0xee00) [ 1355.545241][T26639] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1355.564851][T26639] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1355.573391][T26639] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1355.581569][T26639] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1355.589568][T26639] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1355.597590][T26639] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1355.605563][T26639] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000003e 11:04:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x26, 0x4, 0x0, 0x0, 0x10000000280}) 11:04:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x24030000) 11:04:15 executing program 3 (fault-call:10 fault-nth:63): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x30000000) 11:04:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x2, 0x0, 0x0, 0x10000000280}) 11:04:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x40000000) [ 1356.227298][T26677] FAULT_INJECTION: forcing a failure. [ 1356.227298][T26677] name failslab, interval 1, probability 0, space 0, times 0 [ 1356.240014][T26677] CPU: 1 PID: 26677 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1356.248780][T26677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.258835][T26677] Call Trace: [ 1356.262133][T26677] dump_stack+0x11d/0x181 [ 1356.266470][T26677] should_fail.cold+0xa/0x1a [ 1356.271077][T26677] __should_failslab+0xee/0x130 [ 1356.276035][T26677] should_failslab+0x9/0x14 [ 1356.280648][T26677] kmem_cache_alloc+0x29/0x5d0 [ 1356.285491][T26677] ? fib6_node_lookup+0xed/0x120 [ 1356.290442][T26677] dst_alloc+0xad/0x149 [ 1356.294648][T26677] ip6_dst_alloc+0x3d/0x80 [ 1356.301299][T26677] ip6_rt_cache_alloc+0x12b/0x480 [ 1356.306342][T26677] ip6_pol_route+0x5d2/0x730 [ 1356.311038][T26677] ip6_pol_route_output+0x48/0x60 [ 1356.316074][T26677] fib6_rule_lookup+0x3d6/0x470 [ 1356.321022][T26677] ? ip6_pol_route_input+0x70/0x70 [ 1356.326169][T26677] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1356.332033][T26677] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1356.337337][T26677] ip6_route_output_flags_noref+0x16b/0x230 [ 1356.343244][T26677] ip6_route_output_flags+0x50/0x1a0 [ 1356.348544][T26677] ip6_dst_lookup_tail+0x25d/0xc50 [ 1356.353689][T26677] ? debug_smp_processor_id+0x43/0x137 [ 1356.359209][T26677] ? dst_destroy+0x210/0x210 [ 1356.363881][T26677] ? debug_smp_processor_id+0x43/0x137 [ 1356.369358][T26677] ? dst_destroy+0x210/0x210 [ 1356.373963][T26677] ? __call_rcu+0x153/0x390 [ 1356.378489][T26677] ip6_dst_lookup_flow+0x5c/0x110 [ 1356.383525][T26677] rawv6_sendmsg+0x9be/0x2340 [ 1356.388253][T26677] ? process_measurement+0x149/0x1190 [ 1356.393709][T26677] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1356.399950][T26677] ? aa_label_sk_perm+0x89/0xe0 [ 1356.404809][T26677] ? aa_sk_perm+0x1d3/0x590 [ 1356.409417][T26677] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1356.415881][T26677] inet_sendmsg+0x6d/0x90 [ 1356.420218][T26677] ? inet_sendmsg+0x6d/0x90 [ 1356.424724][T26677] ? inet_send_prepare+0x200/0x200 [ 1356.430908][T26677] sock_sendmsg+0x9f/0xc0 [ 1356.435224][T26677] ____sys_sendmsg+0x212/0x4d0 [ 1356.439997][T26677] ___sys_sendmsg+0xb5/0x100 [ 1356.444728][T26677] ? __fget+0xb8/0x1d0 [ 1356.448865][T26677] ? __fget_light+0xaf/0x190 [ 1356.453470][T26677] ? __fdget+0x2c/0x40 [ 1356.457574][T26677] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1356.463943][T26677] __sys_sendmmsg+0x123/0x350 [ 1356.468632][T26677] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1356.474987][T26677] ? fput_many+0xec/0x130 [ 1356.479315][T26677] ? fput+0x29/0x30 [ 1356.483132][T26677] ? ksys_write+0x145/0x1b0 [ 1356.487692][T26677] __x64_sys_sendmmsg+0x64/0x80 [ 1356.492566][T26677] do_syscall_64+0xcc/0x3a0 [ 1356.497063][T26677] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1356.503008][T26677] RIP: 0033:0x45aff9 [ 1356.506919][T26677] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1356.526656][T26677] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1356.535094][T26677] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1356.543148][T26677] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1356.551146][T26677] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1356.559170][T26677] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1356.567178][T26677] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000003f 11:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xe, @remote, 0x2}, 0x1c) 11:04:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x3, 0x0, 0x0, 0x10000000280}) 11:04:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x60000000) 11:04:15 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) read$char_usb(r1, &(0x7f0000000200)=""/225, 0xe1) 11:04:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x65580000) 11:04:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x5, 0x0, 0x0, 0x10000000280}) 11:04:16 executing program 3 (fault-call:10 fault-nth:64): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x688ffff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x6, 0x0, 0x0, 0x10000000280}) 11:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x81000000) 11:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x87010000) [ 1357.263621][T26717] FAULT_INJECTION: forcing a failure. [ 1357.263621][T26717] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.276330][T26717] CPU: 0 PID: 26717 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1357.285004][T26717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.295162][T26717] Call Trace: [ 1357.298538][T26717] dump_stack+0x11d/0x181 [ 1357.302894][T26717] should_fail.cold+0xa/0x1a [ 1357.307497][T26717] __should_failslab+0xee/0x130 [ 1357.312389][T26717] should_failslab+0x9/0x14 [ 1357.316913][T26717] kmem_cache_alloc+0x29/0x5d0 [ 1357.321693][T26717] ? fib6_node_lookup+0xed/0x120 [ 1357.326710][T26717] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1357.332439][T26717] ? ip6_dst_gc+0x1c4/0x220 [ 1357.336953][T26717] dst_alloc+0xad/0x149 [ 1357.341844][T26717] ip6_dst_alloc+0x3d/0x80 [ 1357.346272][T26717] ip6_rt_cache_alloc+0x12b/0x480 [ 1357.351350][T26717] ip6_pol_route+0x5d2/0x730 [ 1357.355961][T26717] ip6_pol_route_output+0x48/0x60 [ 1357.361021][T26717] fib6_rule_lookup+0x3d6/0x470 [ 1357.365898][T26717] ? ip6_pol_route_input+0x70/0x70 [ 1357.371039][T26717] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1357.376848][T26717] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1357.382188][T26717] ip6_route_output_flags_noref+0x16b/0x230 [ 1357.388130][T26717] ip6_route_output_flags+0x50/0x1a0 [ 1357.393453][T26717] ip6_dst_lookup_tail+0x25d/0xc50 [ 1357.398583][T26717] ? debug_smp_processor_id+0x43/0x137 [ 1357.404282][T26717] ? dst_destroy+0x210/0x210 [ 1357.408909][T26717] ? debug_smp_processor_id+0x43/0x137 [ 1357.414451][T26717] ? dst_destroy+0x210/0x210 [ 1357.419250][T26717] ? __call_rcu+0x153/0x390 [ 1357.423769][T26717] ip6_dst_lookup_flow+0x5c/0x110 [ 1357.428816][T26717] rawv6_sendmsg+0x9be/0x2340 [ 1357.433782][T26717] ? process_measurement+0x149/0x1190 [ 1357.439302][T26717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1357.445585][T26717] ? aa_label_sk_perm+0x89/0xe0 [ 1357.450499][T26717] ? aa_sk_perm+0x1d3/0x590 [ 1357.455085][T26717] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1357.461430][T26717] inet_sendmsg+0x6d/0x90 [ 1357.465782][T26717] ? inet_sendmsg+0x6d/0x90 [ 1357.470772][T26717] ? inet_send_prepare+0x200/0x200 [ 1357.475899][T26717] sock_sendmsg+0x9f/0xc0 [ 1357.480240][T26717] ____sys_sendmsg+0x212/0x4d0 [ 1357.485246][T26717] ___sys_sendmsg+0xb5/0x100 [ 1357.489973][T26717] ? __fget+0xb8/0x1d0 [ 1357.494044][T26717] ? __fget_light+0xaf/0x190 [ 1357.498744][T26717] ? __fdget+0x2c/0x40 [ 1357.502822][T26717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1357.509066][T26717] __sys_sendmmsg+0x123/0x350 [ 1357.513832][T26717] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1357.520277][T26717] ? fput_many+0xec/0x130 [ 1357.524644][T26717] ? fput+0x29/0x30 [ 1357.528441][T26717] ? ksys_write+0x145/0x1b0 [ 1357.532947][T26717] __x64_sys_sendmmsg+0x64/0x80 [ 1357.537808][T26717] do_syscall_64+0xcc/0x3a0 [ 1357.542377][T26717] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1357.548264][T26717] RIP: 0033:0x45aff9 [ 1357.552289][T26717] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1357.573065][T26717] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1357.581488][T26717] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1357.589450][T26717] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1357.597536][T26717] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1357.605578][T26717] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x10, @remote, 0x2}, 0x1c) 11:04:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x7, 0x0, 0x0, 0x10000000280}) 11:04:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x7000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x88a8ffff) [ 1357.613573][T26717] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000040 11:04:16 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000200)=@v2={0x3, 0x2, 0xb, 0x3ff, 0xb3, "09b9684b0dccb5866356fcba8016b4eb0e45b4287541777052c0f5705e94b84b30e47f9af611c05cd09c80d26bc3fbe2d1ca16306ae32af6eedcf201c5f09ead09e35b25d45885a25ef8c9ec96f4daf8118e73501a591a9c93bc0c9077e70e792fd1c6c2b26b053a7f95f6a536d5966d0216354f2acd024318a16b94620e3f064125458f84f3cc258f525205fce46bfd86b4f08ebd4b9a3e8a89eac058cc14126cd6224094519bc1a5dfc32b030da24ba09a32"}, 0xbd, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x8000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x9effffff) 11:04:17 executing program 3 (fault-call:10 fault-nth:65): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x8, 0x0, 0x0, 0x10000000280}) 11:04:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x888ffff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xf0ffffff) 11:04:17 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1358.283678][T26759] FAULT_INJECTION: forcing a failure. [ 1358.283678][T26759] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.296416][T26759] CPU: 0 PID: 26759 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1358.305127][T26759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1358.315226][T26759] Call Trace: [ 1358.318605][T26759] dump_stack+0x11d/0x181 [ 1358.322965][T26759] should_fail.cold+0xa/0x1a [ 1358.327570][T26759] __should_failslab+0xee/0x130 [ 1358.332550][T26759] should_failslab+0x9/0x14 [ 1358.337078][T26759] kmem_cache_alloc+0x29/0x5d0 [ 1358.341864][T26759] ? fib6_node_lookup+0xed/0x120 [ 1358.346851][T26759] dst_alloc+0xad/0x149 [ 1358.351099][T26759] ip6_dst_alloc+0x3d/0x80 [ 1358.355531][T26759] ip6_rt_cache_alloc+0x12b/0x480 [ 1358.360576][T26759] ip6_pol_route+0x5d2/0x730 [ 1358.365180][T26759] ? __const_udelay+0x36/0x40 [ 1358.369869][T26759] ip6_pol_route_output+0x48/0x60 [ 1358.374916][T26759] fib6_rule_lookup+0x3d6/0x470 [ 1358.379854][T26759] ? ip6_pol_route_input+0x70/0x70 [ 1358.385010][T26759] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1358.390749][T26759] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1358.396000][T26759] ip6_route_output_flags_noref+0x16b/0x230 [ 1358.402082][T26759] ip6_route_output_flags+0x50/0x1a0 [ 1358.407446][T26759] ip6_dst_lookup_tail+0x25d/0xc50 [ 1358.412610][T26759] ? debug_smp_processor_id+0x43/0x137 [ 1358.418081][T26759] ? dst_destroy+0x210/0x210 [ 1358.422705][T26759] ? debug_smp_processor_id+0x43/0x137 [ 1358.428181][T26759] ? dst_destroy+0x210/0x210 [ 1358.432784][T26759] ? __call_rcu+0x153/0x390 [ 1358.437372][T26759] ip6_dst_lookup_flow+0x5c/0x110 [ 1358.442852][T26759] rawv6_sendmsg+0x9be/0x2340 [ 1358.447548][T26759] ? process_measurement+0x149/0x1190 [ 1358.453010][T26759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1358.459396][T26759] ? aa_label_sk_perm+0x89/0xe0 [ 1358.464307][T26759] ? aa_sk_perm+0x1d3/0x590 [ 1358.468834][T26759] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1358.475193][T26759] inet_sendmsg+0x6d/0x90 [ 1358.479588][T26759] ? inet_sendmsg+0x6d/0x90 [ 1358.484121][T26759] ? inet_send_prepare+0x200/0x200 [ 1358.489251][T26759] sock_sendmsg+0x9f/0xc0 [ 1358.493601][T26759] ____sys_sendmsg+0x212/0x4d0 [ 1358.498416][T26759] ___sys_sendmsg+0xb5/0x100 [ 1358.503108][T26759] ? __fget+0xb8/0x1d0 [ 1358.507195][T26759] ? __fget_light+0xaf/0x190 [ 1358.511876][T26759] ? __fdget+0x2c/0x40 [ 1358.515988][T26759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1358.522539][T26759] __sys_sendmmsg+0x123/0x350 [ 1358.527288][T26759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1358.533555][T26759] ? fput_many+0xec/0x130 [ 1358.537893][T26759] ? fput+0x29/0x30 [ 1358.541719][T26759] ? ksys_write+0x145/0x1b0 [ 1358.546284][T26759] __x64_sys_sendmmsg+0x64/0x80 [ 1358.551157][T26759] do_syscall_64+0xcc/0x3a0 [ 1358.555688][T26759] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1358.561584][T26759] RIP: 0033:0x45aff9 [ 1358.565611][T26759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x218, @remote, 0x2}, 0x1c) 11:04:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xffffa888) 11:04:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x10, 0x0, 0x0, 0x10000000280}) 11:04:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x9000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:17 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/protocols\x00') ioctl$TCGETA(r2, 0x5405, &(0x7f00000000c0)) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1358.585228][T26759] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1358.593672][T26759] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1358.601729][T26759] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1358.609707][T26759] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1358.617907][T26759] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1358.625985][T26759] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000041 11:04:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xffffff7f) 11:04:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x12, 0x0, 0x0, 0x10000000280}) 11:04:18 executing program 3 (fault-call:10 fault-nth:66): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x14, 0x0, 0x0, 0x10000000280}) 11:04:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xffffff9e) 11:04:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xfffffff0) [ 1359.316961][T26804] FAULT_INJECTION: forcing a failure. [ 1359.316961][T26804] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.329810][T26804] CPU: 1 PID: 26804 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1359.338488][T26804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.348601][T26804] Call Trace: [ 1359.351912][T26804] dump_stack+0x11d/0x181 [ 1359.356305][T26804] should_fail.cold+0xa/0x1a [ 1359.361000][T26804] __should_failslab+0xee/0x130 [ 1359.366007][T26804] should_failslab+0x9/0x14 [ 1359.370645][T26804] kmem_cache_alloc+0x29/0x5d0 [ 1359.375435][T26804] ? fib6_node_lookup+0xed/0x120 [ 1359.380382][T26804] dst_alloc+0xad/0x149 [ 1359.384560][T26804] ip6_dst_alloc+0x3d/0x80 [ 1359.389114][T26804] ip6_rt_cache_alloc+0x12b/0x480 [ 1359.394156][T26804] ip6_pol_route+0x5d2/0x730 [ 1359.398769][T26804] ? __const_udelay+0x36/0x40 [ 1359.403522][T26804] ip6_pol_route_output+0x48/0x60 [ 1359.408658][T26804] fib6_rule_lookup+0x3d6/0x470 [ 1359.413573][T26804] ? ip6_pol_route_input+0x70/0x70 [ 1359.418695][T26804] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1359.424483][T26804] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1359.429678][T26804] ip6_route_output_flags_noref+0x16b/0x230 [ 1359.435682][T26804] ip6_route_output_flags+0x50/0x1a0 [ 1359.440967][T26804] ip6_dst_lookup_tail+0x25d/0xc50 [ 1359.446168][T26804] ? debug_smp_processor_id+0x43/0x137 [ 1359.451627][T26804] ? dst_destroy+0x210/0x210 [ 1359.456208][T26804] ? debug_smp_processor_id+0x43/0x137 [ 1359.461660][T26804] ? dst_destroy+0x210/0x210 [ 1359.466234][T26804] ? __call_rcu+0x153/0x390 [ 1359.470760][T26804] ip6_dst_lookup_flow+0x5c/0x110 [ 1359.475799][T26804] rawv6_sendmsg+0x9be/0x2340 [ 1359.480835][T26804] ? __const_udelay+0x36/0x40 [ 1359.485493][T26804] ? __udelay+0x10/0x20 [ 1359.489637][T26804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1359.495886][T26804] ? aa_label_sk_perm+0x89/0xe0 [ 1359.500744][T26804] ? aa_sk_perm+0x1d3/0x590 [ 1359.505275][T26804] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1359.511693][T26804] inet_sendmsg+0x6d/0x90 [ 1359.516068][T26804] ? inet_sendmsg+0x6d/0x90 [ 1359.520652][T26804] ? inet_send_prepare+0x200/0x200 [ 1359.525783][T26804] sock_sendmsg+0x9f/0xc0 [ 1359.530295][T26804] ____sys_sendmsg+0x212/0x4d0 [ 1359.535075][T26804] ___sys_sendmsg+0xb5/0x100 [ 1359.539669][T26804] ? __fget+0xb8/0x1d0 [ 1359.543869][T26804] ? __fget_light+0xaf/0x190 [ 1359.548475][T26804] ? __fdget+0x2c/0x40 [ 1359.552533][T26804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1359.559026][T26804] __sys_sendmmsg+0x123/0x350 [ 1359.563787][T26804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1359.570016][T26804] ? fput_many+0xec/0x130 [ 1359.574370][T26804] ? fput+0x29/0x30 [ 1359.578179][T26804] ? ksys_write+0x145/0x1b0 [ 1359.582754][T26804] __x64_sys_sendmmsg+0x64/0x80 [ 1359.587609][T26804] do_syscall_64+0xcc/0x3a0 [ 1359.592280][T26804] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1359.598162][T26804] RIP: 0033:0x45aff9 [ 1359.602060][T26804] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1359.621787][T26804] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1359.630207][T26804] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1359.638179][T26804] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1359.646148][T26804] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1359.657065][T26804] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x240, @remote, 0x2}, 0x1c) 11:04:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xb000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x26, 0x0, 0x0, 0x10000000280}) 11:04:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1000000000000) 11:04:18 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000002000/0x12000)=nil, 0x12000, 0x4, 0x11, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000000)={0x92, 0x5, 0x4, 0x80000000, 0x6, {0x77359400}, {0x5, 0x2, 0xff, 0x7, 0x0, 0x1, "cc9aa33d"}, 0x40, 0x2, @offset=0x3, 0xb64a, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1359.665038][T26804] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000042 11:04:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xc000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x20000000000000) 11:04:19 executing program 3 (fault-call:10 fault-nth:67): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0xd00, 0x0, 0x0, 0x10000000280}) 11:04:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xe000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x40030000000000) 11:04:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) [ 1360.301470][T26841] FAULT_INJECTION: forcing a failure. [ 1360.301470][T26841] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.314721][T26841] CPU: 1 PID: 26841 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1360.323405][T26841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.334564][T26841] Call Trace: [ 1360.337878][T26841] dump_stack+0x11d/0x181 [ 1360.343239][T26841] should_fail.cold+0xa/0x1a [ 1360.347876][T26841] __should_failslab+0xee/0x130 [ 1360.352939][T26841] should_failslab+0x9/0x14 [ 1360.357463][T26841] kmem_cache_alloc+0x29/0x5d0 [ 1360.362255][T26841] ? fib6_node_lookup+0xed/0x120 [ 1360.367206][T26841] dst_alloc+0xad/0x149 [ 1360.371437][T26841] ip6_dst_alloc+0x3d/0x80 [ 1360.375979][T26841] ip6_rt_cache_alloc+0x12b/0x480 [ 1360.381056][T26841] ip6_pol_route+0x5d2/0x730 [ 1360.385668][T26841] ? __const_udelay+0x36/0x40 [ 1360.390362][T26841] ip6_pol_route_output+0x48/0x60 [ 1360.395402][T26841] fib6_rule_lookup+0x3d6/0x470 [ 1360.400264][T26841] ? ip6_pol_route_input+0x70/0x70 [ 1360.405630][T26841] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1360.411454][T26841] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1360.416678][T26841] ip6_route_output_flags_noref+0x16b/0x230 [ 1360.422667][T26841] ip6_route_output_flags+0x50/0x1a0 [ 1360.429025][T26841] ip6_dst_lookup_tail+0x25d/0xc50 [ 1360.434150][T26841] ? debug_smp_processor_id+0x43/0x137 [ 1360.439702][T26841] ? dst_destroy+0x210/0x210 [ 1360.444380][T26841] ? debug_smp_processor_id+0x43/0x137 [ 1360.449867][T26841] ? dst_destroy+0x210/0x210 [ 1360.454585][T26841] ? __call_rcu+0x153/0x390 [ 1360.459105][T26841] ip6_dst_lookup_flow+0x5c/0x110 [ 1360.464213][T26841] rawv6_sendmsg+0x9be/0x2340 [ 1360.469151][T26841] ? __const_udelay+0x36/0x40 [ 1360.474865][T26841] ? __udelay+0x10/0x20 [ 1360.479216][T26841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1360.485469][T26841] ? aa_label_sk_perm+0x89/0xe0 [ 1360.491115][T26841] ? aa_sk_perm+0x1d3/0x590 [ 1360.495618][T26841] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1360.502050][T26841] inet_sendmsg+0x6d/0x90 [ 1360.506378][T26841] ? inet_sendmsg+0x6d/0x90 [ 1360.510873][T26841] ? inet_send_prepare+0x200/0x200 [ 1360.515993][T26841] sock_sendmsg+0x9f/0xc0 [ 1360.520329][T26841] ____sys_sendmsg+0x212/0x4d0 [ 1360.525293][T26841] ___sys_sendmsg+0xb5/0x100 [ 1360.530350][T26841] ? __fget+0xb8/0x1d0 [ 1360.534423][T26841] ? __fget_light+0xaf/0x190 [ 1360.539061][T26841] ? __fdget+0x2c/0x40 [ 1360.543855][T26841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1360.550270][T26841] __sys_sendmmsg+0x123/0x350 [ 1360.554969][T26841] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1360.562415][T26841] ? fput_many+0xec/0x130 [ 1360.567281][T26841] ? fput+0x29/0x30 [ 1360.571182][T26841] ? ksys_write+0x145/0x1b0 [ 1360.575810][T26841] __x64_sys_sendmmsg+0x64/0x80 [ 1360.580740][T26841] do_syscall_64+0xcc/0x3a0 [ 1360.585258][T26841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1360.592263][T26841] RIP: 0033:0x45aff9 [ 1360.596168][T26841] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.615808][T26841] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1360.624235][T26841] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1360.633297][T26841] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1360.641256][T26841] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x300, @remote, 0x2}, 0x1c) 11:04:19 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x4010, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xf000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1360.649392][T26841] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1360.657372][T26841] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000043 11:04:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x2, 0x0, 0x10000000280}) 11:04:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x100000000000000) 11:04:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x3, 0x0, 0x10000000280}) 11:04:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x10000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:20 executing program 3 (fault-call:10 fault-nth:68): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4, 0x0, 0x10000000280}) 11:04:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x200000000000000) 11:04:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x11000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x300000000000000) [ 1361.361581][T26880] FAULT_INJECTION: forcing a failure. [ 1361.361581][T26880] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.374367][T26880] CPU: 1 PID: 26880 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1361.383342][T26880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.393400][T26880] Call Trace: [ 1361.396756][T26880] dump_stack+0x11d/0x181 [ 1361.401182][T26880] should_fail.cold+0xa/0x1a [ 1361.405826][T26880] __should_failslab+0xee/0x130 [ 1361.410699][T26880] should_failslab+0x9/0x14 [ 1361.415219][T26880] kmem_cache_alloc+0x29/0x5d0 [ 1361.420129][T26880] ? fib6_node_lookup+0xed/0x120 [ 1361.425136][T26880] dst_alloc+0xad/0x149 [ 1361.429292][T26880] ip6_dst_alloc+0x3d/0x80 [ 1361.433784][T26880] ip6_rt_cache_alloc+0x12b/0x480 [ 1361.438852][T26880] ip6_pol_route+0x5d2/0x730 [ 1361.443471][T26880] ip6_pol_route_output+0x48/0x60 [ 1361.449490][T26880] fib6_rule_lookup+0x3d6/0x470 [ 1361.454356][T26880] ? ip6_pol_route_input+0x70/0x70 [ 1361.459477][T26880] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1361.465210][T26880] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1361.470489][T26880] ip6_route_output_flags_noref+0x16b/0x230 [ 1361.476395][T26880] ip6_route_output_flags+0x50/0x1a0 [ 1361.481692][T26880] ip6_dst_lookup_tail+0x25d/0xc50 [ 1361.486866][T26880] ? debug_smp_processor_id+0x43/0x137 [ 1361.492323][T26880] ? dst_destroy+0x210/0x210 [ 1361.496984][T26880] ? debug_smp_processor_id+0x43/0x137 [ 1361.502504][T26880] ? dst_destroy+0x210/0x210 [ 1361.507113][T26880] ? __call_rcu+0x153/0x390 [ 1361.511634][T26880] ip6_dst_lookup_flow+0x5c/0x110 [ 1361.516835][T26880] rawv6_sendmsg+0x9be/0x2340 [ 1361.521699][T26880] ? process_measurement+0x149/0x1190 [ 1361.527096][T26880] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.533359][T26880] ? aa_label_sk_perm+0x89/0xe0 [ 1361.538267][T26880] ? aa_sk_perm+0x1d3/0x590 [ 1361.542789][T26880] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1361.549136][T26880] inet_sendmsg+0x6d/0x90 [ 1361.553507][T26880] ? inet_sendmsg+0x6d/0x90 [ 1361.558030][T26880] ? inet_send_prepare+0x200/0x200 [ 1361.563229][T26880] sock_sendmsg+0x9f/0xc0 [ 1361.567623][T26880] ____sys_sendmsg+0x212/0x4d0 [ 1361.572423][T26880] ___sys_sendmsg+0xb5/0x100 [ 1361.577050][T26880] ? __fget+0xb8/0x1d0 [ 1361.581183][T26880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1361.587427][T26880] ? debug_smp_processor_id+0x43/0x137 [ 1361.592923][T26880] ? delay_tsc+0x8f/0xc0 [ 1361.597306][T26880] ? __const_udelay+0x36/0x40 [ 1361.601993][T26880] ? __udelay+0x10/0x20 [ 1361.606168][T26880] __sys_sendmmsg+0x123/0x350 11:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x500, @remote, 0x2}, 0x1c) 11:04:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x5, 0x0, 0x10000000280}) 11:04:20 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0)=0xfffffffffffffffc, 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x2, 0x2200) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000040)={@bcast, @default}) read$rfkill(r1, &(0x7f0000000140), 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000280)=0x100000000009) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000300)=0xfffffff7, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xfff}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) getsockname$l2tp6(r4, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000002c0)=0x20) socket$alg(0x26, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f0000000200)={0x8, {0x5, 0x0, 0x80000001, 0xe9, 0x2}}) [ 1361.610875][T26880] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1361.617194][T26880] ? fput_many+0xec/0x130 [ 1361.621608][T26880] ? fput+0x29/0x30 [ 1361.625430][T26880] ? ksys_write+0x145/0x1b0 [ 1361.629975][T26880] __x64_sys_sendmmsg+0x64/0x80 [ 1361.634884][T26880] do_syscall_64+0xcc/0x3a0 [ 1361.639411][T26880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1361.645307][T26880] RIP: 0033:0x45aff9 [ 1361.649254][T26880] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.668848][T26880] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1361.677348][T26880] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1361.685454][T26880] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1361.693442][T26880] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1361.701442][T26880] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1361.709513][T26880] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000044 11:04:20 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 11:04:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x12000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x6, 0x0, 0x10000000280}) 11:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x400000000000000) 11:04:21 executing program 3 (fault-call:10 fault-nth:69): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x13000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x7, 0x0, 0x10000000280}) 11:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x500000000000000) 11:04:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x14000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1362.394490][T26922] FAULT_INJECTION: forcing a failure. [ 1362.394490][T26922] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.407226][T26922] CPU: 1 PID: 26922 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1362.415916][T26922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.426038][T26922] Call Trace: [ 1362.429407][T26922] dump_stack+0x11d/0x181 [ 1362.433851][T26922] should_fail.cold+0xa/0x1a [ 1362.438465][T26922] __should_failslab+0xee/0x130 [ 1362.443369][T26922] should_failslab+0x9/0x14 [ 1362.447934][T26922] kmem_cache_alloc+0x29/0x5d0 [ 1362.452716][T26922] ? fib6_node_lookup+0xed/0x120 [ 1362.457688][T26922] dst_alloc+0xad/0x149 [ 1362.461994][T26922] ip6_dst_alloc+0x3d/0x80 [ 1362.466421][T26922] ip6_rt_cache_alloc+0x12b/0x480 [ 1362.471464][T26922] ip6_pol_route+0x5d2/0x730 [ 1362.476134][T26922] ip6_pol_route_output+0x48/0x60 [ 1362.481146][T26922] fib6_rule_lookup+0x3d6/0x470 [ 1362.485985][T26922] ? ip6_pol_route_input+0x70/0x70 [ 1362.491220][T26922] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1362.496949][T26922] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1362.502169][T26922] ip6_route_output_flags_noref+0x16b/0x230 [ 1362.508052][T26922] ip6_route_output_flags+0x50/0x1a0 [ 1362.513339][T26922] ip6_dst_lookup_tail+0x25d/0xc50 [ 1362.518454][T26922] ? debug_smp_processor_id+0x43/0x137 [ 1362.524031][T26922] ? dst_destroy+0x210/0x210 [ 1362.528658][T26922] ? debug_smp_processor_id+0x43/0x137 [ 1362.534204][T26922] ? dst_destroy+0x210/0x210 [ 1362.538796][T26922] ? __call_rcu+0x153/0x390 [ 1362.543303][T26922] ip6_dst_lookup_flow+0x5c/0x110 [ 1362.548332][T26922] rawv6_sendmsg+0x9be/0x2340 [ 1362.553018][T26922] ? process_measurement+0x149/0x1190 [ 1362.558398][T26922] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.564713][T26922] ? aa_label_sk_perm+0x89/0xe0 [ 1362.569561][T26922] ? aa_sk_perm+0x1d3/0x590 [ 1362.574057][T26922] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1362.580431][T26922] inet_sendmsg+0x6d/0x90 [ 1362.584755][T26922] ? inet_sendmsg+0x6d/0x90 [ 1362.589333][T26922] ? inet_send_prepare+0x200/0x200 [ 1362.594532][T26922] sock_sendmsg+0x9f/0xc0 [ 1362.598869][T26922] ____sys_sendmsg+0x212/0x4d0 [ 1362.603682][T26922] ___sys_sendmsg+0xb5/0x100 [ 1362.608278][T26922] ? __fget+0xb8/0x1d0 [ 1362.612361][T26922] ? __fget_light+0xaf/0x190 [ 1362.616936][T26922] ? __fdget+0x2c/0x40 [ 1362.621004][T26922] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.627247][T26922] __sys_sendmmsg+0x123/0x350 [ 1362.632664][T26922] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1362.638919][T26922] ? fput_many+0xec/0x130 [ 1362.643261][T26922] ? fput+0x29/0x30 [ 1362.647085][T26922] ? ksys_write+0x145/0x1b0 [ 1362.651592][T26922] __x64_sys_sendmmsg+0x64/0x80 [ 1362.656501][T26922] do_syscall_64+0xcc/0x3a0 [ 1362.661021][T26922] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1362.667295][T26922] RIP: 0033:0x45aff9 [ 1362.671483][T26922] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1362.691388][T26922] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1362.699805][T26922] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1362.707777][T26922] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1362.715833][T26922] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1362.723960][T26922] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1362.731921][T26922] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000045 11:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x600, @remote, 0x2}, 0x1c) 11:04:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x8, 0x0, 0x10000000280}) 11:04:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x600000000000000) 11:04:21 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x540000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000000, 0xdad620811f6d53f, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1, 0x0, 0xbb, 0x5}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r3, 0x4a, "ad06880cf1f68cfee0a4ecc6d8b65274cae8fe25241644a8b5eaf87ac1903150806bbdd4481a02b8c562216d97970cf90d54431fcc8c49e5d5ab5ff0a045a988e748e80082e6241bcc40"}, &(0x7f00000000c0)=0x52) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x15000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x800000000000000) 11:04:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0xb, 0x0, 0x10000000280}) 11:04:22 executing program 3 (fault-call:10 fault-nth:70): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x16000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x900000000000000) 11:04:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x48, 0x0, 0x10000000280}) [ 1363.424330][T26960] FAULT_INJECTION: forcing a failure. [ 1363.424330][T26960] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.437111][T26960] CPU: 1 PID: 26960 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1363.445882][T26960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.456132][T26960] Call Trace: [ 1363.459550][T26960] dump_stack+0x11d/0x181 [ 1363.464051][T26960] should_fail.cold+0xa/0x1a [ 1363.468672][T26960] __should_failslab+0xee/0x130 [ 1363.473537][T26960] should_failslab+0x9/0x14 [ 1363.478064][T26960] kmem_cache_alloc+0x29/0x5d0 [ 1363.482849][T26960] ? fib6_node_lookup+0xed/0x120 [ 1363.487842][T26960] dst_alloc+0xad/0x149 [ 1363.492047][T26960] ip6_dst_alloc+0x3d/0x80 [ 1363.496524][T26960] ip6_rt_cache_alloc+0x12b/0x480 [ 1363.501678][T26960] ip6_pol_route+0x5d2/0x730 [ 1363.506293][T26960] ip6_pol_route_output+0x48/0x60 [ 1363.511345][T26960] fib6_rule_lookup+0x3d6/0x470 [ 1363.516212][T26960] ? ip6_pol_route_input+0x70/0x70 [ 1363.521333][T26960] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1363.527080][T26960] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1363.532296][T26960] ip6_route_output_flags_noref+0x16b/0x230 [ 1363.538234][T26960] ip6_route_output_flags+0x50/0x1a0 [ 1363.543538][T26960] ip6_dst_lookup_tail+0x25d/0xc50 [ 1363.548686][T26960] ? debug_smp_processor_id+0x43/0x137 [ 1363.554278][T26960] ? dst_destroy+0x210/0x210 [ 1363.558884][T26960] ? debug_smp_processor_id+0x43/0x137 [ 1363.564403][T26960] ? dst_destroy+0x210/0x210 [ 1363.569099][T26960] ? __call_rcu+0x153/0x390 [ 1363.573613][T26960] ip6_dst_lookup_flow+0x5c/0x110 [ 1363.578642][T26960] rawv6_sendmsg+0x9be/0x2340 [ 1363.583448][T26960] ? __const_udelay+0x36/0x40 [ 1363.588236][T26960] ? __udelay+0x10/0x20 [ 1363.592630][T26960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1363.598889][T26960] ? aa_label_sk_perm+0x89/0xe0 [ 1363.603757][T26960] ? aa_sk_perm+0x1d3/0x590 [ 1363.608349][T26960] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1363.614971][T26960] inet_sendmsg+0x6d/0x90 [ 1363.619325][T26960] ? inet_sendmsg+0x6d/0x90 [ 1363.623968][T26960] ? inet_send_prepare+0x200/0x200 [ 1363.629246][T26960] sock_sendmsg+0x9f/0xc0 [ 1363.633593][T26960] ____sys_sendmsg+0x212/0x4d0 [ 1363.638528][T26960] ___sys_sendmsg+0xb5/0x100 [ 1363.643280][T26960] ? __fget+0xb8/0x1d0 [ 1363.647411][T26960] ? __fget_light+0xaf/0x190 [ 1363.652032][T26960] ? __fdget+0x2c/0x40 [ 1363.656113][T26960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1363.662373][T26960] __sys_sendmmsg+0x123/0x350 [ 1363.667156][T26960] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 11:04:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) r2 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r2, &(0x7f0000002000)='/', 0x1) sendfile(r2, r2, &(0x7f00000001c0), 0xfec) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000280)={0x82c27e9fa45da53e, 0x200, 0x0, r5, 0x0, &(0x7f0000000240)={0x9c0001, 0x8, [], @ptr=0x400}}) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x100000f, 0x4010, r3, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) open_by_handle_at(r1, &(0x7f0000000480)={0xf0, 0x2, "63f8bd607bf2d7293169d322efed631caf62c7569c83e7a4a43a942ef3a7a20241974ff2157ac5cd8e350ac303901b92d44f00797f6f03e8129ba148cbe96c5cf005283d1ff26ca22bd58a2cfcffdadfdce7ae44880ebc182f62b2e18785a3eb2dbbd4cd4f8da7ef4d4794ea6a9ce46a87c2e5b6699e2d970eb0d1c2726404591b1e127d3c875faaeaebdd6b45110e90a317e4f8d382d5b812bf12df0a8282e139d953245ee3c3ae9747192489bc2525cd800515c44e61c18172f48db144570af6dc2d26ab481e5c4cdd851bb3c6f178a86570b58b30ad9db51f1a38d79802e707347462aff7c114"}, 0x41) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r9, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, r10, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fdd2c3c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9dbb}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x28bfaf5c50fdc363}, 0x8080) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000140)={0x800, 0xa, 0x4, 0x10000, 0x7, {0x0, 0x2710}, {0x4, 0xc, 0x81, 0x1, 0x20, 0x4, "44fb2ede"}, 0x2, 0x2, @planes=&(0x7f0000000000)={0x7, 0x9, @fd, 0x8}, 0x8, 0x0, r8}) sendmsg$nl_route_sched(r11, &(0x7f0000000340)={0x0, 0xffffffffffffff54, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f}, 0x58}}, 0x40000) fcntl$dupfd(r2, 0x0, r6) [ 1363.673459][T26960] ? fput_many+0xec/0x130 [ 1363.677904][T26960] ? fput+0x29/0x30 [ 1363.681778][T26960] ? ksys_write+0x145/0x1b0 [ 1363.686467][T26960] __x64_sys_sendmmsg+0x64/0x80 [ 1363.691334][T26960] do_syscall_64+0xcc/0x3a0 [ 1363.695832][T26960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1363.701721][T26960] RIP: 0033:0x45aff9 [ 1363.705638][T26960] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.725290][T26960] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1363.733796][T26960] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1363.741783][T26960] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1363.749748][T26960] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1363.757723][T26960] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1363.765844][T26960] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000046 11:04:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x700, @remote, 0x2}, 0x1c) 11:04:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xa00000000000000) 11:04:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:22 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4c, 0x0, 0x10000000280}) 11:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xb00000000000000) 11:04:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x68, 0x0, 0x10000000280}) 11:04:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x1d000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:23 executing program 3 (fault-call:10 fault-nth:71): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc00000000000000) 11:04:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x20000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1364.455212][T26996] FAULT_INJECTION: forcing a failure. [ 1364.455212][T26996] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.467892][T26996] CPU: 1 PID: 26996 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1364.476571][T26996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.486629][T26996] Call Trace: [ 1364.489928][T26996] dump_stack+0x11d/0x181 [ 1364.494421][T26996] should_fail.cold+0xa/0x1a [ 1364.499091][T26996] __should_failslab+0xee/0x130 11:04:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xc02000000000000) [ 1364.503960][T26996] should_failslab+0x9/0x14 [ 1364.508478][T26996] kmem_cache_alloc+0x29/0x5d0 [ 1364.513349][T26996] ? fib6_node_lookup+0xed/0x120 [ 1364.518297][T26996] dst_alloc+0xad/0x149 [ 1364.522473][T26996] ip6_dst_alloc+0x3d/0x80 [ 1364.527024][T26996] ip6_rt_cache_alloc+0x12b/0x480 [ 1364.532061][T26996] ip6_pol_route+0x5d2/0x730 [ 1364.536681][T26996] ? __const_udelay+0x36/0x40 [ 1364.541366][T26996] ip6_pol_route_output+0x48/0x60 [ 1364.546524][T26996] fib6_rule_lookup+0x3d6/0x470 11:04:23 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0xfec) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1364.551389][T26996] ? ip6_pol_route_input+0x70/0x70 [ 1364.556519][T26996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1364.562356][T26996] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1364.567693][T26996] ip6_route_output_flags_noref+0x16b/0x230 [ 1364.573635][T26996] ip6_route_output_flags+0x50/0x1a0 [ 1364.578997][T26996] ip6_dst_lookup_tail+0x25d/0xc50 [ 1364.584119][T26996] ? debug_smp_processor_id+0x43/0x137 [ 1364.589794][T26996] ? dst_destroy+0x210/0x210 [ 1364.594387][T26996] ? debug_smp_processor_id+0x43/0x137 [ 1364.599841][T26996] ? dst_destroy+0x210/0x210 [ 1364.604472][T26996] ? __call_rcu+0x153/0x390 [ 1364.608967][T26996] ip6_dst_lookup_flow+0x5c/0x110 [ 1364.614218][T26996] rawv6_sendmsg+0x9be/0x2340 [ 1364.618903][T26996] ? __const_udelay+0x36/0x40 [ 1364.623589][T26996] ? __udelay+0x10/0x20 [ 1364.627766][T26996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.633996][T26996] ? aa_label_sk_perm+0x89/0xe0 [ 1364.638852][T26996] ? aa_sk_perm+0x1d3/0x590 [ 1364.643441][T26996] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1364.649763][T26996] inet_sendmsg+0x6d/0x90 [ 1364.654083][T26996] ? inet_sendmsg+0x6d/0x90 [ 1364.658589][T26996] ? inet_send_prepare+0x200/0x200 [ 1364.663729][T26996] sock_sendmsg+0x9f/0xc0 [ 1364.668076][T26996] ____sys_sendmsg+0x212/0x4d0 [ 1364.672962][T26996] ___sys_sendmsg+0xb5/0x100 [ 1364.677699][T26996] ? __fget+0xb8/0x1d0 [ 1364.682369][T26996] ? __fget_light+0xaf/0x190 [ 1364.687037][T26996] ? __fdget+0x2c/0x40 [ 1364.691257][T26996] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.698464][T26996] __sys_sendmmsg+0x123/0x350 [ 1364.703229][T26996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1364.709532][T26996] ? fput_many+0xec/0x130 [ 1364.713860][T26996] ? fput+0x29/0x30 [ 1364.718063][T26996] ? ksys_write+0x145/0x1b0 [ 1364.722572][T26996] __x64_sys_sendmmsg+0x64/0x80 [ 1364.727422][T26996] do_syscall_64+0xcc/0x3a0 [ 1364.731923][T26996] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1364.737922][T26996] RIP: 0033:0x45aff9 [ 1364.741814][T26996] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.762666][T26996] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1364.771075][T26996] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1364.779081][T26996] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1364.787056][T26996] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1364.795044][T26996] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1364.803187][T26996] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000047 11:04:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x6c, 0x0, 0x10000000280}) 11:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe00000000000000) 11:04:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x900, @remote, 0x2}, 0x1c) 11:04:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x21000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:24 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x2000000, 0x4, {0x77359400}, {0x1, 0x1, 0x3, 0x9, 0x2, 0x80, "50bd09a1"}, 0x81, 0x4, @offset=0xffffffff, 0x2, 0x0, r1}) read$alg(r2, &(0x7f0000000200)=""/227, 0xe3) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xe01000000000000) 11:04:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x74, 0x0, 0x10000000280}) 11:04:24 executing program 3 (fault-call:10 fault-nth:72): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x24000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x7a, 0x0, 0x10000000280}) 11:04:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xf00000000000000) [ 1365.522641][T27040] FAULT_INJECTION: forcing a failure. [ 1365.522641][T27040] name failslab, interval 1, probability 0, space 0, times 0 [ 1365.535358][T27040] CPU: 1 PID: 27040 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1365.544300][T27040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.555827][T27040] Call Trace: [ 1365.559131][T27040] dump_stack+0x11d/0x181 [ 1365.563677][T27040] should_fail.cold+0xa/0x1a 11:04:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x25000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1365.568450][T27040] __should_failslab+0xee/0x130 [ 1365.573328][T27040] should_failslab+0x9/0x14 [ 1365.577946][T27040] kmem_cache_alloc+0x29/0x5d0 [ 1365.582794][T27040] ? fib6_node_lookup+0xed/0x120 [ 1365.588809][T27040] dst_alloc+0xad/0x149 [ 1365.592996][T27040] ip6_dst_alloc+0x3d/0x80 [ 1365.597483][T27040] ip6_rt_cache_alloc+0x12b/0x480 [ 1365.602537][T27040] ip6_pol_route+0x5d2/0x730 [ 1365.607237][T27040] ip6_pol_route_output+0x48/0x60 [ 1365.612950][T27040] fib6_rule_lookup+0x3d6/0x470 [ 1365.617899][T27040] ? ip6_pol_route_input+0x70/0x70 [ 1365.623147][T27040] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1365.628878][T27040] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1365.634366][T27040] ip6_route_output_flags_noref+0x16b/0x230 [ 1365.640471][T27040] ip6_route_output_flags+0x50/0x1a0 [ 1365.645776][T27040] ip6_dst_lookup_tail+0x25d/0xc50 [ 1365.650900][T27040] ? debug_smp_processor_id+0x43/0x137 [ 1365.656670][T27040] ? dst_destroy+0x210/0x210 [ 1365.662299][T27040] ? debug_smp_processor_id+0x43/0x137 [ 1365.667770][T27040] ? dst_destroy+0x210/0x210 [ 1365.672391][T27040] ? __call_rcu+0x153/0x390 [ 1365.677023][T27040] ip6_dst_lookup_flow+0x5c/0x110 [ 1365.682147][T27040] rawv6_sendmsg+0x9be/0x2340 [ 1365.686917][T27040] ? process_measurement+0x149/0x1190 [ 1365.692326][T27040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1365.698618][T27040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.704890][T27040] ? aa_label_sk_perm+0x89/0xe0 [ 1365.709750][T27040] ? aa_sk_perm+0x1d3/0x590 [ 1365.714319][T27040] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1365.720710][T27040] inet_sendmsg+0x6d/0x90 [ 1365.725146][T27040] ? inet_sendmsg+0x6d/0x90 [ 1365.729652][T27040] ? inet_send_prepare+0x200/0x200 [ 1365.735803][T27040] sock_sendmsg+0x9f/0xc0 [ 1365.740240][T27040] ____sys_sendmsg+0x212/0x4d0 [ 1365.745243][T27040] ___sys_sendmsg+0xb5/0x100 [ 1365.749903][T27040] ? __fget+0xb8/0x1d0 [ 1365.754005][T27040] ? __fget_light+0xaf/0x190 [ 1365.758606][T27040] ? __fdget+0x2c/0x40 [ 1365.762664][T27040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.768921][T27040] __sys_sendmmsg+0x123/0x350 [ 1365.773668][T27040] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1365.779907][T27040] ? fput_many+0xec/0x130 [ 1365.784279][T27040] ? fput+0x29/0x30 [ 1365.788090][T27040] ? ksys_write+0x145/0x1b0 [ 1365.792611][T27040] __x64_sys_sendmmsg+0x64/0x80 [ 1365.797499][T27040] do_syscall_64+0xcc/0x3a0 [ 1365.802108][T27040] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1365.808088][T27040] RIP: 0033:0x45aff9 [ 1365.811976][T27040] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.831666][T27040] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1365.840172][T27040] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1365.848437][T27040] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1365.856917][T27040] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1365.864986][T27040] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1365.872950][T27040] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000048 11:04:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xa00, @remote, 0x2}, 0x1c) 11:04:25 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000040)=0x3) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtclass={0x1514, 0x28, 0x100, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0x3, 0x8}, {0xd, 0xb}, {0xfff1, 0x10}}, [@tclass_kind_options=@c_fq_codel={0xd, 0x1, 'fq_codel\x00'}, @tclass_kind_options=@c_cake={0x9, 0x1, 'cake\x00'}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x34, 0x2, [@TCA_HTB_PARMS={0x30, 0x1, {{0x81, 0x0, 0x6, 0x0, 0x3}, {0x40, 0x2, 0x2, 0xffc1, 0x3, 0x5}, 0x0, 0x81, 0x1, 0x2, 0x3}}]}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x1490, 0x2, [@TCA_HTB_RTAB={0x404, 0x4, [0x100, 0xbe2f1b08, 0x6, 0xe4, 0xffffffff, 0x4, 0xab, 0x5, 0xe0e, 0x0, 0xffffffff, 0x5, 0x4, 0x1, 0x1, 0x7, 0x4d, 0x7f, 0x7fffffff, 0x1, 0x1000, 0x8001, 0xae2, 0xfffffff7, 0x6, 0x8, 0x8, 0x7, 0x0, 0x1, 0x10000, 0x20, 0x1, 0x80000000, 0x7c7, 0x1, 0xec, 0x6, 0xda4f, 0x100, 0x80000001, 0xffffffff, 0x4, 0x1, 0x2, 0x40, 0x800, 0x3ff, 0x5, 0x9, 0x401, 0x1, 0xcfac, 0x401, 0x8, 0x1ff, 0xa3, 0x200, 0x8, 0x7, 0xfffffffc, 0x3, 0x2b9, 0x6a, 0x100, 0x0, 0x400, 0x9, 0x10001, 0x1f66e150, 0x10001, 0xfffffffb, 0x20, 0x0, 0x80000000, 0x200, 0xfff, 0xffffffb3, 0x1, 0x80000000, 0x4, 0x6, 0xfffffffe, 0xffff, 0x3, 0xfffffffe, 0x7ff, 0x3, 0x7, 0x5, 0x80000001, 0x8, 0x4e1, 0x6, 0x800, 0x2, 0x9, 0xab8, 0x66, 0x7fff, 0x8, 0x2, 0x9, 0xfffffff8, 0xffffff01, 0x7, 0x0, 0x100, 0x4, 0x5, 0x1a, 0x18085780, 0xffffffff, 0xe7, 0x1, 0x7ff, 0x4, 0x70, 0x6, 0xffffffff, 0x9, 0x401, 0x9295, 0x1, 0x6, 0x401, 0xfffffff9, 0x7ff, 0x2, 0x3, 0x9a, 0x5, 0x0, 0x1, 0x0, 0x9, 0x6, 0x80000001, 0x7fffffff, 0x0, 0x4, 0x1, 0x7, 0x8001, 0xffffffff, 0x100, 0x1, 0xfffffff9, 0x1, 0x3, 0xfffffffe, 0x2ea, 0x0, 0x35, 0x0, 0x3, 0x8, 0x6319, 0x9, 0x3ff, 0x10000, 0xab, 0x3f, 0x2, 0x5, 0x7ff, 0x400, 0x1, 0x2, 0x7ff, 0x30, 0xd5, 0xfffffff9, 0x4, 0x200, 0x3, 0x1, 0x4, 0x9, 0xffff, 0x0, 0x180, 0x6, 0x3, 0x6c79, 0x7, 0x433f, 0x2, 0x3, 0x5, 0xe53, 0x5, 0xfffff94c, 0x4, 0x7ff, 0x5, 0x9d4f, 0x2b, 0x3ff, 0x3, 0x6, 0x6, 0x8, 0x5, 0x3, 0x3, 0x8, 0x3e, 0x9, 0x4, 0x1, 0x10001, 0xa1, 0x29b, 0x0, 0x5, 0x9, 0x2cf, 0x96e3, 0x9c5, 0x7f, 0x5, 0x800, 0x5, 0xc1800000, 0x5, 0x400, 0x782, 0x0, 0x3, 0x0, 0xfffffffa, 0x0, 0xf2ab, 0x5, 0x5, 0x3962, 0x59c5, 0x1000, 0xfef2, 0x4, 0x2, 0x9, 0x401, 0x7fffffff, 0x7, 0x5, 0x4, 0x7, 0x2, 0x8, 0x1, 0xfae, 0x7, 0x7ff, 0x8]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x6, 0x2, 0x9498, 0x81, 0x0, 0xffff}, {0x7f, 0x4cc71f30c5c6a084, 0x8, 0x9, 0x8, 0x2}, 0x6, 0x3, 0x4, 0x2, 0x2}}, @TCA_HTB_RTAB={0x404, 0x4, [0x9, 0x9, 0x6, 0x2, 0x10001, 0x401, 0x0, 0x4b5971d7, 0x1, 0x7, 0xffffffff, 0x10000, 0x0, 0x2, 0x85, 0x10001, 0x74e3, 0xcd0, 0x6a, 0x2, 0x1f, 0x8001, 0x20, 0x0, 0x1, 0x7fff, 0x10001, 0x9, 0x7, 0x2, 0x3, 0x81, 0x2f91, 0x3f, 0x400, 0x1, 0x1, 0xffff, 0x0, 0xfffff001, 0x8, 0x1, 0x8, 0x400, 0x1, 0x3ff, 0x8, 0xe3, 0x4, 0x6, 0x0, 0x8001, 0x10000, 0x5, 0x3, 0x7fff, 0x2, 0x9ed0, 0x200, 0x4, 0x6a, 0x5727, 0x3, 0x6, 0xff, 0x0, 0xfffffffe, 0x80000001, 0x7, 0x24, 0x9, 0x3, 0x5, 0x101, 0x2, 0x1, 0x3bc, 0x0, 0x3, 0x0, 0x7, 0x2, 0x8, 0x8, 0xfff, 0x80000000, 0x0, 0xc649, 0x6, 0xee, 0x400, 0x5, 0x5, 0x9, 0x0, 0xffff8000, 0x7fffffff, 0x8, 0xfffffff7, 0x5, 0xb0, 0x6, 0x7, 0x2, 0x2, 0x7ff, 0x8001, 0x8, 0x8, 0x2c60, 0x0, 0x1ff, 0x77a, 0x9, 0xffffff9d, 0x1, 0x3b, 0x5fd, 0xbbed, 0x2, 0x1ff, 0x6, 0x0, 0x9, 0x0, 0xffff7fff, 0x6, 0x2fb0, 0x7fffffff, 0x1000, 0xfffffffc, 0x3, 0x20, 0x101, 0x0, 0x81, 0x7, 0x4, 0xa8e6, 0x6, 0x7, 0x0, 0x7, 0x10000, 0x2, 0x0, 0x80, 0x6, 0x17, 0x8, 0x2, 0x46, 0xc4, 0x40, 0x7, 0xffffffff, 0x2, 0x63e5, 0xb7, 0x0, 0x1ff, 0x1, 0x8001, 0x7f, 0x6, 0xfffffc00, 0x200, 0x7fff, 0x8, 0x0, 0x8, 0x1200, 0x3, 0x3ff, 0x9, 0x81, 0x2, 0x8, 0x3, 0x3b8a, 0x37, 0x969, 0x2, 0x6, 0xab6, 0x1, 0x5, 0x7, 0x4, 0x7fff, 0x6, 0x9, 0x2000, 0x5, 0xbfc, 0x6, 0xfffffb8a, 0xb64f, 0x5, 0x4, 0x6, 0x1fa, 0x7, 0xe3, 0x1, 0x4, 0x3f, 0x1ff, 0x0, 0x101, 0x100, 0xdf6a, 0x8, 0x2, 0x0, 0x8, 0x1, 0x80, 0x200, 0xb05, 0xa9, 0x7fffffff, 0x4, 0x1, 0x92f, 0x581, 0x8, 0x1, 0x5, 0xf6, 0x3, 0x681, 0x53ca, 0x1ff, 0x1, 0x6, 0x6, 0x6, 0xffff, 0x1, 0x100, 0x2, 0x1000, 0x7, 0x5f5, 0x20, 0xa21a2fae, 0x3d08, 0x10001, 0xdce, 0x6, 0x0, 0x1ff, 0x3, 0x523, 0x5]}, @TCA_HTB_CEIL64={0xc, 0x7, 0xef9c}, @TCA_HTB_RTAB={0x404, 0x4, [0x7, 0x40, 0x4, 0x2, 0x3, 0x0, 0x88d3, 0x34d, 0x7, 0x17c, 0x0, 0x2, 0x2, 0x0, 0x80000001, 0xf6, 0xfff, 0x8, 0x8, 0x0, 0x9, 0x100, 0x6, 0x8000, 0x4e2, 0x1, 0x7, 0x40, 0x7ff, 0x4, 0x3, 0x0, 0x7, 0x1, 0x1000, 0x51, 0x3, 0x4, 0xe0, 0x1, 0x0, 0x0, 0x5, 0x10001, 0x7, 0x5, 0xfffffff7, 0x8, 0x1, 0xf467, 0x5, 0x10000, 0x5, 0x1, 0x4, 0x2, 0x54c, 0x7, 0xfff, 0x9, 0x80000001, 0x2, 0x2, 0x0, 0x3ff, 0x800, 0x0, 0x3, 0xfff, 0x7, 0x80000001, 0xbb7, 0x1, 0xe0e, 0x6, 0x1e, 0x800, 0xfff, 0x5, 0x40, 0x5, 0x4de, 0x8, 0x6, 0xffffff09, 0x8, 0x2, 0x400, 0x1000, 0x7c37, 0x5, 0x7, 0xffffff80, 0xba, 0x1ff, 0x80000001, 0x8, 0x7, 0x80000001, 0x6, 0x0, 0xfff, 0x9, 0x8001, 0x1, 0x4, 0xfffffeff, 0x629, 0x9c5, 0x2, 0x2, 0x400, 0x8001, 0x1, 0x2, 0xf26, 0x80000001, 0x7, 0xffffff81, 0x4, 0x4, 0x5, 0x4, 0x4, 0x800, 0x5, 0x4, 0x3e2, 0x7ff, 0x5, 0x0, 0x7fff, 0x8, 0x3, 0x2b2, 0x10001, 0xa21, 0x3, 0x9, 0x3, 0x1c0, 0x0, 0x3, 0x7fff, 0x2178, 0x1ff, 0x3db, 0xffffffec, 0x4, 0xb4, 0x1, 0x8, 0x7d, 0x2, 0x4, 0x3, 0x80000001, 0x5, 0x10001, 0x9, 0x9, 0x2, 0x1, 0x6, 0x3, 0x0, 0x10000, 0x7, 0x1, 0x401, 0xffff, 0xffffffc1, 0x3, 0x0, 0x7, 0x9, 0x8000, 0x7, 0x9, 0x2, 0x80000001, 0x4, 0x1832, 0x6, 0x7f, 0x0, 0x6, 0x7fffffff, 0x4, 0xff, 0x7fffffff, 0x1, 0x9, 0x12, 0x3, 0x400, 0x7, 0x9, 0x7, 0x7, 0x29, 0x80, 0x800, 0x7, 0x0, 0x6, 0x2, 0x7ff, 0xa1, 0x9, 0x4, 0x2, 0x23b, 0x1f, 0x9, 0x8, 0xbb1, 0x7ff, 0x6, 0x7ff, 0xff, 0x400, 0x8, 0x633, 0x8, 0x901d, 0x3, 0x7a, 0x1, 0x3ff, 0x1, 0x100, 0x6, 0x4, 0x0, 0xffffffff, 0x1f, 0x7, 0x8000, 0x101, 0x8001, 0x0, 0x0, 0x200, 0x3209b857, 0x0, 0x0, 0xfffffffa, 0x7ff, 0x2, 0x8000, 0x4, 0x8, 0x1, 0xfffffff9, 0xebd]}, @TCA_HTB_CEIL64={0xc, 0x7, 0x1}, @TCA_HTB_CTAB={0x404, 0x3, [0x97, 0x2, 0x3, 0x4, 0x2, 0xe4b1, 0x3, 0x5, 0xa1, 0x3ff, 0x9f3, 0x8, 0xfee, 0x7ff, 0xfffffffe, 0x0, 0x6, 0x0, 0x400, 0x1, 0x0, 0x6, 0x4, 0xff, 0x2, 0x50000, 0x96c, 0x2198, 0x9, 0x3, 0x20080000, 0x8, 0x5, 0x1, 0x2, 0x81, 0xfffffff7, 0x101, 0x401, 0x7fffffff, 0x8, 0x0, 0x8, 0x9, 0x40, 0x7f, 0x0, 0x80000001, 0x101, 0x800, 0x100, 0x88b, 0x57a, 0x1, 0x3, 0xfa, 0x100, 0x1ff, 0x3, 0xfffffff9, 0x4, 0x1f, 0x40, 0xfff, 0x8, 0x1, 0x5, 0x1, 0x3, 0x6b, 0xffffffe1, 0x8, 0x9, 0xa3c, 0x7f, 0x5, 0xffffff81, 0x0, 0x80000000, 0x8, 0x6, 0x91, 0x81, 0x3f, 0x624c, 0x8c, 0x5, 0x1, 0x7fffffff, 0x2, 0x81, 0xffff, 0x8, 0x101, 0x3a9f, 0x3f, 0x8000, 0x8ed0, 0x1, 0x6, 0x6, 0x7f4, 0x20, 0x5, 0x8001, 0x7f, 0x4, 0xbc, 0x8, 0x3, 0x1ff, 0x9, 0x9, 0xa49, 0x5, 0x3, 0xffffffff, 0x870, 0x100, 0x2, 0x7, 0x40, 0x3, 0x8001, 0x1f, 0x4, 0x4, 0x6, 0x8, 0x7fffffff, 0xfffffffc, 0x5, 0x4, 0x8000, 0x7f, 0x95, 0x1f, 0x3, 0x0, 0x5, 0x81, 0x6, 0x400, 0x4753, 0xba5, 0x7, 0x6, 0x1f, 0x9082, 0x80000000, 0x1, 0x9ab, 0x7ff, 0x0, 0x3b16, 0xf701, 0x3, 0x5, 0x8, 0x7f, 0xb3, 0x7fff, 0x5, 0x7f, 0x401, 0x80, 0x7, 0x1, 0xfff, 0x1, 0x6, 0x8, 0xea88, 0x2, 0x3, 0x7, 0x4, 0x40, 0x10001, 0x2, 0x5, 0x1, 0x7, 0x0, 0x9, 0x1f, 0xda, 0x10001, 0x6, 0xfffffffc, 0x3, 0xffff, 0x0, 0x2, 0x20, 0x1, 0x9, 0x7ff, 0x7fffffff, 0x10001, 0x7ff, 0x400, 0xfffffff8, 0xfffffffe, 0x1ff, 0xffffffff, 0x80000001, 0x1f, 0x600, 0x1, 0x1f0000, 0x0, 0x0, 0x28, 0x1, 0x7, 0x2, 0x7f, 0x1c5242f, 0xb6e, 0x3, 0xffffffff, 0x5, 0x4, 0x6, 0x200, 0x57, 0x9, 0x1000, 0x3, 0x3, 0x3, 0x3, 0x71b205c0, 0x3f, 0x4, 0x0, 0x80, 0x1, 0x1, 0x9, 0x1, 0xffffffff, 0x1, 0x2, 0x3, 0x3, 0x6b26, 0x3, 0xc39, 0x3, 0x7, 0x3, 0x7, 0x81, 0x9]}, @TCA_HTB_RTAB={0x404, 0x4, [0x6, 0x65dbae71, 0x460ce8cd, 0x7, 0x9, 0x1, 0x100, 0x0, 0x9, 0x0, 0x8000, 0x1, 0x20, 0x7b5f, 0x3f, 0x7, 0x3, 0x6, 0x7f, 0x40, 0x0, 0x5, 0x0, 0x4, 0x3, 0x8, 0x8, 0x0, 0x7ff, 0x0, 0x101, 0x5, 0xdc2, 0x1000, 0x1, 0x6, 0x8, 0x1f, 0x3, 0x0, 0x59, 0xffffffff, 0x3ff, 0x7, 0xf2, 0x86, 0x6, 0x899, 0x3, 0xe40, 0xfffffffb, 0x3, 0x1, 0x2, 0x2, 0x80000001, 0x258, 0x1, 0x6, 0xcaaf, 0x6, 0xbc, 0x200, 0x1, 0x2, 0xa6f3, 0x5, 0xffffffff, 0xfffffffe, 0x80000001, 0x4d, 0x4, 0xff, 0x3, 0x3, 0x3, 0x80000001, 0x5, 0x1, 0x0, 0x609a, 0x400, 0x100, 0x6, 0x3, 0x4, 0x7, 0x1ff, 0x9, 0x7, 0x6, 0x5, 0x621c, 0x5, 0x36f, 0x10001, 0x2, 0x7, 0x7f, 0x5, 0x1, 0x80000000, 0x2, 0x8, 0x1, 0x2, 0xfd9d, 0x0, 0x80, 0x95d, 0x4, 0x1, 0x5, 0x8, 0x5, 0x1, 0x8000, 0x4, 0xffff, 0xf3, 0xffffffee, 0x6, 0x2, 0x2, 0x0, 0x8001, 0x3f80000, 0x2, 0xbca8, 0x0, 0x401, 0x80000000, 0x1, 0x1c, 0xc649, 0x1, 0x7, 0x7, 0x70, 0x2f, 0x3, 0xfffffffe, 0x6448, 0x194, 0x64afe4f3, 0x3f, 0x3, 0xfff, 0x1ff, 0xa327, 0xffffffff, 0x8a, 0x1, 0xd86, 0x3c, 0x80000000, 0x1, 0x0, 0x7, 0x4, 0x3, 0xffffffff, 0x3, 0x7, 0x0, 0xad, 0xbc6, 0x7fff, 0x2, 0x80000000, 0x2, 0x3, 0x7, 0x4, 0x8001, 0x4, 0x6e4c, 0x1, 0x204d, 0x9, 0x81, 0x7, 0x120000, 0x5, 0x100, 0x1, 0x1, 0x7fffffff, 0xbeb3, 0x3, 0x3f, 0x7, 0x6, 0x1, 0x800, 0x9, 0x0, 0x7ea8, 0x400, 0x10000, 0x100, 0x81, 0x30, 0x7, 0x5, 0x5, 0x1, 0x81, 0x8, 0x980, 0x9879, 0x9, 0xfff, 0x8, 0x2, 0x3, 0x5, 0x0, 0x94cf, 0x80, 0xfff, 0x7ff, 0xff, 0x9, 0x4, 0x7, 0x8000000, 0xffffffff, 0x2, 0xff, 0x7, 0xccdd, 0x7, 0x10000, 0x3ff, 0x3, 0x1, 0x10000, 0xc1, 0x4, 0x6, 0x6, 0x6, 0xba, 0x20, 0x2e, 0x5842, 0x144, 0x2, 0xffff, 0x9, 0x20, 0x7, 0xd884, 0x80000001, 0x20]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x7, 0x1, 0x2aa, 0x12c0, 0x7, 0x7fffffff}, {0x7f, 0x2492017247f28839, 0x3, 0x3, 0x8, 0x4}, 0x80000001, 0x473, 0x7, 0x8, 0x6}}]}}]}, 0x1514}}, 0x0) fcntl$getflags(r3, 0x1) 11:04:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1000000000000000) 11:04:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x28000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x300, 0x0, 0x10000000280}) 11:04:25 executing program 3 (fault-call:10 fault-nth:73): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x500, 0x0, 0x10000000280}) 11:04:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x29da0a00, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1100000000000000) 11:04:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x600, 0x0, 0x10000000280}) [ 1366.567635][T27077] FAULT_INJECTION: forcing a failure. [ 1366.567635][T27077] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.580362][T27077] CPU: 1 PID: 27077 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1366.589140][T27077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.599193][T27077] Call Trace: [ 1366.602569][T27077] dump_stack+0x11d/0x181 [ 1366.606909][T27077] should_fail.cold+0xa/0x1a [ 1366.611628][T27077] __should_failslab+0xee/0x130 [ 1366.616545][T27077] should_failslab+0x9/0x14 [ 1366.621053][T27077] kmem_cache_alloc+0x29/0x5d0 [ 1366.625998][T27077] ? fib6_node_lookup+0xed/0x120 [ 1366.630936][T27077] dst_alloc+0xad/0x149 [ 1366.635111][T27077] ip6_dst_alloc+0x3d/0x80 [ 1366.639640][T27077] ip6_rt_cache_alloc+0x12b/0x480 [ 1366.644704][T27077] ip6_pol_route+0x5d2/0x730 [ 1366.649312][T27077] ip6_pol_route_output+0x48/0x60 [ 1366.654348][T27077] fib6_rule_lookup+0x3d6/0x470 [ 1366.659302][T27077] ? ip6_pol_route_input+0x70/0x70 11:04:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1366.664443][T27077] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1366.670184][T27077] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1366.675461][T27077] ip6_route_output_flags_noref+0x16b/0x230 [ 1366.681367][T27077] ip6_route_output_flags+0x50/0x1a0 [ 1366.686665][T27077] ip6_dst_lookup_tail+0x25d/0xc50 [ 1366.691817][T27077] ? debug_smp_processor_id+0x43/0x137 [ 1366.697269][T27077] ? dst_destroy+0x210/0x210 [ 1366.701852][T27077] ? debug_smp_processor_id+0x43/0x137 [ 1366.707372][T27077] ? dst_destroy+0x210/0x210 [ 1366.711955][T27077] ? __call_rcu+0x153/0x390 [ 1366.716456][T27077] ip6_dst_lookup_flow+0x5c/0x110 [ 1366.721479][T27077] rawv6_sendmsg+0x9be/0x2340 [ 1366.726183][T27077] ? process_measurement+0x149/0x1190 [ 1366.731618][T27077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1366.737882][T27077] ? aa_label_sk_perm+0x89/0xe0 [ 1366.742812][T27077] ? aa_sk_perm+0x1d3/0x590 [ 1366.747331][T27077] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1366.753866][T27077] inet_sendmsg+0x6d/0x90 [ 1366.758287][T27077] ? inet_sendmsg+0x6d/0x90 [ 1366.762867][T27077] ? inet_send_prepare+0x200/0x200 [ 1366.768090][T27077] sock_sendmsg+0x9f/0xc0 [ 1366.772455][T27077] ____sys_sendmsg+0x212/0x4d0 [ 1366.777238][T27077] ___sys_sendmsg+0xb5/0x100 [ 1366.781821][T27077] ? __fget+0xb8/0x1d0 [ 1366.785929][T27077] ? __fget_light+0xaf/0x190 [ 1366.790590][T27077] ? __fdget+0x2c/0x40 [ 1366.794824][T27077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1366.801088][T27077] __sys_sendmmsg+0x123/0x350 [ 1366.805781][T27077] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1366.812021][T27077] ? fput_many+0xec/0x130 [ 1366.816352][T27077] ? fput+0x29/0x30 [ 1366.820159][T27077] ? ksys_write+0x145/0x1b0 [ 1366.824688][T27077] __x64_sys_sendmmsg+0x64/0x80 [ 1366.829590][T27077] do_syscall_64+0xcc/0x3a0 [ 1366.834108][T27077] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1366.840047][T27077] RIP: 0033:0x45aff9 [ 1366.844025][T27077] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1366.863789][T27077] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1366.872459][T27077] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1366.880520][T27077] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1366.888587][T27077] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1366.896639][T27077] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1366.904629][T27077] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000049 11:04:26 executing program 0: open$dir(&(0x7f00000000c0)='./file0\x00', 0x8c96881d360ffc66, 0x0) mount$9p_xen(&(0x7f0000000340)='syz\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x180000, &(0x7f0000000400)={'trans=xen,', {[{@mmap='mmap'}, {@cache_fscache='cache=fscache'}, {@aname={'aname', 0x3d, 'wlan1!@%}{'}}, {@access_user='access=user'}, {@version_9p2000='version=9p2000'}], [{@obj_type={'obj_type', 0x3d, '/dev/nvram\x00'}}]}}) r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000000000)="2fda3722e0257c315ee215aa2fafc55f1b0cc360ea1c49e2f97199070353172712790d4cfebec211cf11d64c57e6fb0655d75f493234a22798520e4f70ac0c741f92adc60000000000", 0xffffffffffffff7c) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0xa000, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000200)) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video37\x00', 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0xfffffffffffffd68, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x4010, r2, 0xffffd000) openat$audio1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio1\x00', 0x4000, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1367.088271][ T27] audit: type=1800 audit(1579259066.123:54): pid=27088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17258 res=0 [ 1367.128191][T27088] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. 11:04:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xe00, @remote, 0x2}, 0x1c) 11:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1200000000000000) 11:04:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x700, 0x0, 0x10000000280}) 11:04:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x2d000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1367.163238][T27088] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 11:04:26 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xc8, 0x80000) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xc4, 0x3, 0x8, 0x201, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x800}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x3f8000}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x85}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xdada}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x2015}, 0x8000) 11:04:26 executing program 3 (fault-call:10 fault-nth:74): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1300000000000000) 11:04:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0xb00, 0x0, 0x10000000280}) 11:04:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x30000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x1400000000000000) [ 1367.640676][T27118] FAULT_INJECTION: forcing a failure. [ 1367.640676][T27118] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.653622][T27118] CPU: 0 PID: 27118 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1367.662907][T27118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.673055][T27118] Call Trace: [ 1367.676352][T27118] dump_stack+0x11d/0x181 [ 1367.680691][T27118] should_fail.cold+0xa/0x1a [ 1367.685297][T27118] __should_failslab+0xee/0x130 [ 1367.690298][T27118] should_failslab+0x9/0x14 [ 1367.694826][T27118] kmem_cache_alloc+0x29/0x5d0 [ 1367.699601][T27118] ? fib6_node_lookup+0xed/0x120 [ 1367.704551][T27118] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1367.710272][T27118] ? ip6_dst_gc+0x1c4/0x220 [ 1367.714787][T27118] dst_alloc+0xad/0x149 [ 1367.718958][T27118] ip6_dst_alloc+0x3d/0x80 [ 1367.723444][T27118] ip6_rt_cache_alloc+0x12b/0x480 [ 1367.728584][T27118] ip6_pol_route+0x5d2/0x730 [ 1367.733213][T27118] ip6_pol_route_output+0x48/0x60 [ 1367.738259][T27118] fib6_rule_lookup+0x3d6/0x470 [ 1367.743111][T27118] ? ip6_pol_route_input+0x70/0x70 [ 1367.748344][T27118] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1367.754085][T27118] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1367.759303][T27118] ip6_route_output_flags_noref+0x16b/0x230 [ 1367.765197][T27118] ip6_route_output_flags+0x50/0x1a0 [ 1367.770513][T27118] ip6_dst_lookup_tail+0x25d/0xc50 [ 1367.775705][T27118] ? debug_smp_processor_id+0x43/0x137 [ 1367.781177][T27118] ? dst_destroy+0x210/0x210 [ 1367.785769][T27118] ? debug_smp_processor_id+0x43/0x137 [ 1367.791473][T27118] ? dst_destroy+0x210/0x210 [ 1367.796263][T27118] ? __call_rcu+0x153/0x390 [ 1367.800776][T27118] ip6_dst_lookup_flow+0x5c/0x110 [ 1367.805822][T27118] rawv6_sendmsg+0x9be/0x2340 [ 1367.810522][T27118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.816796][T27118] ? debug_smp_processor_id+0x43/0x137 [ 1367.822274][T27118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.828740][T27118] ? aa_label_sk_perm+0x89/0xe0 [ 1367.833703][T27118] ? aa_sk_perm+0x1d3/0x590 [ 1367.838227][T27118] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1367.844618][T27118] inet_sendmsg+0x6d/0x90 [ 1367.849052][T27118] ? inet_sendmsg+0x6d/0x90 [ 1367.853854][T27118] ? inet_send_prepare+0x200/0x200 [ 1367.859008][T27118] sock_sendmsg+0x9f/0xc0 [ 1367.863491][T27118] ____sys_sendmsg+0x212/0x4d0 [ 1367.868302][T27118] ___sys_sendmsg+0xb5/0x100 [ 1367.872908][T27118] ? __fget+0xb8/0x1d0 [ 1367.877075][T27118] ? __fget_light+0xaf/0x190 [ 1367.881720][T27118] ? __fdget+0x2c/0x40 [ 1367.885800][T27118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.892125][T27118] __sys_sendmmsg+0x123/0x350 [ 1367.896949][T27118] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1367.903195][T27118] ? fput_many+0xec/0x130 [ 1367.907533][T27118] ? fput+0x29/0x30 [ 1367.911353][T27118] ? ksys_write+0x145/0x1b0 [ 1367.915873][T27118] __x64_sys_sendmmsg+0x64/0x80 [ 1367.920736][T27118] do_syscall_64+0xcc/0x3a0 [ 1367.925298][T27118] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1367.931193][T27118] RIP: 0033:0x45aff9 [ 1367.935216][T27118] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1367.954961][T27118] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1367.963440][T27118] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1367.971495][T27118] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1367.979516][T27118] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:04:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x3f00, 0x0, 0x10000000280}) 11:04:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x32000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1367.987652][T27118] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1367.995641][T27118] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000004a 11:04:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4000, 0x0, 0x10000000280}) 11:04:27 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x800004, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x4e20, 0xe587, @empty, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r4}}, 0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x34000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x1802, @remote, 0x2}, 0x1c) 11:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x2000000000000000) 11:04:27 executing program 3 (fault-call:10 fault-nth:75): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4800, 0x0, 0x10000000280}) 11:04:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x35000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x2403000000000000) 11:04:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4c00, 0x0, 0x10000000280}) [ 1368.651691][T27162] FAULT_INJECTION: forcing a failure. [ 1368.651691][T27162] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.664452][T27162] CPU: 1 PID: 27162 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1368.673162][T27162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.683314][T27162] Call Trace: [ 1368.686633][T27162] dump_stack+0x11d/0x181 [ 1368.691089][T27162] should_fail.cold+0xa/0x1a [ 1368.695692][T27162] __should_failslab+0xee/0x130 [ 1368.700621][T27162] should_failslab+0x9/0x14 [ 1368.705141][T27162] kmem_cache_alloc+0x29/0x5d0 [ 1368.709917][T27162] ? fib6_node_lookup+0xed/0x120 [ 1368.714896][T27162] dst_alloc+0xad/0x149 [ 1368.719086][T27162] ip6_dst_alloc+0x3d/0x80 [ 1368.723537][T27162] ip6_rt_cache_alloc+0x12b/0x480 [ 1368.728640][T27162] ip6_pol_route+0x5d2/0x730 [ 1368.733246][T27162] ip6_pol_route_output+0x48/0x60 [ 1368.738298][T27162] fib6_rule_lookup+0x3d6/0x470 [ 1368.743155][T27162] ? ip6_pol_route_input+0x70/0x70 [ 1368.748278][T27162] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1368.754106][T27162] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1368.759356][T27162] ip6_route_output_flags_noref+0x16b/0x230 [ 1368.765265][T27162] ip6_route_output_flags+0x50/0x1a0 [ 1368.770565][T27162] ip6_dst_lookup_tail+0x25d/0xc50 [ 1368.775685][T27162] ? debug_smp_processor_id+0x43/0x137 [ 1368.781149][T27162] ? dst_destroy+0x210/0x210 [ 1368.785802][T27162] ? debug_smp_processor_id+0x43/0x137 [ 1368.791270][T27162] ? dst_destroy+0x210/0x210 [ 1368.795874][T27162] ? __call_rcu+0x153/0x390 [ 1368.800400][T27162] ip6_dst_lookup_flow+0x5c/0x110 [ 1368.805504][T27162] rawv6_sendmsg+0x9be/0x2340 [ 1368.810204][T27162] ? process_measurement+0x149/0x1190 [ 1368.815705][T27162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1368.821961][T27162] ? debug_smp_processor_id+0x43/0x137 [ 1368.827432][T27162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1368.833733][T27162] ? aa_label_sk_perm+0x89/0xe0 [ 1368.838586][T27162] ? aa_sk_perm+0x1d3/0x590 [ 1368.843161][T27162] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1368.849601][T27162] inet_sendmsg+0x6d/0x90 [ 1368.853958][T27162] ? inet_sendmsg+0x6d/0x90 [ 1368.858461][T27162] ? inet_send_prepare+0x200/0x200 [ 1368.863667][T27162] sock_sendmsg+0x9f/0xc0 [ 1368.867988][T27162] ____sys_sendmsg+0x212/0x4d0 [ 1368.872750][T27162] ___sys_sendmsg+0xb5/0x100 [ 1368.877335][T27162] ? __fget+0xb8/0x1d0 [ 1368.881490][T27162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1368.887728][T27162] ? debug_smp_processor_id+0x43/0x137 [ 1368.893189][T27162] ? delay_tsc+0x8f/0xc0 [ 1368.897447][T27162] ? __const_udelay+0x36/0x40 [ 1368.902250][T27162] ? __udelay+0x10/0x20 [ 1368.906442][T27162] __sys_sendmmsg+0x123/0x350 [ 1368.911175][T27162] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1368.917658][T27162] ? fput_many+0xec/0x130 [ 1368.922104][T27162] ? fput+0x29/0x30 [ 1368.925903][T27162] ? ksys_write+0x145/0x1b0 [ 1368.930644][T27162] __x64_sys_sendmmsg+0x64/0x80 [ 1368.935637][T27162] do_syscall_64+0xcc/0x3a0 [ 1368.940150][T27162] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1368.946135][T27162] RIP: 0033:0x45aff9 [ 1368.950078][T27162] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1368.969776][T27162] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1368.978205][T27162] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1368.986190][T27162] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1368.994222][T27162] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:04:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x3000000000000000) [ 1369.002300][T27162] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1369.010359][T27162] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000004b 11:04:28 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000900)='/dev/vcsa#\x00', 0x10000, 0x648800) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000b40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f0000000b00)={&(0x7f0000000980)={0x150, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x99de48ae24b1079f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x28}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1a}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9b}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x73}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6a}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x2d}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x32}}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x240180c0}, 0x800) write(r0, &(0x7f0000002000)='/', 0x1) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000200)={r4, @in={{0x2, 0x4e24, @local}}}, 0x84) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) 11:04:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3d000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x4000000000000000) 11:04:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x2000, @remote, 0x2}, 0x1c) 11:04:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x6800, 0x0, 0x10000000280}) 11:04:28 executing program 3 (fault-call:10 fault-nth:76): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x3f000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x6000000000000000) 11:04:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x6c00, 0x0, 0x10000000280}) [ 1369.742568][T27200] FAULT_INJECTION: forcing a failure. [ 1369.742568][T27200] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.755254][T27200] CPU: 0 PID: 27200 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1369.764293][T27200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.774360][T27200] Call Trace: [ 1369.777660][T27200] dump_stack+0x11d/0x181 [ 1369.782075][T27200] should_fail.cold+0xa/0x1a [ 1369.786780][T27200] __should_failslab+0xee/0x130 [ 1369.791648][T27200] should_failslab+0x9/0x14 [ 1369.796296][T27200] kmem_cache_alloc+0x29/0x5d0 [ 1369.801217][T27200] ? fib6_node_lookup+0xed/0x120 [ 1369.806301][T27200] dst_alloc+0xad/0x149 [ 1369.810479][T27200] ip6_dst_alloc+0x3d/0x80 [ 1369.814906][T27200] ip6_rt_cache_alloc+0x12b/0x480 [ 1369.819994][T27200] ip6_pol_route+0x5d2/0x730 [ 1369.824611][T27200] ip6_pol_route_output+0x48/0x60 [ 1369.829662][T27200] fib6_rule_lookup+0x3d6/0x470 [ 1369.834619][T27200] ? ip6_pol_route_input+0x70/0x70 [ 1369.839760][T27200] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1369.845493][T27200] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1369.850720][T27200] ip6_route_output_flags_noref+0x16b/0x230 [ 1369.856633][T27200] ip6_route_output_flags+0x50/0x1a0 [ 1369.862037][T27200] ip6_dst_lookup_tail+0x25d/0xc50 [ 1369.867328][T27200] ? debug_smp_processor_id+0x43/0x137 [ 1369.872802][T27200] ? dst_destroy+0x210/0x210 [ 1369.877666][T27200] ? debug_smp_processor_id+0x43/0x137 [ 1369.883134][T27200] ? dst_destroy+0x210/0x210 [ 1369.887741][T27200] ? __call_rcu+0x153/0x390 11:04:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x6558000000000000) 11:04:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x7400, 0x0, 0x10000000280}) [ 1369.892264][T27200] ip6_dst_lookup_flow+0x5c/0x110 [ 1369.897322][T27200] rawv6_sendmsg+0x9be/0x2340 [ 1369.902023][T27200] ? __const_udelay+0x36/0x40 [ 1369.906713][T27200] ? __udelay+0x10/0x20 [ 1369.910881][T27200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.917128][T27200] ? aa_label_sk_perm+0x89/0xe0 [ 1369.921999][T27200] ? aa_sk_perm+0x1d3/0x590 [ 1369.926519][T27200] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1369.932933][T27200] inet_sendmsg+0x6d/0x90 [ 1369.937408][T27200] ? inet_sendmsg+0x6d/0x90 [ 1369.941964][T27200] ? inet_send_prepare+0x200/0x200 [ 1369.947283][T27200] sock_sendmsg+0x9f/0xc0 [ 1369.951715][T27200] ____sys_sendmsg+0x212/0x4d0 [ 1369.956504][T27200] ___sys_sendmsg+0xb5/0x100 [ 1369.961113][T27200] ? __fget+0xb8/0x1d0 [ 1369.965393][T27200] ? __fget_light+0xaf/0x190 [ 1369.970098][T27200] ? __fdget+0x2c/0x40 [ 1369.974244][T27200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1369.980517][T27200] __sys_sendmmsg+0x123/0x350 11:04:29 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000200)="c5db9510f42bbf9d24ae89934de23ad19f98624c3cb6121ed1e808c87712e2de821777116ac5d0299072e4c62734c7fabf676bb257ed8c187249b5111fa1ced52050f2840265121edca8622769db6f1598f8322d719fa493a5d53e6fcb82e85e26a7b34776ed2ef44101b300af7daf353c10c71f4cf1ad226bdb733e79cddc053b96f98777c5a1b71065c9e3b257b7711e71fd4c56bd804e677f5f3d1f289448cd16cc5c132546cc9bfc4d2492180a", 0xaf}, {&(0x7f00000002c0)="01d2212a8c4adc9ae3f409c62e8f5d87d63a137a82f68cd3d6655457c20d3aa157b47022e46748a5e769a508901592c79871ddc089d281d82b3cb9bdc0d94a3f2fc2b84ba894a1ff3e72e38c71e82c43ee7262455b878f77a05dec4d28abf6b01fb5fb8019279d6f7dc66ac94cc5c94459cd66bc44eaf5b761dc3717ab856c59c70ea88fe3", 0x85}, {&(0x7f0000000000)="b504537ef2b1279af35a72a401339d49da5051b18814b890fd7c7d33f75bfd46e22c0ad7f069607d32d24f656072e97d7b77749d290aecdb242c394d26dd869bfa50fd", 0x43}, {&(0x7f0000000380)="6771f0ab357ed045d8be4d12cd8e26079e458d55d976d8a7c1313a6b28d6dd37706ec3bb742f4b4fe6d7bbc7aed864569c6305e0896742ec424118c3e3fc2847f9b8a9c95fac7e82cd40e60372aafc5f3657a27f1fd83b7951c0b08ff83bdfe0bdb89a600f4a4881d2f7a9ff026fb6966e0980de6caea0045e99e990ae21e987f98f39b4fd282ec7343399a2e48570b757b03538ab76d4953809387ce2d5f83a12a5dba42c2ee5cdfebb4983bc7729d0e628a9d2c1e51a93eeb7c5876c99ada09deab70f19833f60c6a64735065b10b392b4b8ebcd8ea53fc921f97a7a5f614eef4da0f1a83cd11c0a", 0xe9}, {&(0x7f00000000c0)="0f44a88f01c3c96f886284315bf146f289577cab2263ec8ef20a76b7506a622184c4a83150d2244799c296428e8ed0", 0x2f}], 0x5, 0x1) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1369.985215][T27200] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1369.996072][T27200] ? fput_many+0xec/0x130 [ 1370.000600][T27200] ? fput+0x29/0x30 [ 1370.004418][T27200] ? ksys_write+0x145/0x1b0 [ 1370.008959][T27200] __x64_sys_sendmmsg+0x64/0x80 [ 1370.013833][T27200] do_syscall_64+0xcc/0x3a0 [ 1370.018481][T27200] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1370.024403][T27200] RIP: 0033:0x45aff9 [ 1370.028550][T27200] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1370.048279][T27200] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1370.056776][T27200] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1370.064807][T27200] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1370.072790][T27200] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1370.080782][T27200] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x40000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1370.088757][T27200] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000004c 11:04:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x8100000000000000) 11:04:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x7a00, 0x0, 0x10000000280}) 11:04:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x2ee0, @remote, 0x2}, 0x1c) 11:04:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x44000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:29 executing program 3 (fault-call:10 fault-nth:77): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x8701000000000000) 11:04:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0xff00, 0x0, 0x10000000280}) 11:04:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x45000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x88a8ffff00000000) 11:04:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x1000000, 0x0, 0x10000000280}) [ 1370.769987][T27246] FAULT_INJECTION: forcing a failure. [ 1370.769987][T27246] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.782757][T27246] CPU: 1 PID: 27246 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1370.791434][T27246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.801552][T27246] Call Trace: [ 1370.804844][T27246] dump_stack+0x11d/0x181 [ 1370.809277][T27246] should_fail.cold+0xa/0x1a [ 1370.813889][T27246] __should_failslab+0xee/0x130 [ 1370.818806][T27246] should_failslab+0x9/0x14 [ 1370.823327][T27246] kmem_cache_alloc+0x29/0x5d0 [ 1370.828114][T27246] ? fib6_node_lookup+0xed/0x120 [ 1370.833062][T27246] dst_alloc+0xad/0x149 [ 1370.837378][T27246] ip6_dst_alloc+0x3d/0x80 [ 1370.841823][T27246] ip6_rt_cache_alloc+0x12b/0x480 [ 1370.846932][T27246] ip6_pol_route+0x5d2/0x730 [ 1370.851538][T27246] ? __const_udelay+0x36/0x40 [ 1370.856341][T27246] ip6_pol_route_output+0x48/0x60 [ 1370.861382][T27246] fib6_rule_lookup+0x3d6/0x470 [ 1370.866253][T27246] ? ip6_pol_route_input+0x70/0x70 [ 1370.871391][T27246] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1370.877137][T27246] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1370.882364][T27246] ip6_route_output_flags_noref+0x16b/0x230 [ 1370.888278][T27246] ip6_route_output_flags+0x50/0x1a0 [ 1370.893575][T27246] ip6_dst_lookup_tail+0x25d/0xc50 [ 1370.898694][T27246] ? debug_smp_processor_id+0x43/0x137 [ 1370.904153][T27246] ? dst_destroy+0x210/0x210 [ 1370.908750][T27246] ? debug_smp_processor_id+0x43/0x137 [ 1370.914252][T27246] ? dst_destroy+0x210/0x210 [ 1370.918851][T27246] ? __call_rcu+0x153/0x390 [ 1370.923369][T27246] ip6_dst_lookup_flow+0x5c/0x110 [ 1370.928421][T27246] rawv6_sendmsg+0x9be/0x2340 [ 1370.933178][T27246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1370.939468][T27246] ? debug_smp_processor_id+0x43/0x137 [ 1370.945043][T27246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1370.951320][T27246] ? aa_label_sk_perm+0x89/0xe0 [ 1370.956170][T27246] ? aa_sk_perm+0x1d3/0x590 [ 1370.960703][T27246] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1370.967044][T27246] inet_sendmsg+0x6d/0x90 [ 1370.971507][T27246] ? inet_sendmsg+0x6d/0x90 [ 1370.976068][T27246] ? inet_send_prepare+0x200/0x200 [ 1370.981205][T27246] sock_sendmsg+0x9f/0xc0 [ 1370.985552][T27246] ____sys_sendmsg+0x212/0x4d0 [ 1370.990362][T27246] ___sys_sendmsg+0xb5/0x100 [ 1370.994948][T27246] ? __fget+0xb8/0x1d0 [ 1370.999136][T27246] ? __fget_light+0xaf/0x190 [ 1371.003750][T27246] ? __fdget+0x2c/0x40 [ 1371.007847][T27246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1371.014133][T27246] __sys_sendmmsg+0x123/0x350 [ 1371.018831][T27246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1371.025082][T27246] ? fput_many+0xec/0x130 [ 1371.029473][T27246] ? fput+0x29/0x30 [ 1371.033466][T27246] ? ksys_write+0x145/0x1b0 [ 1371.037983][T27246] __x64_sys_sendmmsg+0x64/0x80 [ 1371.042990][T27246] do_syscall_64+0xcc/0x3a0 [ 1371.047491][T27246] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1371.053551][T27246] RIP: 0033:0x45aff9 [ 1371.057961][T27246] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1371.077568][T27246] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1371.086068][T27246] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1371.094045][T27246] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1371.102091][T27246] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1371.110082][T27246] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1371.118091][T27246] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000004d 11:04:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x48000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x2000000, 0x0, 0x10000000280}) 11:04:30 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000040)={0x0, 0x81, 0x2, [], &(0x7f0000000000)=0x9}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x9effffff00000000) 11:04:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x3f00, @remote, 0x2}, 0x1c) 11:04:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:30 executing program 3 (fault-call:10 fault-nth:78): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x3000000, 0x0, 0x10000000280}) 11:04:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xf0ffffff00000000) 11:04:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x4d000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4000000, 0x0, 0x10000000280}) [ 1371.794267][T27286] FAULT_INJECTION: forcing a failure. [ 1371.794267][T27286] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.807865][T27286] CPU: 1 PID: 27286 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1371.816601][T27286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.826726][T27286] Call Trace: [ 1371.830031][T27286] dump_stack+0x11d/0x181 [ 1371.834376][T27286] should_fail.cold+0xa/0x1a [ 1371.839104][T27286] __should_failslab+0xee/0x130 [ 1371.844083][T27286] should_failslab+0x9/0x14 [ 1371.848602][T27286] kmem_cache_alloc+0x29/0x5d0 [ 1371.853380][T27286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1371.859112][T27286] ? ip6_dst_gc+0x1c4/0x220 [ 1371.863927][T27286] dst_alloc+0xad/0x149 [ 1371.868100][T27286] ip6_dst_alloc+0x3d/0x80 [ 1371.872536][T27286] ip6_rt_cache_alloc+0x12b/0x480 [ 1371.877659][T27286] ip6_pol_route+0x5d2/0x730 [ 1371.882258][T27286] ? __const_udelay+0x36/0x40 [ 1371.887022][T27286] ip6_pol_route_output+0x48/0x60 [ 1371.892063][T27286] fib6_rule_lookup+0x3d6/0x470 [ 1371.897135][T27286] ? ip6_pol_route_input+0x70/0x70 [ 1371.902322][T27286] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1371.908054][T27286] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1371.913276][T27286] ip6_route_output_flags_noref+0x16b/0x230 [ 1371.919253][T27286] ip6_route_output_flags+0x50/0x1a0 [ 1371.924578][T27286] ip6_dst_lookup_tail+0x25d/0xc50 [ 1371.929703][T27286] ? debug_smp_processor_id+0x43/0x137 [ 1371.935172][T27286] ? dst_destroy+0x210/0x210 11:04:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xffffff7f00000000) [ 1371.939774][T27286] ? debug_smp_processor_id+0x43/0x137 [ 1371.945265][T27286] ? dst_destroy+0x210/0x210 [ 1371.949939][T27286] ? __call_rcu+0x153/0x390 [ 1371.954468][T27286] ip6_dst_lookup_flow+0x5c/0x110 [ 1371.959548][T27286] rawv6_sendmsg+0x9be/0x2340 [ 1371.964299][T27286] ? __const_udelay+0x36/0x40 [ 1371.968985][T27286] ? __udelay+0x10/0x20 [ 1371.973248][T27286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1371.979511][T27286] ? aa_label_sk_perm+0x89/0xe0 [ 1371.984377][T27286] ? aa_sk_perm+0x1d3/0x590 [ 1371.988894][T27286] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1371.995432][T27286] inet_sendmsg+0x6d/0x90 [ 1371.999839][T27286] ? inet_sendmsg+0x6d/0x90 [ 1372.004357][T27286] ? inet_send_prepare+0x200/0x200 [ 1372.009477][T27286] sock_sendmsg+0x9f/0xc0 [ 1372.013804][T27286] ____sys_sendmsg+0x212/0x4d0 [ 1372.018571][T27286] ___sys_sendmsg+0xb5/0x100 [ 1372.023175][T27286] ? __fget+0xb8/0x1d0 [ 1372.027323][T27286] ? __fget_light+0xaf/0x190 [ 1372.031916][T27286] ? __fdget+0x2c/0x40 [ 1372.035979][T27286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1372.042310][T27286] __sys_sendmmsg+0x123/0x350 [ 1372.047194][T27286] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1372.053471][T27286] ? fput_many+0xec/0x130 [ 1372.057792][T27286] ? fput+0x29/0x30 [ 1372.061601][T27286] ? ksys_write+0x145/0x1b0 [ 1372.066100][T27286] __x64_sys_sendmmsg+0x64/0x80 [ 1372.070972][T27286] do_syscall_64+0xcc/0x3a0 [ 1372.075502][T27286] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1372.081441][T27286] RIP: 0033:0x45aff9 [ 1372.085351][T27286] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1372.105000][T27286] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1372.113414][T27286] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1372.121691][T27286] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1372.129655][T27286] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1372.137680][T27286] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1372.145658][T27286] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000004e 11:04:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0xffffffff00000000) 11:04:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x50000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x5000000, 0x0, 0x10000000280}) 11:04:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x4000, @remote, 0x2}, 0x1c) 11:04:31 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x1b8909afcb363731) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x70bd26, 0x1000, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x9}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {0x0, 0x0, 0x0, 0x4000}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:31 executing program 3 (fault-call:10 fault-nth:79): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x54000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x6000000, 0x0, 0x10000000280}) 11:04:31 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) write(r0, &(0x7f0000002000)='/', 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0xac, 0x0, 0x5, 0x80, 0x4, "1f7ca9edb66eacc5"}) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0xfffffffffffffcbc, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x7000000, 0x0, 0x10000000280}) 11:04:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x5c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1372.921693][T27331] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1372.974866][T27335] FAULT_INJECTION: forcing a failure. [ 1372.974866][T27335] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.987689][T27335] CPU: 1 PID: 27335 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1372.996391][T27335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.006734][T27335] Call Trace: [ 1373.010048][T27335] dump_stack+0x11d/0x181 [ 1373.014446][T27335] should_fail.cold+0xa/0x1a [ 1373.019047][T27335] __should_failslab+0xee/0x130 [ 1373.023919][T27335] should_failslab+0x9/0x14 [ 1373.028482][T27335] kmem_cache_alloc+0x29/0x5d0 [ 1373.033307][T27335] ? fib6_node_lookup+0xed/0x120 [ 1373.038255][T27335] dst_alloc+0xad/0x149 [ 1373.042497][T27335] ip6_dst_alloc+0x3d/0x80 [ 1373.046928][T27335] ip6_rt_cache_alloc+0x12b/0x480 [ 1373.052029][T27335] ip6_pol_route+0x5d2/0x730 [ 1373.056671][T27335] ip6_pol_route_output+0x48/0x60 [ 1373.061805][T27335] fib6_rule_lookup+0x3d6/0x470 [ 1373.066751][T27335] ? ip6_pol_route_input+0x70/0x70 [ 1373.071934][T27335] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1373.077693][T27335] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1373.082920][T27335] ip6_route_output_flags_noref+0x16b/0x230 [ 1373.088841][T27335] ip6_route_output_flags+0x50/0x1a0 [ 1373.094143][T27335] ip6_dst_lookup_tail+0x25d/0xc50 [ 1373.099269][T27335] ? debug_smp_processor_id+0x43/0x137 [ 1373.104764][T27335] ? dst_destroy+0x210/0x210 [ 1373.109404][T27335] ? debug_smp_processor_id+0x43/0x137 [ 1373.115227][T27335] ? dst_destroy+0x210/0x210 [ 1373.119824][T27335] ? __call_rcu+0x153/0x390 [ 1373.124337][T27335] ip6_dst_lookup_flow+0x5c/0x110 [ 1373.129372][T27335] rawv6_sendmsg+0x9be/0x2340 [ 1373.134163][T27335] ? process_measurement+0x149/0x1190 [ 1373.139746][T27335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1373.146251][T27335] ? aa_label_sk_perm+0x89/0xe0 [ 1373.151110][T27335] ? aa_sk_perm+0x1d3/0x590 [ 1373.155832][T27335] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1373.162316][T27335] inet_sendmsg+0x6d/0x90 [ 1373.166785][T27335] ? inet_sendmsg+0x6d/0x90 [ 1373.171405][T27335] ? inet_send_prepare+0x200/0x200 [ 1373.176534][T27335] sock_sendmsg+0x9f/0xc0 [ 1373.180911][T27335] ____sys_sendmsg+0x212/0x4d0 [ 1373.185807][T27335] ___sys_sendmsg+0xb5/0x100 [ 1373.190413][T27335] ? __fget+0xb8/0x1d0 [ 1373.194603][T27335] ? __fget_light+0xaf/0x190 [ 1373.199212][T27335] ? __fdget+0x2c/0x40 [ 1373.203352][T27335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1373.209751][T27335] __sys_sendmmsg+0x123/0x350 [ 1373.214485][T27335] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1373.220736][T27335] ? fput_many+0xec/0x130 11:04:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7800000030004ff60000000000000000000200006400010060000100080001e162706600500002800600030005000000180002505c7e5d00000000000000000000000000000000002c0004000800000000000000000080000000000000000000000000312dafd0800000000000000000000000000000000000040006002305476c304e7e16c3bfff2012ae7e1c223d7044b89c1dde60c2b8808019e2f5274c493a753413152b4128a032fbd7212d9ad0"], 0x78}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000000)={0x2, 0x0, 0x975878158ed6d1ef, 0x7fffffff, 0x8, 0x6, 0x7, 0x25f5ea2658b8f0c5}) [ 1373.225145][T27335] ? fput+0x29/0x30 [ 1373.228958][T27335] ? ksys_write+0x145/0x1b0 [ 1373.233649][T27335] __x64_sys_sendmmsg+0x64/0x80 [ 1373.238546][T27335] do_syscall_64+0xcc/0x3a0 [ 1373.243238][T27335] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1373.249265][T27335] RIP: 0033:0x45aff9 [ 1373.253607][T27335] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x8000000, 0x0, 0x10000000280}) [ 1373.273374][T27335] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1373.281801][T27335] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1373.289906][T27335] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1373.297883][T27335] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1373.305963][T27335] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1373.313987][T27335] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000004f 11:04:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x60000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1373.424412][T27341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x4002, @remote, 0x2}, 0x1c) [ 1373.475043][T27341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x61000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:32 executing program 3 (fault-call:10 fault-nth:80): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0xc567802efdfee004, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'raw\x00'}, &(0x7f0000000140)=0x54) prctl$PR_CAPBSET_DROP(0x18, 0x24) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$ax25_int(r1, 0x101, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000001c0)={0x2, 0x8}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff60000000000000000000000006400010060000100080001f5627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000400)={0x0, 0x936}, &(0x7f0000000440)=0xc) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x400, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000480)={r4, 0x8}, &(0x7f00000004c0)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) mq_timedreceive(r3, &(0x7f0000000240)=""/248, 0xf8, 0x1, &(0x7f0000000180)={0x77359400}) 11:04:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0xb000000, 0x0, 0x10000000280}) 11:04:32 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) vmsplice(r1, &(0x7f0000000640)=[{&(0x7f0000000140)="cedd4ee84a8bb46b706b1617b361b8c88ef8e0e36b860021229aac8b4fbed5581fcd0a6a49c40b37693b36d385a3c991084c26328406d3b59f0ebd9923f3093a6b556e03c9fe97ca259f4ed38dc9a63a798798277695f4f5", 0x58}, {&(0x7f0000000200)="67d30f5f704294998afaf52671b52461c23ee0c207de8b108b6203a66e48be39a3de7a983249e17a96a04692549f671da34fbc4aac1c9dcf9f05275da36c189aeb31af6afa0a5b1186c91f7fa6732bd90b8c8c325c4f3b8a9d5c463b", 0x5c}, {&(0x7f0000000280)="6e9e0b904fa32338be668aa5837a9df59d354fd9eceef0e72b592152b940e7f5e70d271ad1535cc80e85fec59d73bd9a2c1c9ce9d132a55aa7d3fae17b82c44676b738d21ba799fba82342c7e89a97258ca9ddcd3e15a37310e099d547ab781bc7a08e23c1e9e67094a10619", 0x6c}, {&(0x7f0000000300)="015b0c7db83ede1b647135719dbfbc11afc6faf0c1f259ca461fef0996cfa561418003a8cc8ab53c854c7014b50265513465dfe0b468a518e389bdbe733e15eb02ce69359d46690cd6e3b22f6473211c6daf55bd761eed75af6080f445c67d5f5e6b51e7db9b61", 0x67}, {&(0x7f0000000380)="18efdc27e815e9e309781982625e29061566434152381331b9a68448fe7aac85dafcb402ff2d46f271b58da8853f9e8ecb8a403bf1b3d2ba60204696dd6d9bb4a9e7881bc4c1ca94fdb6aaf16865bc39f73d0ae5e70e4bfe49ffb5e1270b266b05046f1f510b4b814cfe98c856", 0x6d}, {&(0x7f0000000400)="026347a211c2a6c08a2cba67b284beb8ee2e5f65acb80752968dc160fca65d020212ad41f5e51ca2d931646e65cf019835b0bb955ae3527bbcfc58430cc6d93d21331bfd62312807cbd3b6c1e65cd98cad587e0492bb9d5a9870192458938a6d97fbc92172d0684c1941997df79df9c6f544bf9560af978d1e280bf6663616412d763a9cdc5d534135f9860726399ce1e487c8fa668b1cf88e45f01506b7fa52361687a64d8763bd71d21f53fce9f7517caa5b393418957a05c905f48a93143780d02326b8238e093051779486104f29f0ce30af84b0ec7699dab979e0bfe73154ef7a", 0xe3}, {&(0x7f0000000500)="de6ee3ba00570e05355c3e1e9aae52ffa83730f86aafeb821dac34248416927ce5570ed931f5179225a73f48", 0x2c}, {&(0x7f0000000540)="7e3144cb1b7b5e8aeb43244394b1d902a2553ca16f7aaf50e3d1b62454cced29ebcd29caf403b7ca2ede8697fa4e2f53f4106e17a6cd8ae9666eac3702ae9ec1a8a8df3f9eee5e5be104fcce7440199bb748463766ae2ec7cca36a076d4375998d9808db3c02836368319acd0e453afc610ba40ad666ea12caa84cb2cb36f7ad8c244d31f6ebdfd26d598beb7b566d5ba80c1fa15bcfa6528c036a66ec18edf782ed429e253bc46ce073b410f0e9702436e7feb0a30f6f016077c666e543454326d2e3c6a670650a3670d01e3695ad0fe31b3e5d74751b052f2c0021301762f2a510e7e6fd3d63b5380c4ac28260ece6653161ddb540692a9808f7a9e92783", 0xff}], 0x8, 0xa) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000780)={0x7, r4}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f00000007c0)) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x24, &(0x7f00000006c0)={@initdev, @broadcast}, &(0x7f0000000700)=0x8) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r6, 0xc0205649, &(0x7f0000000040)={0x990000, 0xfffeffff, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990a6f, 0x387, [], @value64=0xbb}}) ioctl$TIOCGLCKTRMIOS(r7, 0x5456, &(0x7f00000000c0)={0x1e1f, 0x3, 0x606, 0x5, 0x14, "e2e33899abff5e4064049b80341634f057f9cd"}) 11:04:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x64000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x3f000000, 0x0, 0x10000000280}) 11:04:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) eventfd(0x2ac9) [ 1374.004910][T27374] FAULT_INJECTION: forcing a failure. [ 1374.004910][T27374] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.017605][T27374] CPU: 1 PID: 27374 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1374.026279][T27374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.036379][T27374] Call Trace: [ 1374.039679][T27374] dump_stack+0x11d/0x181 [ 1374.044071][T27374] should_fail.cold+0xa/0x1a [ 1374.048756][T27374] __should_failslab+0xee/0x130 [ 1374.053740][T27374] should_failslab+0x9/0x14 [ 1374.058343][T27374] kmem_cache_alloc+0x29/0x5d0 [ 1374.065790][T27374] ? fib6_node_lookup+0xed/0x120 [ 1374.070764][T27374] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1374.076513][T27374] ? ip6_dst_gc+0x1c4/0x220 [ 1374.081027][T27374] dst_alloc+0xad/0x149 [ 1374.085215][T27374] ip6_dst_alloc+0x3d/0x80 [ 1374.089647][T27374] ip6_rt_cache_alloc+0x12b/0x480 [ 1374.094686][T27374] ip6_pol_route+0x5d2/0x730 [ 1374.099305][T27374] ip6_pol_route_output+0x48/0x60 [ 1374.104356][T27374] fib6_rule_lookup+0x3d6/0x470 [ 1374.109207][T27374] ? ip6_pol_route_input+0x70/0x70 [ 1374.114670][T27374] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1374.120500][T27374] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1374.125835][T27374] ip6_route_output_flags_noref+0x16b/0x230 [ 1374.131761][T27374] ip6_route_output_flags+0x50/0x1a0 [ 1374.137081][T27374] ip6_dst_lookup_tail+0x25d/0xc50 [ 1374.142241][T27374] ? debug_smp_processor_id+0x43/0x137 [ 1374.147719][T27374] ? dst_destroy+0x210/0x210 [ 1374.152371][T27374] ? debug_smp_processor_id+0x43/0x137 [ 1374.157872][T27374] ? dst_destroy+0x210/0x210 [ 1374.162529][T27374] ? __call_rcu+0x153/0x390 [ 1374.167042][T27374] ip6_dst_lookup_flow+0x5c/0x110 [ 1374.172082][T27374] rawv6_sendmsg+0x9be/0x2340 [ 1374.176814][T27374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1374.183082][T27374] ? debug_smp_processor_id+0x43/0x137 [ 1374.188556][T27374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1374.194925][T27374] ? aa_label_sk_perm+0x89/0xe0 [ 1374.199875][T27374] ? aa_sk_perm+0x1d3/0x590 [ 1374.204388][T27374] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1374.211085][T27374] inet_sendmsg+0x6d/0x90 [ 1374.215470][T27374] ? inet_sendmsg+0x6d/0x90 [ 1374.219981][T27374] ? inet_send_prepare+0x200/0x200 [ 1374.225104][T27374] sock_sendmsg+0x9f/0xc0 [ 1374.230103][T27374] ____sys_sendmsg+0x212/0x4d0 [ 1374.234925][T27374] ___sys_sendmsg+0xb5/0x100 [ 1374.239630][T27374] ? __fget+0xb8/0x1d0 [ 1374.243810][T27374] ? __fget_light+0xaf/0x190 [ 1374.248522][T27374] ? __fdget+0x2c/0x40 [ 1374.252730][T27374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1374.259062][T27374] __sys_sendmmsg+0x123/0x350 [ 1374.263808][T27374] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1374.270051][T27374] ? fput_many+0xec/0x130 [ 1374.274382][T27374] ? fput+0x29/0x30 [ 1374.278197][T27374] ? ksys_write+0x145/0x1b0 [ 1374.282721][T27374] __x64_sys_sendmmsg+0x64/0x80 [ 1374.287580][T27374] do_syscall_64+0xcc/0x3a0 [ 1374.292126][T27374] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1374.298023][T27374] RIP: 0033:0x45aff9 [ 1374.302029][T27374] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1374.321773][T27374] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1374.330254][T27374] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1374.338326][T27374] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1374.346447][T27374] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000000)={0x8, 0x7, 0x0, 'syz0\x00'}, &(0x7f0000000040)=0x2c) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1374.354418][T27374] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1374.362390][T27374] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000050 11:04:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0xffffffffffffff4b}}}}]}, 0x78}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x1, 0x7, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000091}, 0x4000) 11:04:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x40000000, 0x0, 0x10000000280}) [ 1374.541625][T27387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x80fe, @remote, 0x2}, 0x1c) [ 1374.583688][T27387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x20, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x10, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {0x8d}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0xc00c8}, 0x40) 11:04:33 executing program 3 (fault-call:10 fault-nth:81): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x65580000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x48000000, 0x0, 0x10000000280}) 11:04:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x78}}, 0x0) 11:04:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x6c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1375.058358][T27412] FAULT_INJECTION: forcing a failure. [ 1375.058358][T27412] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.071232][T27412] CPU: 0 PID: 27412 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1375.079926][T27412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.090081][T27412] Call Trace: [ 1375.093386][T27412] dump_stack+0x11d/0x181 [ 1375.097763][T27412] should_fail.cold+0xa/0x1a [ 1375.102382][T27412] __should_failslab+0xee/0x130 [ 1375.107244][T27412] should_failslab+0x9/0x14 [ 1375.111971][T27412] kmem_cache_alloc+0x29/0x5d0 [ 1375.116748][T27412] ? fib6_node_lookup+0xed/0x120 [ 1375.121727][T27412] dst_alloc+0xad/0x149 [ 1375.125904][T27412] ip6_dst_alloc+0x3d/0x80 [ 1375.130358][T27412] ip6_rt_cache_alloc+0x12b/0x480 [ 1375.135481][T27412] ip6_pol_route+0x5d2/0x730 [ 1375.140170][T27412] ? __const_udelay+0x36/0x40 [ 1375.144986][T27412] ip6_pol_route_output+0x48/0x60 [ 1375.150117][T27412] fib6_rule_lookup+0x3d6/0x470 [ 1375.154980][T27412] ? ip6_pol_route_input+0x70/0x70 [ 1375.160159][T27412] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1375.165892][T27412] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1375.171153][T27412] ip6_route_output_flags_noref+0x16b/0x230 [ 1375.177079][T27412] ip6_route_output_flags+0x50/0x1a0 [ 1375.182387][T27412] ip6_dst_lookup_tail+0x25d/0xc50 [ 1375.187556][T27412] ? debug_smp_processor_id+0x43/0x137 [ 1375.193136][T27412] ? dst_destroy+0x210/0x210 [ 1375.197737][T27412] ? debug_smp_processor_id+0x43/0x137 [ 1375.203292][T27412] ? dst_destroy+0x210/0x210 [ 1375.208016][T27412] ? __call_rcu+0x153/0x390 [ 1375.212534][T27412] ip6_dst_lookup_flow+0x5c/0x110 [ 1375.217721][T27412] rawv6_sendmsg+0x9be/0x2340 [ 1375.222588][T27412] ? __const_udelay+0x36/0x40 [ 1375.227292][T27412] ? __udelay+0x10/0x20 [ 1375.231521][T27412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1375.237906][T27412] ? aa_label_sk_perm+0x89/0xe0 [ 1375.242790][T27412] ? aa_sk_perm+0x1d3/0x590 [ 1375.247419][T27412] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1375.253754][T27412] inet_sendmsg+0x6d/0x90 [ 1375.258086][T27412] ? inet_sendmsg+0x6d/0x90 [ 1375.262637][T27412] ? inet_send_prepare+0x200/0x200 [ 1375.267761][T27412] sock_sendmsg+0x9f/0xc0 [ 1375.272111][T27412] ____sys_sendmsg+0x212/0x4d0 [ 1375.276906][T27412] ___sys_sendmsg+0xb5/0x100 [ 1375.281507][T27412] ? __fget+0xb8/0x1d0 [ 1375.285700][T27412] ? __fget_light+0xaf/0x190 [ 1375.290295][T27412] ? __fdget+0x2c/0x40 [ 1375.294461][T27412] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1375.300718][T27412] __sys_sendmmsg+0x123/0x350 [ 1375.305689][T27412] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1375.311989][T27412] ? fput_many+0xec/0x130 [ 1375.316330][T27412] ? fput+0x29/0x30 [ 1375.320205][T27412] ? ksys_write+0x145/0x1b0 [ 1375.324776][T27412] __x64_sys_sendmmsg+0x64/0x80 [ 1375.329685][T27412] do_syscall_64+0xcc/0x3a0 [ 1375.334210][T27412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1375.340113][T27412] RIP: 0033:0x45aff9 [ 1375.344070][T27412] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1375.363685][T27412] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1375.372137][T27412] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1375.380112][T27412] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1375.388351][T27412] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1375.396325][T27412] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40400}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x154, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x14}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x157}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'tunl0\x00'}}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x800}, 0x0) 11:04:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x4c000000, 0x0, 0x10000000280}) 11:04:34 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) socket$caif_seqpacket(0x25, 0x5, 0x5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r2, 0x0, 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x2761, 0xfffffff5) r3 = openat$cgroup_ro(r2, 0x0, 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x14) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ptrace$setregset(0x4205, r5, 0x2, &(0x7f0000000200)={&(0x7f0000000380)="4d19eaa4c7827a8dd0b6aeaa5e9d885146f519861f45351ba624bb7bd40d473f457df092318cf94a9915b94f99e9143267f9706c1be522a4a01848af3c6d6a5875da78fc4666083f", 0x48}) setuid(r6) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x68000000, 0x0, 0x10000000280}) [ 1375.404554][T27412] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000051 11:04:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x74000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xe02e, @remote, 0x2}, 0x1c) 11:04:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x6c000000, 0x0, 0x10000000280}) 11:04:34 executing program 3 (fault-call:10 fault-nth:82): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:34 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @local}], 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x200000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1db8}}, 0x0) 11:04:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x7c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x74000000, 0x0, 0x10000000280}) 11:04:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x81000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200820, 0x0) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x2710}}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000003000000000000006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c00040008000000000000000000000000000000000000000000000000000000000000000000000000000000822c0206"], 0x78}}, 0x0) [ 1376.107465][T27457] FAULT_INJECTION: forcing a failure. [ 1376.107465][T27457] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.121635][T27457] CPU: 0 PID: 27457 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1376.130485][T27457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.140725][T27457] Call Trace: [ 1376.144139][T27457] dump_stack+0x11d/0x181 [ 1376.148494][T27457] should_fail.cold+0xa/0x1a [ 1376.153134][T27457] __should_failslab+0xee/0x130 [ 1376.159106][T27457] should_failslab+0x9/0x14 [ 1376.163887][T27457] kmem_cache_alloc+0x29/0x5d0 [ 1376.168674][T27457] ? fib6_node_lookup+0xed/0x120 [ 1376.173636][T27457] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1376.179366][T27457] ? ip6_dst_gc+0x1c4/0x220 [ 1376.183881][T27457] dst_alloc+0xad/0x149 [ 1376.188090][T27457] ip6_dst_alloc+0x3d/0x80 [ 1376.192528][T27457] ip6_rt_cache_alloc+0x12b/0x480 [ 1376.197566][T27457] ip6_pol_route+0x5d2/0x730 [ 1376.202179][T27457] ip6_pol_route_output+0x48/0x60 [ 1376.207244][T27457] fib6_rule_lookup+0x3d6/0x470 [ 1376.209450][T27463] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1376.212117][T27457] ? ip6_pol_route_input+0x70/0x70 [ 1376.212144][T27457] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1376.212166][T27457] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1376.212240][T27457] ip6_route_output_flags_noref+0x16b/0x230 [ 1376.243604][T27457] ip6_route_output_flags+0x50/0x1a0 [ 1376.249070][T27457] ip6_dst_lookup_tail+0x25d/0xc50 [ 1376.254203][T27457] ? debug_smp_processor_id+0x43/0x137 [ 1376.259679][T27457] ? dst_destroy+0x210/0x210 [ 1376.264351][T27457] ? debug_smp_processor_id+0x43/0x137 [ 1376.270088][T27457] ? dst_destroy+0x210/0x210 [ 1376.274772][T27457] ? __call_rcu+0x153/0x390 [ 1376.279457][T27457] ip6_dst_lookup_flow+0x5c/0x110 [ 1376.284502][T27457] rawv6_sendmsg+0x9be/0x2340 [ 1376.289195][T27457] ? debug_smp_processor_id+0x43/0x137 [ 1376.294690][T27457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1376.300984][T27457] ? aa_label_sk_perm+0x89/0xe0 [ 1376.306028][T27457] ? aa_sk_perm+0x1d3/0x590 [ 1376.310552][T27457] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1376.316898][T27457] inet_sendmsg+0x6d/0x90 [ 1376.321325][T27457] ? inet_sendmsg+0x6d/0x90 [ 1376.325891][T27457] ? inet_send_prepare+0x200/0x200 [ 1376.331068][T27457] sock_sendmsg+0x9f/0xc0 [ 1376.335622][T27457] ____sys_sendmsg+0x212/0x4d0 [ 1376.340419][T27457] ___sys_sendmsg+0xb5/0x100 [ 1376.345130][T27457] ? __fget+0xb8/0x1d0 [ 1376.349304][T27457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1376.355586][T27457] ? debug_smp_processor_id+0x43/0x137 [ 1376.361092][T27457] ? delay_tsc+0x8f/0xc0 [ 1376.365388][T27457] ? __const_udelay+0x36/0x40 [ 1376.370079][T27457] ? __udelay+0x10/0x20 [ 1376.374257][T27457] __sys_sendmmsg+0x123/0x350 [ 1376.379072][T27457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1376.385488][T27457] ? fput_many+0xec/0x130 [ 1376.389895][T27457] ? fput+0x29/0x30 [ 1376.393735][T27457] ? ksys_write+0x145/0x1b0 [ 1376.398295][T27457] __x64_sys_sendmmsg+0x64/0x80 [ 1376.403218][T27457] do_syscall_64+0xcc/0x3a0 11:04:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x7a000000, 0x0, 0x10000000280}) [ 1376.407826][T27457] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1376.413761][T27457] RIP: 0033:0x45aff9 [ 1376.417923][T27457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1376.437884][T27457] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1376.446772][T27457] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1376.454821][T27457] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1376.462979][T27457] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1376.470958][T27457] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1376.479373][T27457] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000052 11:04:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x84000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) r3 = socket(0x0, 0x2, 0x0) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x101180) fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r5, 0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', r2, r5) 11:04:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0xff000000, 0x0, 0x10000000280}) 11:04:35 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$SOUND_MIXER_WRITE_RECSRC(r1, 0xc0044dff, &(0x7f0000000000)) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xfe80, @remote, 0x2}, 0x1c) 11:04:35 executing program 3 (fault-call:10 fault-nth:83): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x87000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c000400080000000000000000000000000000000000000000000000000000000000000000345fcbf6ac105400a78cde7d6927039579076195afd12910cd7488ff989c90390428e22ac3bcb640ce2755addc4b908fc873fc569ba77b591f33ef4f7fb2f8a8ebc86fafa933db6c56b990ed6a63825e91c78288690fb6820258cd30a45f5aeaa9a174d1b68595"], 0x78}}, 0x0) 11:04:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x2, 0x10000000280}) [ 1376.997776][T27497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x102000, 0x0) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"/373], 0x78}}, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1377.135296][T27505] FAULT_INJECTION: forcing a failure. [ 1377.135296][T27505] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.148200][T27505] CPU: 0 PID: 27505 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1377.156880][T27505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.166939][T27505] Call Trace: [ 1377.170248][T27505] dump_stack+0x11d/0x181 [ 1377.174598][T27505] should_fail.cold+0xa/0x1a [ 1377.179208][T27505] __should_failslab+0xee/0x130 11:04:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x88a8ffff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x3, 0x10000000280}) [ 1377.184072][T27505] should_failslab+0x9/0x14 [ 1377.188613][T27505] kmem_cache_alloc+0x29/0x5d0 [ 1377.193400][T27505] ? fib6_node_lookup+0xed/0x120 [ 1377.198523][T27505] dst_alloc+0xad/0x149 [ 1377.202763][T27505] ip6_dst_alloc+0x3d/0x80 [ 1377.208400][T27505] ip6_rt_cache_alloc+0x12b/0x480 [ 1377.213446][T27505] ip6_pol_route+0x5d2/0x730 [ 1377.218058][T27505] ip6_pol_route_output+0x48/0x60 [ 1377.223100][T27505] fib6_rule_lookup+0x3d6/0x470 [ 1377.228058][T27505] ? ip6_pol_route_input+0x70/0x70 [ 1377.233309][T27505] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1377.239046][T27505] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1377.244260][T27505] ip6_route_output_flags_noref+0x16b/0x230 [ 1377.250222][T27505] ip6_route_output_flags+0x50/0x1a0 [ 1377.255630][T27505] ip6_dst_lookup_tail+0x25d/0xc50 [ 1377.260849][T27505] ? debug_smp_processor_id+0x43/0x137 [ 1377.266323][T27505] ? dst_destroy+0x210/0x210 [ 1377.270945][T27505] ? debug_smp_processor_id+0x43/0x137 [ 1377.276420][T27505] ? dst_destroy+0x210/0x210 [ 1377.281030][T27505] ? __call_rcu+0x153/0x390 11:04:36 executing program 0: r0 = memfd_create(&(0x7f0000000100)=':\xac\x00\x00\x00\x00\x00\x02\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1377.285619][T27505] ip6_dst_lookup_flow+0x5c/0x110 [ 1377.290680][T27505] rawv6_sendmsg+0x9be/0x2340 [ 1377.295405][T27505] ? process_measurement+0x149/0x1190 [ 1377.300920][T27505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1377.307799][T27505] ? aa_label_sk_perm+0x89/0xe0 [ 1377.312669][T27505] ? aa_sk_perm+0x1d3/0x590 [ 1377.317221][T27505] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1377.323584][T27505] inet_sendmsg+0x6d/0x90 [ 1377.327939][T27505] ? inet_sendmsg+0x6d/0x90 [ 1377.332560][T27505] ? inet_send_prepare+0x200/0x200 [ 1377.337694][T27505] sock_sendmsg+0x9f/0xc0 [ 1377.342215][T27505] ____sys_sendmsg+0x212/0x4d0 [ 1377.347055][T27505] ___sys_sendmsg+0xb5/0x100 [ 1377.351675][T27505] ? __fget+0xb8/0x1d0 [ 1377.355867][T27505] ? __fget_light+0xaf/0x190 [ 1377.360467][T27505] ? __fdget+0x2c/0x40 [ 1377.364575][T27505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1377.370842][T27505] __sys_sendmmsg+0x123/0x350 [ 1377.375543][T27505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1377.381791][T27505] ? fput_many+0xec/0x130 11:04:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000000000000000000000064000100600001000800010062706600500002800600030005000000180002000000000000000000000000000000286dd7c100002c0004e30700000000000000000000000000000000000000000000000000000000000000000000000000000004000600ad4ffb15cb69c6b7b93e5846643d2d7ef5fdc02bcd81ab1ace2dc45e9ec511a07be4d13ddc0afaf86665d590f68d3242cc5a9902cd9d468e64ae04ddcb92c65fdd2172850935f0eeaa29c5621e9b649cc09a8698bc0111eb13f886feefe5acc8a3ca624d5da3c001b780d10018b4c1"], 0x78}}, 0x0) [ 1377.386188][T27505] ? fput+0x29/0x30 [ 1377.390014][T27505] ? ksys_write+0x145/0x1b0 [ 1377.394657][T27505] __x64_sys_sendmmsg+0x64/0x80 [ 1377.399528][T27505] do_syscall_64+0xcc/0x3a0 [ 1377.404052][T27505] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1377.409953][T27505] RIP: 0033:0x45aff9 [ 1377.413863][T27505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1377.433475][T27505] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1377.441936][T27505] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1377.450108][T27505] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1377.458134][T27505] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1377.466159][T27505] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1377.474158][T27505] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000053 11:04:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4, 0x10000000280}) 11:04:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x94000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xff0f, @remote, 0x2}, 0x1c) 11:04:36 executing program 3 (fault-call:10 fault-nth:84): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x3b7, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400c00, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'erspan0\x00', 0x1}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000100)) 11:04:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x5, 0x10000000280}) 11:04:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x9c000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1377.971572][T27542] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1378.028023][T27542] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1378.114650][T27550] FAULT_INJECTION: forcing a failure. [ 1378.114650][T27550] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.127301][T27550] CPU: 1 PID: 27550 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1378.135953][T27550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.146034][T27550] Call Trace: [ 1378.149396][T27550] dump_stack+0x11d/0x181 [ 1378.153735][T27550] should_fail.cold+0xa/0x1a [ 1378.158320][T27550] __should_failslab+0xee/0x130 11:04:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6, 0x10000000280}) [ 1378.163176][T27550] should_failslab+0x9/0x14 [ 1378.167796][T27550] kmem_cache_alloc+0x29/0x5d0 [ 1378.172572][T27550] ? fib6_node_lookup+0xed/0x120 [ 1378.177547][T27550] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1378.183420][T27550] ? ip6_dst_gc+0x1c4/0x220 [ 1378.187937][T27550] dst_alloc+0xad/0x149 [ 1378.192260][T27550] ip6_dst_alloc+0x3d/0x80 [ 1378.196714][T27550] ip6_rt_cache_alloc+0x12b/0x480 [ 1378.201753][T27550] ip6_pol_route+0x5d2/0x730 [ 1378.206368][T27550] ip6_pol_route_output+0x48/0x60 11:04:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) shutdown(r1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x9effffff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1378.211415][T27550] fib6_rule_lookup+0x3d6/0x470 [ 1378.216287][T27550] ? ip6_pol_route_input+0x70/0x70 [ 1378.221445][T27550] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1378.227181][T27550] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1378.232416][T27550] ip6_route_output_flags_noref+0x16b/0x230 [ 1378.238403][T27550] ip6_route_output_flags+0x50/0x1a0 [ 1378.243949][T27550] ip6_dst_lookup_tail+0x25d/0xc50 [ 1378.249079][T27550] ? debug_smp_processor_id+0x43/0x137 [ 1378.254565][T27550] ? dst_destroy+0x210/0x210 [ 1378.259176][T27550] ? debug_smp_processor_id+0x43/0x137 [ 1378.264648][T27550] ? dst_destroy+0x210/0x210 [ 1378.269225][T27550] ? __call_rcu+0x153/0x390 [ 1378.273776][T27550] ip6_dst_lookup_flow+0x5c/0x110 [ 1378.278800][T27550] rawv6_sendmsg+0x9be/0x2340 [ 1378.283479][T27550] ? process_measurement+0x149/0x1190 [ 1378.288867][T27550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1378.295233][T27550] ? aa_label_sk_perm+0x89/0xe0 [ 1378.300424][T27550] ? aa_sk_perm+0x1d3/0x590 [ 1378.304972][T27550] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1378.311368][T27550] inet_sendmsg+0x6d/0x90 [ 1378.315686][T27550] ? inet_sendmsg+0x6d/0x90 [ 1378.320289][T27550] ? inet_send_prepare+0x200/0x200 [ 1378.325542][T27550] sock_sendmsg+0x9f/0xc0 [ 1378.329910][T27550] ____sys_sendmsg+0x212/0x4d0 [ 1378.334731][T27550] ___sys_sendmsg+0xb5/0x100 [ 1378.339341][T27550] ? __fget+0xb8/0x1d0 [ 1378.343436][T27550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1378.349734][T27550] ? debug_smp_processor_id+0x43/0x137 [ 1378.355277][T27550] ? delay_tsc+0x8f/0xc0 [ 1378.359642][T27550] ? __const_udelay+0x36/0x40 [ 1378.364314][T27550] ? __udelay+0x10/0x20 [ 1378.368462][T27550] __sys_sendmmsg+0x123/0x350 [ 1378.373168][T27550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1378.379514][T27550] ? fput_many+0xec/0x130 [ 1378.383838][T27550] ? fput+0x29/0x30 [ 1378.387684][T27550] ? ksys_write+0x145/0x1b0 [ 1378.392322][T27550] __x64_sys_sendmmsg+0x64/0x80 [ 1378.397195][T27550] do_syscall_64+0xcc/0x3a0 [ 1378.401732][T27550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1378.407625][T27550] RIP: 0033:0x45aff9 [ 1378.411511][T27550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1378.431109][T27550] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1378.439518][T27550] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1378.447501][T27550] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1378.455472][T27550] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1378.463441][T27550] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1378.471548][T27550] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000054 11:04:37 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) 11:04:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff600000000000000000000000064000100010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c00040008000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000"], 0x78}}, 0x0) 11:04:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7, 0x10000000280}) 11:04:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa3030000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1378.757748][T27566] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x40000, @remote, 0x2}, 0x1c) 11:04:37 executing program 3 (fault-call:10 fault-nth:85): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x8, 0x10000000280}) 11:04:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000ddff00000000002c0004000800000000000000000000000000000000000000fcffffff0000000000000000000000000000000004000600151eafb1b0359dfaf51fa6f9b9dfbee24116865d9f520717b4a6edd7580fd15049f149584708ad77decd3a273773dda9bce981e5bdfcf1c13f6ad9d5b3c913e29bef33429cac01e31a7e1f7e499fda0000"], 0x78}}, 0x0) 11:04:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xa4000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xb, 0x10000000280}) [ 1379.212270][T27591] FAULT_INJECTION: forcing a failure. [ 1379.212270][T27591] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.225180][T27591] CPU: 0 PID: 27591 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1379.233861][T27591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.243919][T27591] Call Trace: [ 1379.247227][T27591] dump_stack+0x11d/0x181 [ 1379.251853][T27591] should_fail.cold+0xa/0x1a [ 1379.256510][T27591] __should_failslab+0xee/0x130 [ 1379.261508][T27591] should_failslab+0x9/0x14 [ 1379.266032][T27591] kmem_cache_alloc+0x29/0x5d0 [ 1379.270816][T27591] ? fib6_node_lookup+0xed/0x120 [ 1379.275833][T27591] dst_alloc+0xad/0x149 [ 1379.280001][T27591] ip6_dst_alloc+0x3d/0x80 [ 1379.284464][T27591] ip6_rt_cache_alloc+0x12b/0x480 [ 1379.289507][T27591] ip6_pol_route+0x5d2/0x730 [ 1379.294128][T27591] ip6_pol_route_output+0x48/0x60 [ 1379.299186][T27591] fib6_rule_lookup+0x3d6/0x470 [ 1379.304052][T27591] ? ip6_pol_route_input+0x70/0x70 11:04:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) fadvise64(r7, 0x0, 0x8, 0x6ae78cf33d9fbe8e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f00000000c0)=0x8) ioctl$DRM_IOCTL_FREE_BUFS(r4, 0x4010641a, &(0x7f00000001c0)={0x5, &(0x7f0000000140)=[0x101, 0xff, 0x6, 0x1, 0x0]}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={r6, 0xffffffff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r8, 0x8bd, 0x7fff, 0x800}, 0x10) [ 1379.309227][T27591] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1379.315044][T27591] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1379.320300][T27591] ip6_route_output_flags_noref+0x16b/0x230 [ 1379.326389][T27591] ip6_route_output_flags+0x50/0x1a0 [ 1379.331691][T27591] ip6_dst_lookup_tail+0x25d/0xc50 [ 1379.336835][T27591] ? debug_smp_processor_id+0x43/0x137 [ 1379.342303][T27591] ? dst_destroy+0x210/0x210 [ 1379.346910][T27591] ? debug_smp_processor_id+0x43/0x137 [ 1379.352404][T27591] ? dst_destroy+0x210/0x210 [ 1379.357075][T27591] ? __call_rcu+0x153/0x390 11:04:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x48, 0x10000000280}) [ 1379.361589][T27591] ip6_dst_lookup_flow+0x5c/0x110 [ 1379.366636][T27591] rawv6_sendmsg+0x9be/0x2340 [ 1379.371382][T27591] ? process_measurement+0x149/0x1190 [ 1379.376770][T27591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1379.383106][T27591] ? aa_label_sk_perm+0x89/0xe0 [ 1379.387999][T27591] ? aa_sk_perm+0x1d3/0x590 [ 1379.392544][T27591] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1379.398900][T27591] inet_sendmsg+0x6d/0x90 [ 1379.403249][T27591] ? inet_sendmsg+0x6d/0x90 [ 1379.407858][T27591] ? inet_send_prepare+0x200/0x200 [ 1379.412984][T27591] sock_sendmsg+0x9f/0xc0 [ 1379.417339][T27591] ____sys_sendmsg+0x212/0x4d0 [ 1379.422665][T27591] ___sys_sendmsg+0xb5/0x100 [ 1379.427344][T27591] ? __fget+0xb8/0x1d0 [ 1379.431428][T27591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.438461][T27591] ? debug_smp_processor_id+0x43/0x137 [ 1379.444093][T27591] ? delay_tsc+0x8f/0xc0 [ 1379.448357][T27591] ? __const_udelay+0x36/0x40 [ 1379.453065][T27591] ? __udelay+0x10/0x20 [ 1379.457272][T27591] __sys_sendmmsg+0x123/0x350 [ 1379.461993][T27591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1379.468241][T27591] ? fput_many+0xec/0x130 [ 1379.472578][T27591] ? fput+0x29/0x30 [ 1379.476415][T27591] ? ksys_write+0x145/0x1b0 [ 1379.480935][T27591] __x64_sys_sendmmsg+0x64/0x80 [ 1379.485964][T27591] do_syscall_64+0xcc/0x3a0 [ 1379.490494][T27591] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1379.496393][T27591] RIP: 0033:0x45aff9 [ 1379.500395][T27591] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1379.520008][T27591] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1379.528481][T27591] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1379.536522][T27591] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1379.544523][T27591] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1379.552759][T27591] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1379.560766][T27591] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000055 11:04:38 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) 11:04:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4c, 0x10000000280}) 11:04:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xac000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:38 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x2) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000200)={0x40000000}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000140)=0x3, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f0000000000)=[0x3, 0x4], 0x2) 11:04:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x50000, @remote, 0x2}, 0x1c) 11:04:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xb1000000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:39 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100000, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x10c, 0xd, 0x8, 0x2, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x8}, [@typed={0xc, 0x71, 0x0, 0x0, @u64=0x7}, @generic="7eb341375510051bbfe99d688071181dfa52eefe4d860fe473c18c127489353ad478d8157a9e4a5c371af24444ed2113399c32ad7c7c1df6300583835260c467e54b1ff9eb977a5dbd37ea05003bddacd51d4210d86118e8f94ad2882c018e720ac06cb10ad7ff7055cacaecf10c30b4ed897dcaeaccc74eeca2106d53ef4195c101770736b9e5d40ba8bf921d52ff1ae055b58da6af9ef2e6587ee4158883a592e2d6aec550cb80d6217d886081a22bf3a25314b5b81c0d57ab82b0b24f95901ad4011cad9dbcb5615802970308274db4b0b75cf4966cac3eeeb70fc350f3", @typed={0x8, 0x2f, 0x0, 0x0, @ipv4=@loopback}, @typed={0x4, 0x22}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4080}, 0x8000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:39 executing program 3 (fault-call:10 fault-nth:86): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x68, 0x10000000280}) 11:04:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6c, 0x10000000280}) 11:04:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xf0ffffff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r6, 0x40045402, &(0x7f0000000240)=0x1) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast2, r7}, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'\x00', r7}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x26709726a66a685c, &(0x7f0000000180)={&(0x7f0000000000)=@newtfilter={0x34, 0x2c, 0x1122, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r8, {0xfff2, 0xf}, {0xfff1, 0x1c}, {0xf, 0x7}}, [@TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0x6, 0xfc}}]}, 0x34}}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) ioctl$SG_SCSI_RESET(r9, 0x2284, 0x0) [ 1380.259051][T27638] FAULT_INJECTION: forcing a failure. [ 1380.259051][T27638] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.271837][T27638] CPU: 1 PID: 27638 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1380.280522][T27638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1380.290605][T27638] Call Trace: [ 1380.293908][T27638] dump_stack+0x11d/0x181 [ 1380.298364][T27638] should_fail.cold+0xa/0x1a [ 1380.303026][T27638] __should_failslab+0xee/0x130 [ 1380.307898][T27638] should_failslab+0x9/0x14 [ 1380.312788][T27638] kmem_cache_alloc+0x29/0x5d0 [ 1380.317682][T27638] ? fib6_node_lookup+0xed/0x120 [ 1380.322633][T27638] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1380.328367][T27638] ? ip6_dst_gc+0x1c4/0x220 [ 1380.333046][T27638] dst_alloc+0xad/0x149 [ 1380.337363][T27638] ip6_dst_alloc+0x3d/0x80 [ 1380.341799][T27638] ip6_rt_cache_alloc+0x12b/0x480 [ 1380.346896][T27638] ip6_pol_route+0x5d2/0x730 [ 1380.351505][T27638] ip6_pol_route_output+0x48/0x60 [ 1380.356558][T27638] fib6_rule_lookup+0x3d6/0x470 [ 1380.361564][T27638] ? ip6_pol_route_input+0x70/0x70 [ 1380.366690][T27638] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1380.372704][T27638] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1380.378007][T27638] ip6_route_output_flags_noref+0x16b/0x230 [ 1380.384030][T27638] ip6_route_output_flags+0x50/0x1a0 [ 1380.389324][T27638] ip6_dst_lookup_tail+0x25d/0xc50 [ 1380.394449][T27638] ? debug_smp_processor_id+0x43/0x137 [ 1380.399945][T27638] ? dst_destroy+0x210/0x210 [ 1380.404557][T27638] ? debug_smp_processor_id+0x43/0x137 [ 1380.410069][T27638] ? dst_destroy+0x210/0x210 [ 1380.414677][T27638] ? __call_rcu+0x153/0x390 [ 1380.419273][T27638] ip6_dst_lookup_flow+0x5c/0x110 [ 1380.424313][T27638] rawv6_sendmsg+0x9be/0x2340 [ 1380.429018][T27638] ? process_measurement+0x149/0x1190 [ 1380.434404][T27638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1380.440655][T27638] ? aa_label_sk_perm+0x89/0xe0 [ 1380.445656][T27638] ? aa_sk_perm+0x1d3/0x590 [ 1380.450155][T27638] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1380.456488][T27638] inet_sendmsg+0x6d/0x90 [ 1380.460827][T27638] ? inet_sendmsg+0x6d/0x90 [ 1380.465361][T27638] ? inet_send_prepare+0x200/0x200 [ 1380.470481][T27638] sock_sendmsg+0x9f/0xc0 [ 1380.474840][T27638] ____sys_sendmsg+0x212/0x4d0 [ 1380.480570][T27638] ___sys_sendmsg+0xb5/0x100 [ 1380.485248][T27638] ? __fget+0xb8/0x1d0 [ 1380.489360][T27638] ? __fget_light+0xaf/0x190 [ 1380.494098][T27638] ? __fdget+0x2c/0x40 [ 1380.498176][T27638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1380.504491][T27638] __sys_sendmmsg+0x123/0x350 [ 1380.509196][T27638] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1380.515440][T27638] ? fput_many+0xec/0x130 [ 1380.519767][T27638] ? fput+0x29/0x30 [ 1380.523691][T27638] ? ksys_write+0x145/0x1b0 [ 1380.528228][T27638] __x64_sys_sendmmsg+0x64/0x80 [ 1380.533106][T27638] do_syscall_64+0xcc/0x3a0 [ 1380.537805][T27638] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1380.543826][T27638] RIP: 0033:0x45aff9 [ 1380.547720][T27638] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1380.567507][T27638] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1380.575997][T27638] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1380.584032][T27638] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1380.592139][T27638] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1380.601086][T27638] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:39 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) ioctl$FIGETBSZ(r2, 0x2, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) getsockopt$rose(r2, 0x104, 0x2, &(0x7f0000000140), &(0x7f0000000200)=0x4) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1380.609163][T27638] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000056 11:04:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x74, 0x10000000280}) 11:04:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xfcffffff, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1380.678120][T27644] QAT: Invalid ioctl [ 1380.697607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1380.703379][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x100000, @remote, 0x2}, 0x1c) 11:04:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xff2f0000, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1380.892771][T27651] QAT: Invalid ioctl 11:04:40 executing program 3 (fault-call:10 fault-nth:87): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7a, 0x10000000280}) 11:04:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640068087c87e4010060000100080001006270660092469bdfca5000028006000300050000001800020000000000000000000000000000000000000000002c0004000800"/120], 0x78}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f0000000100)={&(0x7f0000000800)={0x468, r2, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC_ADDRS={0x4}, @NL80211_ATTR_TX_RATES={0x318, 0x5a, [@NL80211_BAND_6GHZ={0x6c, 0x3, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x22, 0x1, "c0005207ab5b00645457f964cecc4193483c5ea6d78e7c5920e4280cf120"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0xffff, 0xd9b8, 0x0, 0x2, 0x8, 0xfffe]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x5, 0x2, 0x9, 0x1, 0xffff, 0x0, 0x7fff]}}, @NL80211_TXRATE_HT={0x9, 0x2, "8dd5326c9b"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x22def993db999ff8}]}, @NL80211_BAND_60GHZ={0x64, 0x2, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x101, 0x2, 0xe327, 0x4397, 0x0, 0xed5, 0xa, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x2, 0x9, 0x1ff, 0xbc3c, 0x5, 0x8, 0x9]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x7}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x4, 0x7, 0x39d, 0x101, 0x0, 0x80, 0x101]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0xfffe, 0x200, 0x8, 0x6, 0x1, 0x9869, 0x4]}}]}, @NL80211_BAND_2GHZ={0x78, 0x0, [@NL80211_TXRATE_HT={0x48, 0x2, "63508155c88245120bd4938345f97228d2b969c56bd963952c275810100cd43b8697884be36e19a3f5241905e515ea392c28948285965b002b950ced6eced5728f575264"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xe622, 0x35, 0x8, 0x3, 0x7869, 0x17ab, 0x7cbb, 0x200]}}, @NL80211_TXRATE_HT={0x18, 0x2, "1dfd8bfe64b6f4cdd8cdabd7aa69e29aab92232c"}]}, @NL80211_BAND_5GHZ={0x54, 0x1, [@NL80211_TXRATE_LEGACY={0x10, 0x1, "74734851467696dbe6788e6a"}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, "33395264c33a81405d9fb093ff2db2d801bdcc381e3747"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x3, 0x6, 0x1, 0x8, 0x3f, 0x7, 0x7fff]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0xac, 0x3, [@NL80211_TXRATE_LEGACY={0x12, 0x1, "cabc96c853b3fc09942e3aa739bf"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x200, 0x0, 0x8, 0x2, 0x1, 0x870c, 0xfd6, 0x1]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x14, 0x1, "6f43041169a5cd3fdfb3ae9e25dfe967"}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, "d6f1b195928ce03ab2216472995ff049ac09008c25f51ad6"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x3e, 0x2, "48afbe0c1017d56687dd50fd749cd49cf5a210ff3d4e90dcf529c8202feae67f20f32372eb5765db08d9d743037241f2a53ee7fd7d64ef5a51b0"}]}, @NL80211_BAND_5GHZ={0x88, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0xc3, 0xffc0, 0x6, 0x5, 0x8, 0x0, 0x2]}}, @NL80211_TXRATE_HT={0xf, 0x2, "db7c18f4d335f2637c610d"}, @NL80211_TXRATE_LEGACY={0xd, 0x1, "7e3b5e5bfdc4829431"}, @NL80211_TXRATE_LEGACY={0x21, 0x1, "3ca311b8d22a3492ba78fca9ba1136442f100389462bede3ee14be6ac3"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x1a, 0x2, "956879f19abd5d9dbd29accf805310e6a52b64c72b96"}, @NL80211_TXRATE_HT={0x7, 0x2, "4737e2"}]}, @NL80211_BAND_6GHZ={0x44, 0x3, [@NL80211_TXRATE_HT={0x23, 0x2, "0fd3416ed27fa0ff6d6c2f908b5d05acd4ac45429153488dede4e2dcdd8710"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0xfffa, 0x9, 0x6, 0x81, 0xffff, 0x4, 0x82]}}, @NL80211_TXRATE_LEGACY={0x7, 0x1, "92fca7"}]}]}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x2}, @NL80211_ATTR_IE={0x130, 0x2a, "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"}]}, 0x468}, 0x1, 0x0, 0x0, 0x4000004}, 0x8000) 11:04:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xffff8806, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x300, 0x10000000280}) 11:04:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) read(r2, &(0x7f0000000380)=""/32, 0x20) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f00000002c0)={'syz1', "a2541e210827ddabd5769c87d884ba80bb73e8ce151ec46efedba7b04f87b1097dab5079d5ef2134b2694332fdc65e50a4a12c28887f0434798ed6cf02f1e071f864f8b21e7adcfc5ad876dfeaf753eaba3fcb5f5eeeb7611b207311b38ea2f4a520267e30f6931d820b9d1d67b26339eeb5ace143cd92fc0d788468efd497fd8b71cbf650249d6d9fa3c1cd5f581b974a9ee7b3a5685fbbe568aaf5f32c55f1f14d51a8445c37bf70ef"}, 0xae) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000040)={r4, 0x2}) r5 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r5, &(0x7f0000002000)='/', 0x1) sendfile(r5, r5, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r5, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x21080, 0x0) [ 1381.247808][T27677] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1381.345718][T27686] FAULT_INJECTION: forcing a failure. [ 1381.345718][T27686] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.358421][T27686] CPU: 1 PID: 27686 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1381.367185][T27686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.377255][T27686] Call Trace: [ 1381.380603][T27686] dump_stack+0x11d/0x181 [ 1381.384956][T27686] should_fail.cold+0xa/0x1a [ 1381.389581][T27686] __should_failslab+0xee/0x130 [ 1381.394446][T27686] should_failslab+0x9/0x14 [ 1381.398963][T27686] kmem_cache_alloc+0x29/0x5d0 [ 1381.403746][T27686] ? fib6_node_lookup+0xed/0x120 [ 1381.408743][T27686] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1381.414691][T27686] ? ip6_dst_gc+0x1c4/0x220 [ 1381.419270][T27686] dst_alloc+0xad/0x149 [ 1381.423445][T27686] ip6_dst_alloc+0x3d/0x80 [ 1381.427871][T27686] ip6_rt_cache_alloc+0x12b/0x480 [ 1381.432962][T27686] ip6_pol_route+0x5d2/0x730 [ 1381.437644][T27686] ? __const_udelay+0x36/0x40 11:04:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "dfea86cd4b7961046488a0fca38cfd30"}, 0x11, 0x7) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008004fa7ac4966005000028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) [ 1381.442541][T27686] ip6_pol_route_output+0x48/0x60 [ 1381.447636][T27686] fib6_rule_lookup+0x3d6/0x470 [ 1381.452630][T27686] ? ip6_pol_route_input+0x70/0x70 [ 1381.457792][T27686] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1381.463605][T27686] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1381.468820][T27686] ip6_route_output_flags_noref+0x16b/0x230 [ 1381.474766][T27686] ip6_route_output_flags+0x50/0x1a0 [ 1381.480108][T27686] ip6_dst_lookup_tail+0x25d/0xc50 [ 1381.485237][T27686] ? debug_smp_processor_id+0x43/0x137 [ 1381.490710][T27686] ? dst_destroy+0x210/0x210 11:04:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xffff8808, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1381.495321][T27686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1381.501568][T27686] ? debug_smp_processor_id+0x43/0x137 [ 1381.507034][T27686] ? delay_tsc+0x8f/0xc0 [ 1381.511402][T27686] ip6_dst_lookup_flow+0x5c/0x110 [ 1381.516428][T27686] rawv6_sendmsg+0x9be/0x2340 [ 1381.521097][T27686] ? process_measurement+0x149/0x1190 [ 1381.526525][T27686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1381.532817][T27686] ? aa_label_sk_perm+0x89/0xe0 [ 1381.537786][T27686] ? aa_sk_perm+0x1d3/0x590 [ 1381.542301][T27686] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1381.548652][T27686] inet_sendmsg+0x6d/0x90 [ 1381.553035][T27686] ? inet_sendmsg+0x6d/0x90 [ 1381.557541][T27686] ? inet_send_prepare+0x200/0x200 [ 1381.562674][T27686] sock_sendmsg+0x9f/0xc0 [ 1381.567034][T27686] ____sys_sendmsg+0x212/0x4d0 [ 1381.571861][T27686] ___sys_sendmsg+0xb5/0x100 [ 1381.576510][T27686] ? __fget+0xb8/0x1d0 [ 1381.580593][T27686] ? __fget_light+0xaf/0x190 [ 1381.585245][T27686] ? __fdget+0x2c/0x40 [ 1381.589333][T27686] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1381.595570][T27686] __sys_sendmmsg+0x123/0x350 [ 1381.600351][T27686] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1381.606590][T27686] ? fput_many+0xec/0x130 [ 1381.610923][T27686] ? fput+0x29/0x30 [ 1381.614828][T27686] ? ksys_write+0x145/0x1b0 [ 1381.619365][T27686] __x64_sys_sendmmsg+0x64/0x80 [ 1381.624216][T27686] do_syscall_64+0xcc/0x3a0 [ 1381.628824][T27686] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1381.634725][T27686] RIP: 0033:0x45aff9 [ 1381.638635][T27686] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1381.658279][T27686] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1381.666719][T27686] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1381.674676][T27686] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1381.682634][T27686] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1381.690685][T27686] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1381.698662][T27686] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000057 11:04:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x1000000, @remote, 0x2}, 0x1c) 11:04:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xffffa888, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x500, 0x10000000280}) 11:04:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x224402) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f00000000c0)) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:41 executing program 3 (fault-call:10 fault-nth:88): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x600, 0x10000000280}) 11:04:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xffffff7f, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:41 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x1) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2004020}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0xa, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x30040100}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x87a8ec546b19a547}, 0xc, &(0x7f0000000240)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x20000000}, 0x43b63beffd770e98) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000002c0)=@gcm_128={{0x303}, "b6c18adfdb0b202a", "dc9ad1a914eddae38eaded9b8a156ca3", "591dd857", "9779852cf4caab12"}, 0x28) 11:04:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x700, 0x10000000280}) [ 1382.418808][T27728] FAULT_INJECTION: forcing a failure. [ 1382.418808][T27728] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.431489][T27728] CPU: 0 PID: 27728 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1382.440162][T27728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.450220][T27728] Call Trace: [ 1382.453563][T27728] dump_stack+0x11d/0x181 [ 1382.457941][T27728] should_fail.cold+0xa/0x1a [ 1382.462547][T27728] __should_failslab+0xee/0x130 [ 1382.467417][T27728] should_failslab+0x9/0x14 [ 1382.471933][T27728] kmem_cache_alloc+0x29/0x5d0 [ 1382.476766][T27728] ? fib6_node_lookup+0xed/0x120 [ 1382.481805][T27728] dst_alloc+0xad/0x149 [ 1382.485984][T27728] ip6_dst_alloc+0x3d/0x80 [ 1382.490414][T27728] ip6_rt_cache_alloc+0x12b/0x480 [ 1382.495500][T27728] ip6_pol_route+0x5d2/0x730 [ 1382.500218][T27728] ? __const_udelay+0x36/0x40 [ 1382.504905][T27728] ip6_pol_route_output+0x48/0x60 [ 1382.510016][T27728] fib6_rule_lookup+0x3d6/0x470 [ 1382.514954][T27728] ? ip6_pol_route_input+0x70/0x70 [ 1382.520142][T27728] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1382.525902][T27728] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1382.531118][T27728] ip6_route_output_flags_noref+0x16b/0x230 [ 1382.537016][T27728] ip6_route_output_flags+0x50/0x1a0 [ 1382.542319][T27728] ip6_dst_lookup_tail+0x25d/0xc50 [ 1382.547453][T27728] ? debug_smp_processor_id+0x43/0x137 [ 1382.552925][T27728] ? dst_destroy+0x210/0x210 [ 1382.557606][T27728] ? debug_smp_processor_id+0x43/0x137 [ 1382.563074][T27728] ? dst_destroy+0x210/0x210 [ 1382.567702][T27728] ? __call_rcu+0x153/0x390 [ 1382.572258][T27728] ip6_dst_lookup_flow+0x5c/0x110 [ 1382.577301][T27728] rawv6_sendmsg+0x9be/0x2340 [ 1382.581997][T27728] ? process_measurement+0x149/0x1190 [ 1382.587442][T27728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1382.593808][T27728] ? aa_label_sk_perm+0x89/0xe0 [ 1382.598704][T27728] ? aa_sk_perm+0x1d3/0x590 [ 1382.603283][T27728] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1382.609786][T27728] inet_sendmsg+0x6d/0x90 [ 1382.614479][T27728] ? inet_sendmsg+0x6d/0x90 [ 1382.619070][T27728] ? inet_send_prepare+0x200/0x200 [ 1382.624199][T27728] sock_sendmsg+0x9f/0xc0 [ 1382.628551][T27728] ____sys_sendmsg+0x212/0x4d0 [ 1382.633334][T27728] ___sys_sendmsg+0xb5/0x100 [ 1382.637931][T27728] ? __fget+0xb8/0x1d0 [ 1382.642010][T27728] ? __fget_light+0xaf/0x190 [ 1382.646876][T27728] ? __fdget+0x2c/0x40 [ 1382.651017][T27728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1382.657330][T27728] __sys_sendmmsg+0x123/0x350 [ 1382.662040][T27728] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1382.668473][T27728] ? fput_many+0xec/0x130 [ 1382.672985][T27728] ? fput+0x29/0x30 [ 1382.676928][T27728] ? ksys_write+0x145/0x1b0 [ 1382.681455][T27728] __x64_sys_sendmmsg+0x64/0x80 [ 1382.686354][T27728] do_syscall_64+0xcc/0x3a0 [ 1382.690883][T27728] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1382.696778][T27728] RIP: 0033:0x45aff9 [ 1382.700702][T27728] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:41 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0x94, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x80, 0x1, @m_bpf={0x7c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x3d, 0x6, "82ee12fe9c4df837937e3b29f8b4f73c6b7f65f9cff2565e1e855e2e6e47692e151b0a141e7d258bcba120edfa74f675fa625c99e640b07d1f"}}}}]}, 0x94}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xffffff9e, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1382.720314][T27728] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1382.728736][T27728] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1382.736714][T27728] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1382.744741][T27728] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1382.752721][T27728] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1382.760698][T27728] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000058 11:04:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x2000000, @remote, 0x2}, 0x1c) 11:04:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xb00, 0x10000000280}) 11:04:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xfffffff0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9e27daeff5f1e780}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0xa, 0xa, 0x702, 0x0, 0x0, {0xc, 0x0, 0x2}, [@NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x34}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0xd0}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x10001}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x20040401) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000ab15f9340000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) 11:04:42 executing program 3 (fault-call:10 fault-nth:89): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0xfffffffc, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x3f00, 0x10000000280}) 11:04:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xfffffffc}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {0x1}, {}]}]}, {0x4}}}}]}, 0xfffffe19}}, 0x0) semget(0x0, 0x4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000080), 0x4) 11:04:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:42 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1383.388316][T27774] FAULT_INJECTION: forcing a failure. [ 1383.388316][T27774] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.401074][T27774] CPU: 0 PID: 27774 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1383.409772][T27774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.420051][T27774] Call Trace: [ 1383.423420][T27774] dump_stack+0x11d/0x181 [ 1383.427762][T27774] should_fail.cold+0xa/0x1a [ 1383.432365][T27774] __should_failslab+0xee/0x130 [ 1383.437216][T27774] should_failslab+0x9/0x14 [ 1383.441739][T27774] kmem_cache_alloc+0x29/0x5d0 [ 1383.446507][T27774] ? fib6_node_lookup+0xed/0x120 [ 1383.451463][T27774] dst_alloc+0xad/0x149 [ 1383.455635][T27774] ip6_dst_alloc+0x3d/0x80 [ 1383.460085][T27774] ip6_rt_cache_alloc+0x12b/0x480 [ 1383.465137][T27774] ip6_pol_route+0x5d2/0x730 [ 1383.469734][T27774] ip6_pol_route_output+0x48/0x60 [ 1383.474761][T27774] fib6_rule_lookup+0x3d6/0x470 [ 1383.479620][T27774] ? ip6_pol_route_input+0x70/0x70 [ 1383.484744][T27774] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1383.490473][T27774] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1383.495775][T27774] ip6_route_output_flags_noref+0x16b/0x230 [ 1383.501679][T27774] ip6_route_output_flags+0x50/0x1a0 [ 1383.507006][T27774] ip6_dst_lookup_tail+0x25d/0xc50 [ 1383.512141][T27774] ? debug_smp_processor_id+0x43/0x137 [ 1383.517603][T27774] ? dst_destroy+0x210/0x210 [ 1383.522286][T27774] ? debug_smp_processor_id+0x43/0x137 [ 1383.527748][T27774] ? dst_destroy+0x210/0x210 [ 1383.532368][T27774] ? __call_rcu+0x153/0x390 [ 1383.536920][T27774] ip6_dst_lookup_flow+0x5c/0x110 [ 1383.541945][T27774] rawv6_sendmsg+0x9be/0x2340 [ 1383.546653][T27774] ? __const_udelay+0x36/0x40 [ 1383.551341][T27774] ? __udelay+0x10/0x20 [ 1383.555720][T27774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1383.561974][T27774] ? aa_label_sk_perm+0x89/0xe0 [ 1383.566879][T27774] ? aa_sk_perm+0x1d3/0x590 [ 1383.571386][T27774] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1383.577803][T27774] inet_sendmsg+0x6d/0x90 [ 1383.582130][T27774] ? inet_sendmsg+0x6d/0x90 [ 1383.586640][T27774] ? inet_send_prepare+0x200/0x200 [ 1383.591817][T27774] sock_sendmsg+0x9f/0xc0 [ 1383.596167][T27774] ____sys_sendmsg+0x212/0x4d0 [ 1383.600936][T27774] ___sys_sendmsg+0xb5/0x100 [ 1383.605530][T27774] ? __fget+0xb8/0x1d0 [ 1383.609624][T27774] ? __fget_light+0xaf/0x190 [ 1383.614420][T27774] ? __fdget+0x2c/0x40 [ 1383.618623][T27774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1383.624874][T27774] __sys_sendmmsg+0x123/0x350 [ 1383.629568][T27774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1383.635824][T27774] ? fput_many+0xec/0x130 [ 1383.640149][T27774] ? fput+0x29/0x30 [ 1383.643954][T27774] ? ksys_write+0x145/0x1b0 [ 1383.648480][T27774] __x64_sys_sendmmsg+0x64/0x80 [ 1383.653338][T27774] do_syscall_64+0xcc/0x3a0 [ 1383.657852][T27774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1383.663781][T27774] RIP: 0033:0x45aff9 [ 1383.667716][T27774] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:04:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4000, 0x10000000280}) [ 1383.687412][T27774] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1383.695926][T27774] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1383.703931][T27774] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1383.711984][T27774] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1383.720023][T27774] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1383.728037][T27774] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000059 11:04:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4800, 0x10000000280}) 11:04:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x3000000, @remote, 0x2}, 0x1c) 11:04:43 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400100, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {0x0, 0x0, 0x2}]}]}, {0x4}}}}]}, 0x78}}, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x1, &(0x7f0000000240)=[r2]) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newtaction={0xb8, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0xa4, 0x1, @m_skbmod={0xa0, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x88, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @broadcast}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x80e, 0x6, 0x7, 0x6, 0x1}, 0x3}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0xf7}, @TCA_SKBMOD_DMAC={0xa, 0x3, @random="6cd24626a8fd"}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="45f0d7425817"}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x1000}, @TCA_SKBMOD_DMAC={0xa, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xc}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="34bf2f4b931f"}]}, {0x8, 0x6, "89597b6b"}}}}]}, 0xb8}}, 0x0) fchown(r3, r1, r2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000080)={{0xc0, 0x9}, {0x80}, 0x401, 0x2, 0xd7}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmstat\x00', 0x0, 0x0) 11:04:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4c00, 0x10000000280}) 11:04:43 executing program 3 (fault-call:10 fault-nth:90): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$peeksig(0x4209, r1, &(0x7f0000000040)={0xe, 0x0, 0x6}, &(0x7f0000001580)=[{}, {}, {}, {}, {}, {}]) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0xfffffff9, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x4d0485, 0xfffffff7, [], @p_u16=&(0x7f0000000100)=0x5}}) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000280)) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=@newtaction={0x1020, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x3c, 0x1, @m_bpf={0x38, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0x5}}, @TCA_ACT_BPF_OPS={0x4}]}, {0x4}}}}, {0xfd0, 0x1, @m_pedit={0xfcc, 0xb, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xf40, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xec8, 0x2, {{{0x0, 0x5, 0x0, 0x1, 0x2}, 0x4f, 0xff, [{0xff, 0x2, 0x597c, 0x21, 0x2, 0xde38}, {0x8, 0x1, 0x8, 0x1a, 0x0, 0xf663}, {0x4, 0x1, 0x7, 0x7, 0x0, 0xd31}, {0x0, 0x2, 0xb5, 0x1000, 0x7fffffff, 0x2}, {0x100, 0xc, 0x0, 0x5, 0x7ff, 0x2}, {0x3, 0x20, 0x689b, 0x8, 0x101, 0xfff}, {0x1, 0xffffffff, 0x1f, 0x9, 0xd7, 0x1}]}, [{0x1, 0x7, 0x1000, 0x1, 0x8, 0x4}, {0x8, 0x8, 0x200, 0x7ff, 0x1, 0x2}, {0x40, 0x3, 0xb00000, 0x9, 0xc5, 0x5}, {0x7, 0x8, 0x4, 0xb6b, 0x101, 0x8}, {0xff, 0x80, 0xfff, 0x8001, 0x7, 0x20}, {0x1000, 0x1f, 0x5, 0x401, 0x6, 0x2}, {0x81, 0xc92e, 0x8, 0x80000000, 0x9, 0xf200}, {0x5, 0x1, 0x20, 0x28c47a45, 0x7fff, 0x80}, {0x8c, 0x101, 0x1, 0x7ee1e01, 0x9, 0x6}, {0x7, 0x7ff, 0x0, 0x0, 0x9, 0x8}, {0x6, 0x101, 0x4, 0x2cf1, 0x9, 0x831}, {0x800, 0x8, 0x3, 0x20, 0x7fffffff, 0x1}, {0x1, 0x41cf, 0x4, 0x24, 0x1f, 0x10000}, {0x9, 0xffffffe0, 0x5, 0xffffffff, 0x7c2, 0x5}, {0x2, 0x400, 0x20, 0x0, 0x33, 0x100}, {0x7, 0xffffffff, 0x9, 0x8, 0x400, 0x80000001}, {0xfffff000, 0x1f, 0x2, 0x4, 0x0, 0x7}, {0x1, 0x9, 0x5, 0x2, 0x0, 0xfffffffc}, {0x0, 0x1, 0x8, 0x3, 0x8, 0x10000}, {0x9, 0x8, 0x1, 0x1, 0x8, 0x2}, {0x7ff, 0x7, 0x800, 0x2, 0x81, 0x200}, {0x1f, 0x1000, 0xb59b, 0x400, 0x5, 0x10001}, {0xffffffff, 0x6, 0xfffffff8, 0x1, 0x7f, 0x1ff}, {0x4, 0x6, 0xffffff35, 0x3ff, 0x7acf, 0xe8e6}, {0x6, 0x7, 0x2, 0x0, 0x8, 0x80}, {0x7, 0x7, 0xffffffff, 0x5, 0xfe, 0xe8}, {0xfffff635, 0x0, 0x4, 0x8, 0x5, 0x8}, {0x10000, 0x8d, 0xfff, 0x8000, 0x7fff, 0x3ff}, {0xff, 0x81, 0x6, 0x7, 0x7, 0x9}, {0x401, 0x80, 0x9, 0x6, 0x3, 0x53}, {0x1000, 0x1ff, 0x4, 0x80000000, 0xf5}, {0x831d, 0x80000000, 0x0, 0xffffffff, 0x3, 0x10001}, {0xfffffffd, 0x4, 0x6, 0x578, 0x9, 0x101}, {0x4000, 0x9, 0x1, 0x101, 0x3, 0x5}, {0x8, 0x6, 0x5, 0x3, 0x1, 0xc95}, {0xd1cd, 0x3, 0x10001, 0x5, 0x100, 0x5}, {0x1ff, 0x92d6, 0x4, 0xace, 0x400, 0x7fff}, {0x0, 0x1, 0x40, 0x513, 0x1ff, 0x100}, {0x9, 0x6, 0x0, 0x7fffffff, 0x5, 0x7}, {0x8, 0x9, 0x8, 0x7f, 0x9, 0x9}, {0x6, 0x10000, 0x3, 0x0, 0x180, 0x7}, {0x8, 0x8, 0x9, 0x9501, 0x61, 0x101}, {0x550, 0x5, 0x8, 0x8000000, 0x401, 0x8}, {0x0, 0x9, 0x8, 0x80000000, 0x6, 0x7ff}, {0x5, 0x9, 0x6, 0x5202, 0x4, 0x8}, {0x7, 0x0, 0xad5e, 0x7df, 0x8, 0x7f}, {0x3, 0xf4, 0xdb5, 0xa, 0x5, 0xc85}, {0x6, 0x340, 0x9, 0xf0bb, 0x0, 0x81}, {0x0, 0x80000000, 0x8000, 0x9, 0xe73}, {0x5, 0x8, 0xffffffe2, 0x0, 0x0, 0x527}, {0x6, 0x7, 0x7fffffff, 0x101, 0x6, 0x8}, {0x8000, 0x9, 0x2, 0xfffffb76, 0x1000, 0x48912901}, {0xb03c, 0x1, 0xaa, 0x3f, 0x0, 0x101}, {0x40, 0x7ff, 0x1, 0x3, 0x5, 0x3ff}, {0xbfa, 0x7, 0x5021, 0x7, 0x1ff, 0x7}, {0x8, 0x1ff, 0x3, 0x8, 0x90ed, 0x1}, {0xfffffffa, 0x8, 0x3ff, 0x8, 0xffffffff, 0x80000001}, {0x9, 0x7, 0x80000000, 0x2, 0x2, 0x7}, {0xd42, 0xce, 0xffffffff, 0x80000001, 0x5, 0xe73}, {0x5, 0x7, 0x9, 0xfffffff9, 0x80000001, 0x23}, {0x0, 0x4, 0xb51, 0xfff, 0x7, 0x3}, {0x2, 0x4, 0x101, 0x4, 0x7fffffff, 0x4}, {0x29, 0x8001, 0x5, 0x0, 0x7}, {0x40000000, 0x1, 0x8001, 0x4, 0x7f, 0xfffffff7}, {0xfffffcf5, 0x1b0c, 0x3, 0x32ec3a00, 0x8, 0x1}, {0x6, 0x7f, 0x7, 0x2, 0x9, 0xfffffffc}, {0x6, 0x7fffffff, 0xdc93, 0x800, 0x8001, 0x9}, {0xfffffff7, 0x4, 0xffff9d13, 0x3, 0x7, 0x7}, {0x10001, 0x2, 0x1, 0x1000, 0xb9, 0x81}, {0x100, 0x7, 0x1, 0x2, 0x1000, 0x2}, {0xfff, 0x7fff, 0x6, 0x6, 0x0, 0xfffff001}, {0x9, 0x9, 0xeb, 0x6, 0x1, 0x10}, {0x37b8, 0x1, 0x3ff, 0x714f6bd8, 0x3, 0x68}, {0xff, 0x0, 0x3, 0x81, 0x5, 0x8}, {0x5, 0x200, 0x1000, 0x6, 0xe83c, 0x9}, {0x4, 0x9, 0x4, 0x1, 0x34, 0xfff}, {0x80, 0x3, 0x80, 0x7, 0x8, 0x6}, {0x9, 0xf6, 0x9, 0x0, 0x3}, {0x40, 0x9, 0x8, 0x7fff, 0x7, 0x7f}, {0x7, 0x9, 0x5, 0x998, 0xe77a, 0x3985178a}, {0xfff, 0x2, 0x9, 0xf00b, 0x7fff, 0x2}, {0x8, 0x99b5, 0x5, 0xffffffff, 0x5cc, 0x200}, {0x7, 0x7, 0x0, 0x200, 0xffffffff, 0x40}, {0x7, 0x5, 0x6, 0x8, 0x100, 0x10000}, {0x9, 0x1c000000, 0x100, 0x7, 0x0, 0x8}, {0x54e3, 0x5, 0x80, 0x20, 0x5af, 0x3f}, {0x3, 0x5, 0x3, 0x7fff, 0x7f, 0x80000000}, {0x7, 0x200, 0x5, 0x1, 0x7, 0x80000000}, {0x2, 0x2, 0xfff, 0xffff0000, 0x8000}, {0x8, 0x4, 0x3ff, 0x7864, 0x1, 0x400}, {0x2, 0x5, 0x2, 0x3ff, 0x9, 0x100}, {0x9, 0xfffffffc, 0x0, 0xa6a6, 0x5ce, 0x5}, {0xbf, 0x4, 0x2, 0x6, 0x80, 0x3}, {0xe90d, 0x8, 0x3, 0x0, 0x0, 0x5}, {0x8, 0x1f, 0x1000, 0x8000, 0x9}, {0x7fffffff, 0xfffffb0f, 0x8f, 0x47, 0x6, 0x3}, {0x7, 0x400, 0x14, 0x9, 0x2, 0x81}, {0x1, 0x3, 0x5c89, 0x6, 0x1, 0x6}, {0x3f, 0x80, 0x3, 0x80000000, 0x5, 0xdba}, {0x7f, 0x4, 0x1, 0x8001, 0x10000, 0x40}, {0x3e2b, 0xffff, 0x0, 0x5, 0x6, 0x8}, {0x3f, 0x1, 0x0, 0xff, 0x7ff, 0x8}, {0x8, 0x1000, 0x9, 0xf927, 0xfffffffc, 0x2}, {0x2, 0x4, 0x0, 0x8, 0x3f, 0x5e}, {0x4, 0x5, 0x5a, 0xa4, 0x7f, 0x7fff}, {0x3, 0xffff, 0x9, 0x80, 0x6, 0xfc}, {0x8, 0xfffffffe, 0x0, 0x6, 0x0, 0x4e58}, {0x2, 0x2, 0xffff, 0x80, 0x200, 0x2}, {0x3, 0x5, 0x1f, 0x10001, 0x7, 0x4d7}, {0x82f2, 0x3f, 0xff, 0x1, 0x0, 0x5}, {0x3f, 0x1, 0x1a2, 0x2, 0x161c, 0xffffff7f}, {0x2, 0x6, 0x7fff, 0x8, 0x89, 0x7}, {0x2, 0x5, 0xfffffffb, 0x8162, 0x4}, {0x80, 0xfffffffa, 0x5, 0x9, 0x74e, 0x7}, {0xf79, 0x242, 0xffffff80, 0x10000, 0x7, 0x81}, {0x3f, 0x7, 0x9, 0x7ff, 0x1, 0x21ca}, {0x401, 0x100, 0x6, 0x5, 0x8, 0x2}, {0x7ff, 0x80, 0x4, 0x10001, 0x6, 0x2}, {0x8, 0xaf7a, 0x9, 0x5, 0xfffffff7, 0x1ff}, {0x63a3c3ce, 0x7, 0xc6a2, 0x9, 0x8001, 0xb94a}, {0xa17, 0x3f, 0x7, 0x3f, 0xff}, {0x400, 0x4, 0x8, 0x800, 0x3, 0x7fff}, {0x1, 0x3, 0x0, 0x80000001, 0x8, 0xffffffef}, {0xfe, 0x1, 0x1, 0x2, 0x1f}, {0x8001, 0x100, 0x3, 0x3ff, 0x6, 0xffffffff}, {0x8000, 0x0, 0x1b4f, 0x1ff, 0x2, 0x2}, {0x80000001, 0x0, 0x7ff, 0x1, 0x5, 0x53d7}, {0x1e, 0x3, 0x8, 0x200, 0x2, 0x412}], [{0x0, 0x1}, {0x1}, {0x3, 0x2f163ccd7015bc1f}, {}, {0x0, 0x1}, {}, {0x5, 0x1}, {}, {0x5, 0x1}, {0x2, 0x1}, {0xfaae5734ba70c227}, {0x5}, {0x5}, {0x3, 0x1}, {0x1}, {0x658b8f6434b9d9e0, 0x29a9248c1c7edb73}, {0x2}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x5}, {0x1, 0x1}, {0x3}, {0x5}, {0x4}, {0x3}, {0x3, 0x2}, {0x3}, {0x2, 0x1}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x1}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {}, {0xdbec9acda2d96a4b}, {0x5, 0x1}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {0x0, 0x7bbdb9df4afae9e1}, {0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {}, {0x4, 0x3}, {0x3}, {}, {0x6a0ae8ce89a25f00}, {0x2, 0x1}, {}, {0x430fafa6471421f2, 0x1}, {0x1}, {0x5, 0x2}, {0xd8d8e8078784eb0e}, {0x3, 0x9f50f77bb6305c62}, {0x1, 0x2}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x2}, {0x3}, {0x15b6ecd454f49432}, {0x2}, {0x4}, {}, {0x5, 0x3}, {0x1, 0x2}, {0x2, 0x3}, {0x5}, {0x4, 0x1}, {0x467d4a6068246a9c}, {0x1, 0x1}, {0x4, 0x3}, {0x5}, {0x0, 0x1}, {0x1, 0x1}, {0x3}, {0xb, 0x1}, {0x7, 0x3}, {0x559bb25fea5ad94e, 0x1}, {0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x4, 0xc464102e793a8d60}, {0x4}, {0x4, 0x1}, {0x5}, {0x5, 0xb9827fca5dd93238}, {0x5}, {0x3}, {0x1}, {0x4}, {0x0, 0x1}, {0x0, 0x3}, {0x2, 0xa1d75c2959640a98}, {0x3}, {0x2, 0x1}, {0x7, 0x1}, {0x4edb77c1da11d0fd}, {0x5, 0x2}, {0x5}, {0x5}, {}, {0x2, 0x3}, {0x4}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x2}], 0x1}}, @TCA_PEDIT_KEYS_EX={0x74, 0x5, [@TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x3c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x2d0, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}]}, {0x7b, 0x6, "ffa8eed9441cf2188733e1af3b59ce58bc578b167492e1be337d9d09e101ee73989b2bf0e93c6e0afb3e4b272f2a0dec6cc3b0edee30718f14bba6c5e656876827e933e708a5d005a090e41d34e380dd528499cee4fcb99b87b456b882b81bc9d98a23f88024afdbed00981f3f58fb5de17f5d9b1f7aa2"}}}}]}, 0x1020}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="5800000030004ff6000000000000000000000000441001004000010008000100627066003000028018000200000000000000000000000000002aa4fc99412b0a1a6bd76a00000000", @ANYRES32, @ANYBLOB="060003000000000004000600"], 0x58}}, 0x0) sendmsg$nl_crypto(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800820}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xe0}, 0x1, 0x0, 0x0, 0x1000c040}, 0x0) [ 1384.295694][T27804] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1384.361159][T27807] FAULT_INJECTION: forcing a failure. [ 1384.361159][T27807] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.373881][T27807] CPU: 0 PID: 27807 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1384.382559][T27807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.392614][T27807] Call Trace: [ 1384.395924][T27807] dump_stack+0x11d/0x181 [ 1384.400277][T27807] should_fail.cold+0xa/0x1a [ 1384.404888][T27807] __should_failslab+0xee/0x130 [ 1384.409825][T27807] should_failslab+0x9/0x14 [ 1384.414343][T27807] kmem_cache_alloc+0x29/0x5d0 [ 1384.419118][T27807] ? fib6_node_lookup+0xed/0x120 [ 1384.424143][T27807] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1384.429895][T27807] ? ip6_dst_gc+0x1c4/0x220 [ 1384.434443][T27807] dst_alloc+0xad/0x149 [ 1384.438620][T27807] ip6_dst_alloc+0x3d/0x80 [ 1384.443133][T27807] ip6_rt_cache_alloc+0x12b/0x480 [ 1384.448250][T27807] ip6_pol_route+0x5d2/0x730 [ 1384.452871][T27807] ip6_pol_route_output+0x48/0x60 [ 1384.457916][T27807] fib6_rule_lookup+0x3d6/0x470 [ 1384.462845][T27807] ? ip6_pol_route_input+0x70/0x70 [ 1384.467960][T27807] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1384.473691][T27807] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1384.478914][T27807] ip6_route_output_flags_noref+0x16b/0x230 [ 1384.485149][T27807] ip6_route_output_flags+0x50/0x1a0 [ 1384.490519][T27807] ip6_dst_lookup_tail+0x25d/0xc50 [ 1384.495661][T27807] ? debug_smp_processor_id+0x43/0x137 [ 1384.501126][T27807] ? dst_destroy+0x210/0x210 [ 1384.505745][T27807] ? debug_smp_processor_id+0x43/0x137 [ 1384.511208][T27807] ? dst_destroy+0x210/0x210 [ 1384.515847][T27807] ? __call_rcu+0x153/0x390 [ 1384.520462][T27807] ip6_dst_lookup_flow+0x5c/0x110 [ 1384.525495][T27807] rawv6_sendmsg+0x9be/0x2340 [ 1384.530260][T27807] ? __const_udelay+0x36/0x40 [ 1384.535558][T27807] ? __udelay+0x10/0x20 [ 1384.539720][T27807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1384.545973][T27807] ? aa_label_sk_perm+0x89/0xe0 [ 1384.550828][T27807] ? aa_sk_perm+0x1d3/0x590 [ 1384.555347][T27807] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1384.561743][T27807] inet_sendmsg+0x6d/0x90 [ 1384.566100][T27807] ? inet_sendmsg+0x6d/0x90 [ 1384.570599][T27807] ? inet_send_prepare+0x200/0x200 [ 1384.575711][T27807] sock_sendmsg+0x9f/0xc0 [ 1384.580073][T27807] ____sys_sendmsg+0x212/0x4d0 [ 1384.584915][T27807] ___sys_sendmsg+0xb5/0x100 [ 1384.589706][T27807] ? __fget+0xb8/0x1d0 [ 1384.593929][T27807] ? __fget_light+0xaf/0x190 [ 1384.598518][T27807] ? __fdget+0x2c/0x40 [ 1384.602656][T27807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1384.608935][T27807] __sys_sendmmsg+0x123/0x350 [ 1384.613856][T27807] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1384.620094][T27807] ? fput_many+0xec/0x130 [ 1384.624475][T27807] ? fput+0x29/0x30 [ 1384.628292][T27807] ? ksys_write+0x145/0x1b0 [ 1384.632811][T27807] __x64_sys_sendmmsg+0x64/0x80 [ 1384.637708][T27807] do_syscall_64+0xcc/0x3a0 [ 1384.642224][T27807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1384.648112][T27807] RIP: 0033:0x45aff9 [ 1384.652053][T27807] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1384.671786][T27807] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1384.680422][T27807] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1384.688513][T27807] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1384.696490][T27807] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1384.704575][T27807] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6800, 0x10000000280}) [ 1384.712810][T27807] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000005a 11:04:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000000240)={@mcast1, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280, r4}) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40040000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r2, 0x200, 0x0, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x3}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044007}, 0x6840) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x102801}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x11a8, r2, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0x1130, 0x7d, [@NL80211_BAND_5GHZ={0x45, 0x1, "3df5879a54d6f843998963815a8a4ddded529c857e90b245d00220eab83ad2aad107103955333e7df578f4ec18e2a9c377f22f39f1b3e667f13e87a3c58362001f"}, @NL80211_BAND_60GHZ={0x1004, 0x2, "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"}, @NL80211_BAND_60GHZ={0xe0, 0x2, "7c2b2335cd99e4e6d7bca8747797c921a3e2133ab50a120880b348b2157b9c143f6076d9532dbfa9056de62a35063d2a50c4d7f51101c9e305c9fcc62e5fb66209ae87ccbc876b6128ee20be70b7f4a524a1550d313ef62d4ce1a55aea6d7faaca6ad54e65f8ebdee897a35eff4fdff3478a3e9010ce42a0ce13be8826ea1df4c8d8bdff7550313336844dd7d93b3bf7b4b942fab808911e0260ffb34035e64bbf794699a6bea696fb3a85fb6d6684088427c73f09867fbfedee0b53786e0913e2cf5dae9ffd6fd8253b186f5dec6a608efd66e2919b7bc5046a5920"}]}, @NL80211_ATTR_SCAN_SSIDS={0x5c, 0x2d, [{0x8, 0x0, [0x5, 0xf, 0x3, 0x8]}, {0xc, 0x0, [0x1d, 0x0, 0x5, 0x11, 0x1e, 0xe, 0x1e, 0x6]}, {0x7, 0x0, [0x5, 0x1b, 0xa]}, {0xb, 0x0, [0x15, 0x1c, 0x1, 0x1c, 0x9, 0x4, 0x19]}, {0x7, 0x0, [0x10, 0x9, 0x1f]}, {0x8, 0x0, [0x5, 0x11, 0x15, 0x14]}, {0x6, 0x0, [0x14, 0x15]}, {0x7, 0x0, [0x6, 0x1, 0x3]}, {0xe, 0x0, [0x1a, 0x20, 0x1b, 0x1, 0x4, 0xd, 0x8, 0x9, 0x8, 0xb]}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x6}]}, 0x11a8}, 0x1, 0x0, 0x0, 0x4}, 0x800) 11:04:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x4000000, @remote, 0x2}, 0x1c) 11:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000080)={0x6, 0x8, 0x3}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {0x0, 0x0, 0x0, 0x4000000}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6c00, 0x10000000280}) 11:04:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:44 executing program 3 (fault-call:10 fault-nth:91): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7400, 0x10000000280}) 11:04:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x4, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1385.426654][T27844] FAULT_INJECTION: forcing a failure. [ 1385.426654][T27844] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.439518][T27844] CPU: 1 PID: 27844 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1385.448200][T27844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.458255][T27844] Call Trace: [ 1385.461627][T27844] dump_stack+0x11d/0x181 [ 1385.465976][T27844] should_fail.cold+0xa/0x1a [ 1385.470588][T27844] __should_failslab+0xee/0x130 [ 1385.475540][T27844] should_failslab+0x9/0x14 [ 1385.480067][T27844] kmem_cache_alloc+0x29/0x5d0 [ 1385.484849][T27844] ? fib6_node_lookup+0xed/0x120 [ 1385.489799][T27844] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1385.495584][T27844] ? ip6_dst_gc+0x1c4/0x220 [ 1385.500263][T27844] dst_alloc+0xad/0x149 [ 1385.504440][T27844] ip6_dst_alloc+0x3d/0x80 [ 1385.508872][T27844] ip6_rt_cache_alloc+0x12b/0x480 [ 1385.514005][T27844] ip6_pol_route+0x5d2/0x730 [ 1385.518617][T27844] ip6_pol_route_output+0x48/0x60 [ 1385.523804][T27844] fib6_rule_lookup+0x3d6/0x470 [ 1385.528670][T27844] ? ip6_pol_route_input+0x70/0x70 [ 1385.533853][T27844] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1385.539592][T27844] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1385.544964][T27844] ip6_route_output_flags_noref+0x16b/0x230 [ 1385.551031][T27844] ip6_route_output_flags+0x50/0x1a0 [ 1385.556432][T27844] ip6_dst_lookup_tail+0x25d/0xc50 [ 1385.561661][T27844] ? debug_smp_processor_id+0x43/0x137 [ 1385.567599][T27844] ? dst_destroy+0x210/0x210 11:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) socketpair(0x1d, 0x80000, 0xff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0xf8, r2, 0x4df, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}]}, 0xf8}}, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0xc4, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0xc4}, 0x1, 0x0, 0x0, 0xc0}, 0x80800) [ 1385.572203][T27844] ? debug_smp_processor_id+0x43/0x137 [ 1385.577709][T27844] ? dst_destroy+0x210/0x210 [ 1385.582324][T27844] ? __call_rcu+0x153/0x390 [ 1385.586896][T27844] ip6_dst_lookup_flow+0x5c/0x110 [ 1385.591942][T27844] rawv6_sendmsg+0x9be/0x2340 [ 1385.596677][T27844] ? __const_udelay+0x36/0x40 [ 1385.601570][T27844] ? __udelay+0x10/0x20 [ 1385.605787][T27844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1385.612047][T27844] ? aa_label_sk_perm+0x89/0xe0 [ 1385.616927][T27844] ? aa_sk_perm+0x1d3/0x590 11:04:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x5, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1385.621503][T27844] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1385.627883][T27844] inet_sendmsg+0x6d/0x90 [ 1385.632227][T27844] ? inet_sendmsg+0x6d/0x90 [ 1385.636828][T27844] ? inet_send_prepare+0x200/0x200 [ 1385.641989][T27844] sock_sendmsg+0x9f/0xc0 [ 1385.646351][T27844] ____sys_sendmsg+0x212/0x4d0 [ 1385.651222][T27844] ___sys_sendmsg+0xb5/0x100 [ 1385.655861][T27844] ? __fget+0xb8/0x1d0 [ 1385.659982][T27844] ? __fget_light+0xaf/0x190 [ 1385.664592][T27844] ? __fdget+0x2c/0x40 [ 1385.668718][T27844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1385.675076][T27844] __sys_sendmmsg+0x123/0x350 [ 1385.679859][T27844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1385.686099][T27844] ? fput_many+0xec/0x130 [ 1385.690555][T27844] ? fput+0x29/0x30 [ 1385.694374][T27844] ? ksys_write+0x145/0x1b0 [ 1385.699115][T27844] __x64_sys_sendmmsg+0x64/0x80 [ 1385.703989][T27844] do_syscall_64+0xcc/0x3a0 [ 1385.708601][T27844] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1385.714504][T27844] RIP: 0033:0x45aff9 [ 1385.718460][T27844] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1385.738259][T27844] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1385.746867][T27844] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1385.755369][T27844] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1385.763367][T27844] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1385.771351][T27844] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1385.779380][T27844] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000005b 11:04:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x5000000, @remote, 0x2}, 0x1c) 11:04:44 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xd) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x3b0}}}}]}, 0x78}}, 0x0) 11:04:44 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) sendfile(r1, r0, &(0x7f0000000000), 0xfec) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x30, r2, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7a00, 0x10000000280}) 11:04:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x6, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:45 executing program 3 (fault-call:10 fault-nth:92): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xff00, 0x10000000280}) 11:04:45 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0x7, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000030004ff60000000000000000000000006400010060000100080001006270660050000280060003000500000018000200000000000000846e040008000000000000000000000000000000000000000000000000000000000000000000000000000000040006000000000000000000000000000053d5083f8176f6f0fa10cd2889a6b95b00"], 0x78}}, 0x0) 11:04:45 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#\'%node]q\x9b\xee\xf5\x88@\xc7v\xfe\xc7\x83\xbd\x81\xdb\x00', 0xa) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="5800000030004ff600000000000000000000000044000100400001000800010062706600300002801800020000000000000000000000000000000000000000000400040008000500", @ANYRES32, @ANYBLOB="060003000000000004000600e3acaab6c72da48bed4db60f3285020dda24f67cf3ae6ca856ba1a4ebc5511107f752fa6b476165920716c7a5097c464432fd0e06360dde75ae7828fb066c09ea4efa007c5c0dc6b24bd58741678b7af2b53f8d3eaaaf40f412775f0738104788d2139074c73255630d7871aac4a217ff2b085a8b7d3bea0b3566f07345d86ec169b4544209b040e5bd0625bc0f48ec0ccb96e67373ed62fe0f5f1b96f6cd9394faa4ff3fe7cd353a729355dee7fd4699ab9f10f7005fbe7905bcd3481e33350f35adcf6de580ef8c2b58d67a9c5a68be573d725fb3c3f4e9a5d05588c"], 0x58}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r1, 0x8}, {r2, 0xa}, {r3, 0x1508}, {r4, 0x1a}, {r5, 0x2218}, {r0, 0x4}, {r6}], 0x7, &(0x7f0000000140)={r7, r8+10000000}, &(0x7f0000000180)={0x6}, 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x7, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1386.388620][T27884] FAULT_INJECTION: forcing a failure. [ 1386.388620][T27884] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.402652][T27884] CPU: 1 PID: 27884 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1386.412092][T27884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.422425][T27884] Call Trace: [ 1386.425941][T27884] dump_stack+0x11d/0x181 [ 1386.431069][T27884] should_fail.cold+0xa/0x1a [ 1386.435808][T27884] __should_failslab+0xee/0x130 [ 1386.440752][T27884] should_failslab+0x9/0x14 [ 1386.445433][T27884] kmem_cache_alloc+0x29/0x5d0 [ 1386.452223][T27884] ? fib6_node_lookup+0xed/0x120 [ 1386.457621][T27884] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1386.463440][T27884] ? ip6_dst_gc+0x1c4/0x220 [ 1386.468003][T27884] dst_alloc+0xad/0x149 [ 1386.472179][T27884] ip6_dst_alloc+0x3d/0x80 [ 1386.476698][T27884] ip6_rt_cache_alloc+0x12b/0x480 [ 1386.483988][T27884] ip6_pol_route+0x5d2/0x730 11:04:45 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1386.488597][T27884] ? __const_udelay+0x36/0x40 [ 1386.494339][T27884] ip6_pol_route_output+0x48/0x60 [ 1386.499572][T27884] fib6_rule_lookup+0x3d6/0x470 [ 1386.504555][T27884] ? ip6_pol_route_input+0x70/0x70 [ 1386.509703][T27884] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1386.515712][T27884] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1386.520927][T27884] ip6_route_output_flags_noref+0x16b/0x230 [ 1386.526959][T27884] ip6_route_output_flags+0x50/0x1a0 [ 1386.532450][T27884] ip6_dst_lookup_tail+0x25d/0xc50 [ 1386.537587][T27884] ? debug_smp_processor_id+0x43/0x137 [ 1386.543048][T27884] ? dst_destroy+0x210/0x210 [ 1386.547730][T27884] ? debug_smp_processor_id+0x43/0x137 [ 1386.553192][T27884] ? dst_destroy+0x210/0x210 [ 1386.557797][T27884] ? __call_rcu+0x153/0x390 [ 1386.562497][T27884] ip6_dst_lookup_flow+0x5c/0x110 [ 1386.567515][T27884] rawv6_sendmsg+0x9be/0x2340 [ 1386.572258][T27884] ? process_measurement+0x149/0x1190 [ 1386.577872][T27884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1386.584586][T27884] ? aa_label_sk_perm+0x89/0xe0 [ 1386.590228][T27884] ? aa_sk_perm+0x1d3/0x590 [ 1386.594937][T27884] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1386.602378][T27884] inet_sendmsg+0x6d/0x90 [ 1386.606785][T27884] ? inet_sendmsg+0x6d/0x90 [ 1386.611396][T27884] ? inet_send_prepare+0x200/0x200 [ 1386.616588][T27884] sock_sendmsg+0x9f/0xc0 [ 1386.621009][T27884] ____sys_sendmsg+0x212/0x4d0 [ 1386.625868][T27884] ___sys_sendmsg+0xb5/0x100 [ 1386.630482][T27884] ? __fget+0xb8/0x1d0 [ 1386.634573][T27884] ? __fget_light+0xaf/0x190 [ 1386.639166][T27884] ? __fdget+0x2c/0x40 [ 1386.643262][T27884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1386.649643][T27884] __sys_sendmmsg+0x123/0x350 [ 1386.654339][T27884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1386.660778][T27884] ? fput_many+0xec/0x130 [ 1386.665462][T27884] ? fput+0x29/0x30 [ 1386.669339][T27884] ? ksys_write+0x145/0x1b0 [ 1386.674293][T27884] __x64_sys_sendmmsg+0x64/0x80 [ 1386.679216][T27884] do_syscall_64+0xcc/0x3a0 [ 1386.683853][T27884] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1386.689786][T27884] RIP: 0033:0x45aff9 [ 1386.693712][T27884] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1386.713491][T27884] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1386.722105][T27884] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1386.730099][T27884] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 11:04:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x1000000, 0x10000000280}) [ 1386.738125][T27884] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1386.746285][T27884] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1386.754636][T27884] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000005c [ 1386.786271][T27887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1386.837632][T27887] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x6000000, @remote, 0x2}, 0x1c) 11:04:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x2000000, 0x10000000280}) 11:04:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = accept4$rose(0xffffffffffffffff, &(0x7f0000000080)=@full={0xb, @dev, @remote, 0x0, [@rose, @default, @default, @remote, @null, @rose]}, &(0x7f00000000c0)=0x40, 0x180800) fcntl$setflags(r1, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x8, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:46 executing program 3 (fault-call:10 fault-nth:93): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x3000000, 0x10000000280}) 11:04:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @loopback, 0x1}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x13, 0x30, 0x5cb2410691e7f64f}, 0x14}}, 0x8000) 11:04:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4000000, 0x10000000280}) 11:04:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x9, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1387.425758][T27923] FAULT_INJECTION: forcing a failure. [ 1387.425758][T27923] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.439124][T27923] CPU: 1 PID: 27923 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1387.447956][T27923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1387.458013][T27923] Call Trace: [ 1387.461321][T27923] dump_stack+0x11d/0x181 [ 1387.465679][T27923] should_fail.cold+0xa/0x1a [ 1387.470329][T27923] __should_failslab+0xee/0x130 11:04:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100627066005000028006000380050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000080)) [ 1387.475194][T27923] should_failslab+0x9/0x14 [ 1387.479705][T27923] kmem_cache_alloc+0x29/0x5d0 [ 1387.484486][T27923] ? fib6_node_lookup+0xed/0x120 [ 1387.489441][T27923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1387.495975][T27923] ? ip6_dst_gc+0x1c4/0x220 [ 1387.500502][T27923] dst_alloc+0xad/0x149 [ 1387.504743][T27923] ip6_dst_alloc+0x3d/0x80 [ 1387.509179][T27923] ip6_rt_cache_alloc+0x12b/0x480 [ 1387.514308][T27923] ip6_pol_route+0x5d2/0x730 [ 1387.518927][T27923] ip6_pol_route_output+0x48/0x60 [ 1387.523982][T27923] fib6_rule_lookup+0x3d6/0x470 [ 1387.528932][T27923] ? ip6_pol_route_input+0x70/0x70 [ 1387.534153][T27923] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1387.540019][T27923] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1387.545360][T27923] ip6_route_output_flags_noref+0x16b/0x230 [ 1387.551537][T27923] ip6_route_output_flags+0x50/0x1a0 [ 1387.557217][T27923] ip6_dst_lookup_tail+0x25d/0xc50 [ 1387.562437][T27923] ? debug_smp_processor_id+0x43/0x137 [ 1387.567923][T27923] ? dst_destroy+0x210/0x210 11:04:46 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000200)='/dev/md0\x00', 0x28000, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={r6, 0x3}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={r7, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x80000001, @local, 0x7}]}, &(0x7f0000000180)=0x10) [ 1387.572604][T27923] ? debug_smp_processor_id+0x43/0x137 [ 1387.578329][T27923] ? dst_destroy+0x210/0x210 [ 1387.583077][T27923] ? __call_rcu+0x153/0x390 [ 1387.587652][T27923] ip6_dst_lookup_flow+0x5c/0x110 [ 1387.592729][T27923] rawv6_sendmsg+0x9be/0x2340 [ 1387.597480][T27923] ? __const_udelay+0x36/0x40 [ 1387.602280][T27923] ? __udelay+0x10/0x20 [ 1387.606429][T27923] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1387.612721][T27923] ? aa_label_sk_perm+0x89/0xe0 [ 1387.618230][T27923] ? aa_sk_perm+0x1d3/0x590 [ 1387.622929][T27923] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1387.629501][T27923] inet_sendmsg+0x6d/0x90 [ 1387.633991][T27923] ? inet_sendmsg+0x6d/0x90 [ 1387.638491][T27923] ? inet_send_prepare+0x200/0x200 [ 1387.643788][T27923] sock_sendmsg+0x9f/0xc0 [ 1387.648213][T27923] ____sys_sendmsg+0x212/0x4d0 [ 1387.653152][T27923] ___sys_sendmsg+0xb5/0x100 [ 1387.658394][T27923] ? __fget+0xb8/0x1d0 [ 1387.662598][T27923] ? __fget_light+0xaf/0x190 [ 1387.668051][T27923] ? __fdget+0x2c/0x40 [ 1387.672131][T27923] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1387.678435][T27923] __sys_sendmmsg+0x123/0x350 [ 1387.683275][T27923] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1387.689748][T27923] ? fput_many+0xec/0x130 [ 1387.694087][T27923] ? fput+0x29/0x30 [ 1387.698014][T27923] ? ksys_write+0x145/0x1b0 [ 1387.702540][T27923] __x64_sys_sendmmsg+0x64/0x80 [ 1387.707515][T27923] do_syscall_64+0xcc/0x3a0 [ 1387.712009][T27923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1387.717891][T27923] RIP: 0033:0x45aff9 [ 1387.721783][T27923] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1387.742116][T27923] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1387.750539][T27923] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1387.758514][T27923] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1387.766573][T27923] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1387.774538][T27923] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1387.782498][T27923] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000005d 11:04:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x7000000, @remote, 0x2}, 0x1c) 11:04:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x5000000, 0x10000000280}) 11:04:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xa, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:47 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2401, 0x0) connect$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff60000000000000000000000006400010060000100080001006270660050000280060003000500000000000000000000000000000000000000002c000400080000000000000000000000000000000000000008000000000000000000000000000000000000000400060000000000000000"], 0x78}}, 0x0) 11:04:47 executing program 3 (fault-call:10 fault-nth:94): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xb, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6000000, 0x10000000280}) [ 1388.264358][T27953] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1388.276960][T27953] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x80, 0x2, 0x2, 0x201, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASK={0x10, 0x3, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x84}}]}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x80}, @CTA_EXPECT_ID={0x8, 0x5, 0x6}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}, @CTA_EXPECT_MASK={0x1c, 0x3, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}]}, @CTA_EXPECT_HELP_NAME={0xa, 0x6, 'H.245\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x4}]}, 0x80}, 0x1, 0x0, 0x0, 0x1a0df82b0c2baa78}, 0x40000) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f00000000c0)={0x20, 0x3, 0xf4, 0x4b5822de, 0x800}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800004ff6000000000000000000000000640001006000010008000100627066000300028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000280)={0x4, 0x1, @raw_data=[0x9, 0x401, 0x4, 0xffffff80, 0x4bbf, 0x4, 0x9, 0x2, 0x8001, 0x8, 0x7, 0xfffffffe, 0x8, 0x0, 0xfffff800, 0x2]}) [ 1388.446322][T27963] FAULT_INJECTION: forcing a failure. [ 1388.446322][T27963] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.459038][T27963] CPU: 0 PID: 27963 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1388.467719][T27963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.477893][T27963] Call Trace: [ 1388.481194][T27963] dump_stack+0x11d/0x181 [ 1388.485587][T27963] should_fail.cold+0xa/0x1a [ 1388.490321][T27963] __should_failslab+0xee/0x130 [ 1388.495205][T27963] should_failslab+0x9/0x14 [ 1388.499732][T27963] kmem_cache_alloc+0x29/0x5d0 [ 1388.504510][T27963] ? fib6_node_lookup+0xed/0x120 [ 1388.509552][T27963] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1388.515278][T27963] ? ip6_dst_gc+0x1c4/0x220 [ 1388.519794][T27963] dst_alloc+0xad/0x149 [ 1388.523966][T27963] ip6_dst_alloc+0x3d/0x80 [ 1388.528401][T27963] ip6_rt_cache_alloc+0x12b/0x480 [ 1388.533446][T27963] ip6_pol_route+0x5d2/0x730 [ 1388.538092][T27963] ip6_pol_route_output+0x48/0x60 [ 1388.543146][T27963] fib6_rule_lookup+0x3d6/0x470 [ 1388.548018][T27963] ? ip6_pol_route_input+0x70/0x70 [ 1388.553148][T27963] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1388.558878][T27963] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1388.564153][T27963] ip6_route_output_flags_noref+0x16b/0x230 [ 1388.570059][T27963] ip6_route_output_flags+0x50/0x1a0 [ 1388.575379][T27963] ip6_dst_lookup_tail+0x25d/0xc50 [ 1388.580500][T27963] ? debug_smp_processor_id+0x43/0x137 [ 1388.585976][T27963] ? dst_destroy+0x210/0x210 [ 1388.590581][T27963] ? debug_smp_processor_id+0x43/0x137 [ 1388.596047][T27963] ? dst_destroy+0x210/0x210 [ 1388.600853][T27963] ? __call_rcu+0x153/0x390 [ 1388.605560][T27963] ip6_dst_lookup_flow+0x5c/0x110 [ 1388.610697][T27963] rawv6_sendmsg+0x9be/0x2340 [ 1388.615400][T27963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1388.621655][T27963] ? debug_smp_processor_id+0x43/0x137 [ 1388.627167][T27963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1388.633453][T27963] ? aa_label_sk_perm+0x89/0xe0 [ 1388.638466][T27963] ? aa_sk_perm+0x1d3/0x590 [ 1388.643013][T27963] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1388.649351][T27963] inet_sendmsg+0x6d/0x90 [ 1388.653715][T27963] ? inet_sendmsg+0x6d/0x90 [ 1388.658240][T27963] ? inet_send_prepare+0x200/0x200 [ 1388.663374][T27963] sock_sendmsg+0x9f/0xc0 [ 1388.667719][T27963] ____sys_sendmsg+0x212/0x4d0 [ 1388.672551][T27963] ___sys_sendmsg+0xb5/0x100 [ 1388.677168][T27963] ? __fget+0xb8/0x1d0 [ 1388.681326][T27963] ? __fget_light+0xaf/0x190 [ 1388.685932][T27963] ? __fdget+0x2c/0x40 [ 1388.690070][T27963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1388.696326][T27963] __sys_sendmmsg+0x123/0x350 [ 1388.701178][T27963] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1388.707603][T27963] ? fput_many+0xec/0x130 [ 1388.712206][T27963] ? fput+0x29/0x30 [ 1388.716026][T27963] ? ksys_write+0x145/0x1b0 [ 1388.720568][T27963] __x64_sys_sendmmsg+0x64/0x80 [ 1388.725875][T27963] do_syscall_64+0xcc/0x3a0 [ 1388.730486][T27963] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1388.736478][T27963] RIP: 0033:0x45aff9 11:04:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xc, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7000000, 0x10000000280}) [ 1388.740410][T27963] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1388.760145][T27963] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1388.768616][T27963] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1388.776791][T27963] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1388.784842][T27963] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1388.792825][T27963] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1388.800827][T27963] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000005e 11:04:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xe, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:48 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xa3f0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x8000000, @remote, 0x2}, 0x1c) 11:04:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x8000000, 0x10000000280}) 11:04:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xf, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:48 executing program 3 (fault-call:10 fault-nth:95): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xb000000, 0x10000000280}) 11:04:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x10, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1389.458300][T28003] FAULT_INJECTION: forcing a failure. [ 1389.458300][T28003] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.471074][T28003] CPU: 1 PID: 28003 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1389.479770][T28003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.489948][T28003] Call Trace: [ 1389.493264][T28003] dump_stack+0x11d/0x181 [ 1389.497654][T28003] should_fail.cold+0xa/0x1a [ 1389.502261][T28003] __should_failslab+0xee/0x130 [ 1389.507135][T28003] should_failslab+0x9/0x14 [ 1389.511659][T28003] kmem_cache_alloc+0x29/0x5d0 [ 1389.516483][T28003] ? fib6_node_lookup+0xed/0x120 [ 1389.521440][T28003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1389.527206][T28003] ? ip6_dst_gc+0x1c4/0x220 [ 1389.531735][T28003] dst_alloc+0xad/0x149 [ 1389.535913][T28003] ip6_dst_alloc+0x3d/0x80 [ 1389.540437][T28003] ip6_rt_cache_alloc+0x12b/0x480 [ 1389.545568][T28003] ip6_pol_route+0x5d2/0x730 [ 1389.550256][T28003] ip6_pol_route_output+0x48/0x60 [ 1389.555300][T28003] fib6_rule_lookup+0x3d6/0x470 [ 1389.560204][T28003] ? ip6_pol_route_input+0x70/0x70 [ 1389.565335][T28003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1389.571075][T28003] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1389.576403][T28003] ip6_route_output_flags_noref+0x16b/0x230 [ 1389.582594][T28003] ip6_route_output_flags+0x50/0x1a0 [ 1389.588019][T28003] ip6_dst_lookup_tail+0x25d/0xc50 [ 1389.593146][T28003] ? debug_smp_processor_id+0x43/0x137 [ 1389.598791][T28003] ? dst_destroy+0x210/0x210 [ 1389.603424][T28003] ? debug_smp_processor_id+0x43/0x137 [ 1389.608947][T28003] ? dst_destroy+0x210/0x210 [ 1389.613592][T28003] ? __call_rcu+0x153/0x390 [ 1389.618144][T28003] ip6_dst_lookup_flow+0x5c/0x110 [ 1389.623250][T28003] rawv6_sendmsg+0x9be/0x2340 [ 1389.627970][T28003] ? __const_udelay+0x36/0x40 [ 1389.633143][T28003] ? __udelay+0x10/0x20 [ 1389.637399][T28003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1389.643664][T28003] ? aa_label_sk_perm+0x89/0xe0 [ 1389.648550][T28003] ? aa_sk_perm+0x1d3/0x590 [ 1389.653106][T28003] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1389.659737][T28003] inet_sendmsg+0x6d/0x90 [ 1389.664067][T28003] ? inet_sendmsg+0x6d/0x90 [ 1389.668629][T28003] ? inet_send_prepare+0x200/0x200 [ 1389.673782][T28003] sock_sendmsg+0x9f/0xc0 [ 1389.678167][T28003] ____sys_sendmsg+0x212/0x4d0 [ 1389.683033][T28003] ___sys_sendmsg+0xb5/0x100 [ 1389.687759][T28003] ? __fget+0xb8/0x1d0 [ 1389.691856][T28003] ? __fget_light+0xaf/0x190 [ 1389.696475][T28003] ? __fdget+0x2c/0x40 [ 1389.700738][T28003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1389.707001][T28003] __sys_sendmmsg+0x123/0x350 [ 1389.711740][T28003] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1389.718510][T28003] ? fput_many+0xec/0x130 [ 1389.722900][T28003] ? fput+0x29/0x30 [ 1389.726771][T28003] ? ksys_write+0x145/0x1b0 [ 1389.731292][T28003] __x64_sys_sendmmsg+0x64/0x80 [ 1389.736311][T28003] do_syscall_64+0xcc/0x3a0 [ 1389.740835][T28003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1389.746748][T28003] RIP: 0033:0x45aff9 [ 1389.750734][T28003] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1389.771181][T28003] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1389.779661][T28003] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1389.787647][T28003] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1389.795641][T28003] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 11:04:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r3, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x8, 0xb, 0x11}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0xc0069fa7fe66cd44, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x153aa13fe992da62}]}, 0x2c}}, 0x4000) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c000400080000000000000000000000f732c1b2e3730274cff92785992900"/120], 0x78}}, 0x0) [ 1389.803725][T28003] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1389.811720][T28003] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000000005f 11:04:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x3f000000, 0x10000000280}) [ 1389.857285][T28008] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1389.888426][T28011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:04:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f00000000c0)={0x9, "13ceae95990f208a959754e234a82e03a8a863c9eb48d2a6971be3e796bf7325", 0x2, 0x7, 0x5, 0x2bfbfff, 0x20, 0x8}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x0, 0x2b, {r1}, {r3}, 0x1, 0x7}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x11, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:49 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x28) sendfile(r0, r2, &(0x7f0000000000)=0x1, 0x7ef) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x9000000, @remote, 0x2}, 0x1c) 11:04:49 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8000, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x300, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000003c0)={0x5, "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"}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/109, 0x6d) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000280)) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtaction={0x14, 0x30, 0x5cb2410691e7f64f, 0x4}, 0x14}}, 0x44) 11:04:49 executing program 3 (fault-call:10 fault-nth:96): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x12, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x40000000, 0x10000000280}) 11:04:49 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8, 0x0, 0x1}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="5800000030004ff6000000a600000000000100000100627066003000028018000200000000000400007d2cd64d0008000500"/61, @ANYRES32, @ANYBLOB="060003000000000004000600"], 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0xffffffffffffff84, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0xfffffffffffffffb}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x0, 0x5, r2}]}, {0x4}}}}]}, 0x58}}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4da0af0a2d107f4c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x4, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x80154}, 0x4880) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000080)=""/5, 0x40}) 11:04:49 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000040)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="5800000030004ff600000000000000000000000044000100400001000800010062706600300002801800020000000000000000000000000000000000000000000400040008000500", @ANYRES32, @ANYBLOB="060003f3ffffff0000000600"], 0x58}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) fchmodat(r4, &(0x7f00000000c0)='./file0\x00', 0x40) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1390.500067][T28043] FAULT_INJECTION: forcing a failure. [ 1390.500067][T28043] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.512856][T28043] CPU: 0 PID: 28043 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1390.521533][T28043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.531599][T28043] Call Trace: [ 1390.534896][T28043] dump_stack+0x11d/0x181 [ 1390.539243][T28043] should_fail.cold+0xa/0x1a [ 1390.543850][T28043] __should_failslab+0xee/0x130 [ 1390.548747][T28043] should_failslab+0x9/0x14 [ 1390.553264][T28043] kmem_cache_alloc+0x29/0x5d0 [ 1390.558032][T28043] ? fib6_node_lookup+0xed/0x120 [ 1390.563050][T28043] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1390.568776][T28043] ? ip6_dst_gc+0x1c4/0x220 [ 1390.573401][T28043] dst_alloc+0xad/0x149 [ 1390.577578][T28043] ip6_dst_alloc+0x3d/0x80 [ 1390.582064][T28043] ip6_rt_cache_alloc+0x12b/0x480 [ 1390.586514][T28048] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1390.587109][T28043] ip6_pol_route+0x5d2/0x730 [ 1390.600984][T28043] ip6_pol_route_output+0x48/0x60 [ 1390.606021][T28043] fib6_rule_lookup+0x3d6/0x470 [ 1390.610888][T28043] ? ip6_pol_route_input+0x70/0x70 [ 1390.616012][T28043] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1390.621842][T28043] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1390.627084][T28043] ip6_route_output_flags_noref+0x16b/0x230 [ 1390.632997][T28043] ip6_route_output_flags+0x50/0x1a0 [ 1390.638302][T28043] ip6_dst_lookup_tail+0x25d/0xc50 [ 1390.643447][T28043] ? debug_smp_processor_id+0x43/0x137 [ 1390.648966][T28043] ? dst_destroy+0x210/0x210 [ 1390.653719][T28043] ? debug_smp_processor_id+0x43/0x137 [ 1390.659236][T28043] ? dst_destroy+0x210/0x210 [ 1390.663851][T28043] ? __call_rcu+0x153/0x390 [ 1390.668579][T28043] ip6_dst_lookup_flow+0x5c/0x110 [ 1390.673653][T28043] rawv6_sendmsg+0x9be/0x2340 [ 1390.678537][T28043] ? __const_udelay+0x36/0x40 [ 1390.683399][T28043] ? __udelay+0x10/0x20 [ 1390.687742][T28043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1390.694007][T28043] ? aa_label_sk_perm+0x89/0xe0 [ 1390.699039][T28043] ? aa_sk_perm+0x1d3/0x590 [ 1390.703604][T28043] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1390.709992][T28043] inet_sendmsg+0x6d/0x90 [ 1390.714345][T28043] ? inet_sendmsg+0x6d/0x90 [ 1390.718863][T28043] ? inet_send_prepare+0x200/0x200 [ 1390.724999][T28043] sock_sendmsg+0x9f/0xc0 [ 1390.729337][T28043] ____sys_sendmsg+0x212/0x4d0 [ 1390.734293][T28043] ___sys_sendmsg+0xb5/0x100 [ 1390.738982][T28043] ? __fget+0xb8/0x1d0 [ 1390.743075][T28043] ? __fget_light+0xaf/0x190 11:04:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x13, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1390.747771][T28043] ? __fdget+0x2c/0x40 [ 1390.752016][T28043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1390.758278][T28043] __sys_sendmmsg+0x123/0x350 [ 1390.763936][T28043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1390.770408][T28043] ? fput_many+0xec/0x130 [ 1390.774180][T28047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1390.775594][T28043] ? fput+0x29/0x30 [ 1390.775623][T28043] ? ksys_write+0x145/0x1b0 [ 1390.775649][T28043] __x64_sys_sendmmsg+0x64/0x80 11:04:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x48000000, 0x10000000280}) [ 1390.775673][T28043] do_syscall_64+0xcc/0x3a0 [ 1390.775706][T28043] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1390.808916][T28043] RIP: 0033:0x45aff9 [ 1390.812840][T28043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1390.832640][T28043] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1390.841074][T28043] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1390.849061][T28043] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1390.857043][T28043] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1390.865033][T28043] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1390.873023][T28043] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000060 11:04:49 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20000, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000000840)=[{&(0x7f0000000040)={0x27, 0x1, 0x1, 0x5, 0x0, 0x9, "b85866fd3641ad379fefb9615c75699c9ddbd8ae5f6bb1aebaf14feb092a639a3217bf2ecf161e18b4d839c7f62438d6b1905a86c49d91ae2b488682d7fa95", 0x30}, 0x60, &(0x7f0000000680)=[{&(0x7f00000000c0)="46166f89a1fa53a07a7d822f647a7c416a584f7b", 0x14}, {&(0x7f0000000100)="154a14ab24cf9333816ff1bad31bb5537a59014e6b20836817c9e6c5ec29ee4ee368ac2f06d3113765401392c941f0261e563abe855dfea811565a21e4a7fb817591896948a13bedca06b1c9df98a4c2bbad0b31037b112b90e91b109a38595910d9ad038453703dbba2e0646641685f0ba730d9780a8f1a03368783a87c96ed5273ab57f3ca5e116dc7204a6296db305a5ce255bbc2aa3f054cdc32df58e0ed7ede21237c4809532df16451359b7e24c365308b0e4d55ae04d82913128ca61a449f7deaa7bb66a3e1c178955e537f4eae1071ad23d26e341fe7b5ee5b9857a53b059c287c375087817d8d", 0xeb}, {&(0x7f0000000200)="17830394aa17fe96bb5d0c3e5555aeb50420703fa2a44e90a1b9b7f8585cd05cd12612ffb3ce7201c7eee0563a467d455e5c2af25653566a918c4e4d063151f11e79cbd32bc50c374556cd2e7a61d3620d16073bf3b8cee26c093169c061affca5f0d2d4a782c9442f26a8ce050da35d65c8f9333df50e80350a1d5a6463232250836790b623190d6b2dc1a46d60be0bb3acb2141155eb5fd76425171c8665d9f4225c49481b34766570fbe76204deaff22b3d9899811044ed3a39819cdc46982cf95e16803326a3393b2de84a3fac2cc24fbd9cd3b5", 0xd6}, {&(0x7f0000000300)="b52c96dc68543de10cd4744c7128c6960d8a2b4e4bb3f9e6bd2378a033d8c93d46ecdb205ded8544584e35aeda10fa8cb95615e6235f693d14ba4441e1b6ee4f1dba82a7f2f38a8eb380dcf1505f40e08dc2e15cf28fe81bfff6291ecc834a3a8fe4048e11f70ea0", 0x68}, {&(0x7f0000000380)="84057e9ff0136448e37ab9706441ff7405a43765e9599de49d0403cdb6ae9184bd221d495eae7389b83c1a4ae7ba3be680cb515c77b1959a88d82958b0e021fb82a91692e94dd30420518c127033ec14bfbdf62a45d06ed53636a2ae31d102edd396b3ea07e9ba8038002e605b6ab3e6b390bd6f632f76acb0429d8372add949c99dfd22707d2455923614a0f23cd30b1a048696e1f4de0e4cb180158bcef7ed764cc0fa736becb31a85e4eb2b347f7fcc403b87d803d5aa76b0e18e2a401906ce5bf582094292", 0xc7}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="c23770582b23194ebaabbb671cbede8d007aebcf502f0c9c53f5e395b97e99a5d253fec6980cc5e3c24f3b76bb460e36c91067d7419ef17f5a779af2e9a94fb3dbeabdef013ccf267290f2eff350d0f467d5aa8c033af3c2f597f2394cba07ee26ee33290cb3bf0315a7cbe68899ec70fabaef", 0x73}, {&(0x7f0000000540)="194b5707cfe0061e87b4dad3774ed813a71f379ada357143aa8b3c0718d9ccf53c8012fee8370a99afc5390df6a6a27820f338527be2e8fcd3502d3e5a687cd5ec950cfd7cb9539f034b6ce1173fd81d322c8dd889b9b55864235acc892e3312f1c4a3984b6e0abc34c23ee2084261ab975e9882083a7f5ed90d877dc89b00b6a0f7d3ea38af5560d3ba68d9b288de9fe2bd42c42ea45499e2c7d1d9b7a47fcf5c557ca2f6fa1448812e4a9d4da03aa898c1c9ead14beaf760a57947a06fee5fa2d36ded9e872ab42ccb5942b0", 0xcd}, {&(0x7f0000000640)="db376b3697f8df6feea7", 0xa}], 0x9, &(0x7f0000000740)={0xf8, 0x10a, 0xb6e, "afac178c43f189107d773fe42dd748bb6e03df83884c934dc5f603bd7570b4ec6624d8bb383d08a8305b96e1d814be6bd5a1577dcd7704ba83807e54eee2a7ec8bb10cbc1032de961ef69ced3ad74f5e56bdcb18c4ebd7ce66c20ab8fc32e48e8b14be26bad94c9e2ba68655e2ac4fe36c6863c0556a067f0091f8da45c7c998106e8c47255e57c23279cf8210b9ee06c52cb59ff64cb2801919bb0968e0ba43c06e315958701ad06e7f9b7a4cd8d38193b2a34f85000f60e2985764b8f48b1f9addf3bc2b15b050338aeea77b29d34f2538139960341c03ae7c055630d5229425f913e0aa"}, 0xf8, 0x4}], 0x1, 0x4000020) 11:04:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x14, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:50 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x4) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0x7, {0x3f, 0xfff, 0x2, 0x20}}) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) r2 = dup2(0xffffffffffffffff, r1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000200)={0x1, [0x0]}) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xa000000, @remote, 0x2}, 0x1c) 11:04:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4c000000, 0x10000000280}) 11:04:50 executing program 3 (fault-call:10 fault-nth:97): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x15, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:50 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x68000000, 0x10000000280}) 11:04:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x16, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7830780030004ff60000000000000000000000006400010100000000000000006270e6005000028006000300050000001802000000a6fb00000000000000330098aeade3b1df736ac5bb194a00000000000000000000000000002c000400080000000000000000000000000000fffffffffffffffc00000000000000000000000000000000000400060093d32eea8e5f9a7c68bb4f8edd05600df863c67c1b0e6dca788f4e016dbe0383a77efccdfb1959030000000000000027c89a00000000000000094b7670"], 0x78}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a7b5f38, 0x5, &(0x7f0000000540)=[{&(0x7f0000000240)="5717163febd294fba3063c30e8811bd6ad2e450526ceea39ef1950233f63aaf17b6db72d9d386b510cbd1c18e5eb240c27cf1dda54e97ff8f964b0ec12322d7b7544f893b486b6b785b509e3aa12ee9513974b6d0a90e1c7b9af3d72484697e7eeab73f056e2f8d899319175b58a9617e994186fc6252b3302db555c342bac3ab710531157c8d6abf8f0c36cf662aedcb9d732219e433a899873304f00c0ad68ab2434622899b7c32ef079cfcbabf02c925482261bfec28bc0cf33a486bcdac181018014724b6df55cc0effe34792c0d6f235f", 0xd3}, {&(0x7f0000000180)="06d60803", 0x4, 0x7fffffff}, {&(0x7f00000001c0)="dc5fa232d537cb0e6184b4d9b70dbf982fb54dc5dddfb6abe4598b1af8fd605d08ebb06b1ed4e5dfd49743efe5a6aedd4df8d5eacabcfc404191877b", 0x3c, 0x3}, {&(0x7f0000000380)="693490a8c76a46e674372e2e314697d487b52854786b328526df0dcdb80209b252b6b13fe8cd71c1f778acce42c020656f4da3194347ed83b21bdb8a2b5c149283be06faeae76defbbd3d2ef395d908ebdb010927e5342ff4469a35014d2af2cafa5826d3f469bec2d57bfd4ce2ddbce125791ef768f872f0ed7cab6a889f250539d3360d1b9f9de38522c5bde4f72dcd32aae3e15b5e8ac9e065b", 0x9b, 0x5}, {&(0x7f0000000440)="042039427dd18f5e19d2596558233c0b0ca243a49dbe53b46db65138f2a2ab85d3d6ff3a8f2cab5e9a204fbc67876acc2cca5d671b22525002832f0bd57424d59f14f4bbda5d80ee260d8f46af2e77e16b5dccb6a01b32db5bd857719ee278ca1337c5f13464ab1f8a2c54e2b386fc93eb745f043f4270b35109f59c6388288c54509cd1a8946490a0287e911ec93079ca6c123fe48701e34b40c9e5c65c9657cebef0f1763389d8e9c5c31b7664b6c322b1ec6655241d580b3d41461bada7a39c35", 0xc2, 0x2}], 0x800, &(0x7f00000005c0)={[{@noautodefrag='noautodefrag'}, {@flushoncommit='flushoncommit'}, {@skip_balance='skip_balance'}, {@treelog='treelog'}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@flushoncommit='flushoncommit'}, {@nospace_cache='nospace_cache'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000}, 0x13f, &(0x7f0000000700)={&(0x7f0000000680)={0x6c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @loopback}}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x20}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x100}, 0x40000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0)='nl80211\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast2, r7}, 0xc) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x30000110}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x40, r2, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="b8131d551d76"}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x40}, 0x1, 0x0, 0x0, 0x4a080}, 0x40000) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r9 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) ioctl$TIOCSTI(r8, 0x5412, 0x2) r10 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r11 = dup2(r10, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r11, 0x80045301, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4030582a, &(0x7f0000000040)) recvfrom$l2tp(r12, &(0x7f0000000940)=""/166, 0xa6, 0x1, &(0x7f0000000a00)={0x2, 0x0, @multicast1}, 0x10) r13 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r13, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r11, 0x84, 0x1a, &(0x7f0000000400)={r14}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r9, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r14}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000900)={r14, 0x2, 0x1, [0x9]}, 0xa) [ 1391.575945][T28092] FAULT_INJECTION: forcing a failure. [ 1391.575945][T28092] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.588631][T28092] CPU: 0 PID: 28092 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1391.597389][T28092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.607457][T28092] Call Trace: [ 1391.610788][T28092] dump_stack+0x11d/0x181 [ 1391.615129][T28092] should_fail.cold+0xa/0x1a [ 1391.619746][T28092] __should_failslab+0xee/0x130 [ 1391.624609][T28092] should_failslab+0x9/0x14 [ 1391.629124][T28092] kmem_cache_alloc+0x29/0x5d0 [ 1391.634307][T28092] ? fib6_node_lookup+0xed/0x120 [ 1391.639313][T28092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1391.645033][T28092] ? ip6_dst_gc+0x1c4/0x220 [ 1391.649549][T28092] dst_alloc+0xad/0x149 [ 1391.653729][T28092] ip6_dst_alloc+0x3d/0x80 [ 1391.658156][T28092] ip6_rt_cache_alloc+0x12b/0x480 [ 1391.663198][T28092] ip6_pol_route+0x5d2/0x730 [ 1391.667887][T28092] ip6_pol_route_output+0x48/0x60 [ 1391.672965][T28092] fib6_rule_lookup+0x3d6/0x470 [ 1391.677813][T28092] ? ip6_pol_route_input+0x70/0x70 [ 1391.682928][T28092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1391.688645][T28092] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1391.693852][T28092] ip6_route_output_flags_noref+0x16b/0x230 [ 1391.699742][T28092] ip6_route_output_flags+0x50/0x1a0 [ 1391.705066][T28092] ip6_dst_lookup_tail+0x25d/0xc50 [ 1391.710174][T28092] ? debug_smp_processor_id+0x43/0x137 [ 1391.715698][T28092] ? dst_destroy+0x210/0x210 [ 1391.720353][T28092] ? debug_smp_processor_id+0x43/0x137 [ 1391.725820][T28092] ? dst_destroy+0x210/0x210 [ 1391.730413][T28092] ? __call_rcu+0x153/0x390 [ 1391.735556][T28092] ip6_dst_lookup_flow+0x5c/0x110 [ 1391.740638][T28092] rawv6_sendmsg+0x9be/0x2340 [ 1391.745390][T28092] ? __const_udelay+0x36/0x40 [ 1391.750236][T28092] ? __udelay+0x10/0x20 [ 1391.754511][T28092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1391.760756][T28092] ? aa_label_sk_perm+0x89/0xe0 [ 1391.765662][T28092] ? aa_sk_perm+0x1d3/0x590 [ 1391.770163][T28092] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1391.776602][T28092] inet_sendmsg+0x6d/0x90 [ 1391.780928][T28092] ? inet_sendmsg+0x6d/0x90 [ 1391.785684][T28092] ? inet_send_prepare+0x200/0x200 [ 1391.790789][T28092] sock_sendmsg+0x9f/0xc0 [ 1391.795119][T28092] ____sys_sendmsg+0x212/0x4d0 [ 1391.799918][T28092] ___sys_sendmsg+0xb5/0x100 [ 1391.804536][T28092] ? __fget+0xb8/0x1d0 [ 1391.808608][T28092] ? __fget_light+0xaf/0x190 [ 1391.813194][T28092] ? __fdget+0x2c/0x40 [ 1391.817260][T28092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1391.823496][T28092] __sys_sendmmsg+0x123/0x350 [ 1391.828238][T28092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1391.835041][T28092] ? fput_many+0xec/0x130 [ 1391.839362][T28092] ? fput+0x29/0x30 [ 1391.843210][T28092] ? ksys_write+0x145/0x1b0 [ 1391.847714][T28092] __x64_sys_sendmmsg+0x64/0x80 [ 1391.852763][T28092] do_syscall_64+0xcc/0x3a0 [ 1391.857268][T28092] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1391.863239][T28092] RIP: 0033:0x45aff9 [ 1391.867247][T28092] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1391.886888][T28092] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1391.895299][T28092] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1391.903381][T28092] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1391.911351][T28092] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1391.919316][T28092] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 11:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6c000000, 0x10000000280}) [ 1391.927285][T28092] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000061 11:04:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xe000000, @remote, 0x2}, 0x1c) 11:04:51 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040), 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x74000000, 0x10000000280}) 11:04:51 executing program 3 (fault-call:10 fault-nth:98): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:51 executing program 5: socket$netlink(0x10, 0x3, 0x0) 11:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7a000000, 0x10000000280}) 11:04:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1d, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1392.629541][T28133] FAULT_INJECTION: forcing a failure. [ 1392.629541][T28133] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.642253][T28133] CPU: 0 PID: 28133 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1392.651023][T28133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.661241][T28133] Call Trace: [ 1392.664691][T28133] dump_stack+0x11d/0x181 [ 1392.669114][T28133] should_fail.cold+0xa/0x1a [ 1392.673728][T28133] __should_failslab+0xee/0x130 [ 1392.678644][T28133] should_failslab+0x9/0x14 [ 1392.683265][T28133] kmem_cache_alloc+0x29/0x5d0 [ 1392.688064][T28133] ? fib6_node_lookup+0xed/0x120 [ 1392.693017][T28133] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1392.698826][T28133] ? ip6_dst_gc+0x1c4/0x220 [ 1392.703339][T28133] dst_alloc+0xad/0x149 [ 1392.707585][T28133] ip6_dst_alloc+0x3d/0x80 [ 1392.712149][T28133] ip6_rt_cache_alloc+0x12b/0x480 [ 1392.717277][T28133] ip6_pol_route+0x5d2/0x730 [ 1392.721881][T28133] ? __const_udelay+0x36/0x40 [ 1392.726898][T28133] ip6_pol_route_output+0x48/0x60 [ 1392.731947][T28133] fib6_rule_lookup+0x3d6/0x470 [ 1392.736802][T28133] ? ip6_pol_route_input+0x70/0x70 [ 1392.741985][T28133] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1392.747723][T28133] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1392.753469][T28133] ip6_route_output_flags_noref+0x16b/0x230 [ 1392.759491][T28133] ip6_route_output_flags+0x50/0x1a0 [ 1392.764792][T28133] ip6_dst_lookup_tail+0x25d/0xc50 [ 1392.769977][T28133] ? debug_smp_processor_id+0x43/0x137 [ 1392.775446][T28133] ? dst_destroy+0x210/0x210 [ 1392.780091][T28133] ? debug_smp_processor_id+0x43/0x137 [ 1392.785683][T28133] ? dst_destroy+0x210/0x210 [ 1392.790333][T28133] ? __call_rcu+0x153/0x390 [ 1392.794906][T28133] ip6_dst_lookup_flow+0x5c/0x110 [ 1392.799939][T28133] rawv6_sendmsg+0x9be/0x2340 [ 1392.804636][T28133] ? __const_udelay+0x36/0x40 [ 1392.809406][T28133] ? __udelay+0x10/0x20 [ 1392.813607][T28133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1392.820118][T28133] ? aa_label_sk_perm+0x89/0xe0 [ 1392.825158][T28133] ? aa_sk_perm+0x1d3/0x590 [ 1392.829758][T28133] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1392.836683][T28133] inet_sendmsg+0x6d/0x90 [ 1392.841163][T28133] ? inet_sendmsg+0x6d/0x90 [ 1392.845715][T28133] ? inet_send_prepare+0x200/0x200 [ 1392.850840][T28133] sock_sendmsg+0x9f/0xc0 [ 1392.855240][T28133] ____sys_sendmsg+0x212/0x4d0 [ 1392.860064][T28133] ___sys_sendmsg+0xb5/0x100 [ 1392.864706][T28133] ? __fget+0xb8/0x1d0 [ 1392.868805][T28133] ? __fget_light+0xaf/0x190 [ 1392.873407][T28133] ? __fdget+0x2c/0x40 [ 1392.877737][T28133] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1392.883993][T28133] __sys_sendmmsg+0x123/0x350 [ 1392.888779][T28133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1392.895106][T28133] ? fput_many+0xec/0x130 [ 1392.899449][T28133] ? fput+0x29/0x30 [ 1392.903862][T28133] ? ksys_write+0x145/0x1b0 [ 1392.908383][T28133] __x64_sys_sendmmsg+0x64/0x80 [ 1392.913253][T28133] do_syscall_64+0xcc/0x3a0 [ 1392.917830][T28133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1392.923725][T28133] RIP: 0033:0x45aff9 11:04:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xff000000, 0x10000000280}) 11:04:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x21, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1392.927638][T28133] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1392.947253][T28133] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1392.955674][T28133] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1392.963764][T28133] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1392.971743][T28133] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1392.979833][T28133] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1392.987814][T28133] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000062 11:04:52 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 11:04:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x24, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x10000000, @remote, 0x2}, 0x1c) 11:04:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x100000000000000, 0x10000000280}) 11:04:52 executing program 3 (fault-call:10 fault-nth:99): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:52 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x200000000000000, 0x10000000280}) 11:04:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x25, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1393.656389][T28169] FAULT_INJECTION: forcing a failure. [ 1393.656389][T28169] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.669163][T28169] CPU: 1 PID: 28169 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1393.677861][T28169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.687925][T28169] Call Trace: [ 1393.691374][T28169] dump_stack+0x11d/0x181 [ 1393.695821][T28169] should_fail.cold+0xa/0x1a [ 1393.700429][T28169] __should_failslab+0xee/0x130 [ 1393.705419][T28169] should_failslab+0x9/0x14 [ 1393.709942][T28169] kmem_cache_alloc+0x29/0x5d0 [ 1393.714732][T28169] ? fib6_node_lookup+0xed/0x120 [ 1393.719761][T28169] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1393.725506][T28169] ? ip6_dst_gc+0x1c4/0x220 [ 1393.730105][T28169] dst_alloc+0xad/0x149 [ 1393.734376][T28169] ip6_dst_alloc+0x3d/0x80 [ 1393.738814][T28169] ip6_rt_cache_alloc+0x12b/0x480 [ 1393.743911][T28169] ip6_pol_route+0x5d2/0x730 [ 1393.748625][T28169] ip6_pol_route_output+0x48/0x60 [ 1393.753665][T28169] fib6_rule_lookup+0x3d6/0x470 [ 1393.758560][T28169] ? ip6_pol_route_input+0x70/0x70 [ 1393.763682][T28169] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1393.769438][T28169] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1393.774672][T28169] ip6_route_output_flags_noref+0x16b/0x230 [ 1393.780699][T28169] ip6_route_output_flags+0x50/0x1a0 [ 1393.785995][T28169] ip6_dst_lookup_tail+0x25d/0xc50 [ 1393.791118][T28169] ? debug_smp_processor_id+0x43/0x137 [ 1393.796758][T28169] ? dst_destroy+0x210/0x210 [ 1393.801508][T28169] ? debug_smp_processor_id+0x43/0x137 [ 1393.806973][T28169] ? dst_destroy+0x210/0x210 [ 1393.811581][T28169] ? __call_rcu+0x153/0x390 [ 1393.816216][T28169] ip6_dst_lookup_flow+0x5c/0x110 [ 1393.821277][T28169] rawv6_sendmsg+0x9be/0x2340 [ 1393.825973][T28169] ? __const_udelay+0x36/0x40 [ 1393.830769][T28169] ? __udelay+0x10/0x20 [ 1393.834962][T28169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1393.841240][T28169] ? aa_label_sk_perm+0x89/0xe0 [ 1393.846103][T28169] ? aa_sk_perm+0x1d3/0x590 [ 1393.850642][T28169] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1393.857099][T28169] inet_sendmsg+0x6d/0x90 [ 1393.861433][T28169] ? inet_sendmsg+0x6d/0x90 [ 1393.866080][T28169] ? inet_send_prepare+0x200/0x200 [ 1393.871201][T28169] sock_sendmsg+0x9f/0xc0 [ 1393.875600][T28169] ____sys_sendmsg+0x212/0x4d0 [ 1393.880382][T28169] ___sys_sendmsg+0xb5/0x100 [ 1393.885063][T28169] ? __fget+0xb8/0x1d0 [ 1393.889197][T28169] ? __fget_light+0xaf/0x190 [ 1393.893869][T28169] ? __fdget+0x2c/0x40 [ 1393.897957][T28169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1393.904437][T28169] __sys_sendmmsg+0x123/0x350 [ 1393.909137][T28169] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1393.915384][T28169] ? fput_many+0xec/0x130 [ 1393.919715][T28169] ? fput+0x29/0x30 [ 1393.923537][T28169] ? ksys_write+0x145/0x1b0 [ 1393.928054][T28169] __x64_sys_sendmmsg+0x64/0x80 [ 1393.932918][T28169] do_syscall_64+0xcc/0x3a0 [ 1393.937462][T28169] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1393.943438][T28169] RIP: 0033:0x45aff9 [ 1393.947350][T28169] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1393.967448][T28169] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1393.975941][T28169] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1393.983920][T28169] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1393.991997][T28169] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1394.000034][T28169] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000007 [ 1394.008229][T28169] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 0000000000000063 11:04:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x300000000000000, 0x10000000280}) 11:04:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x28, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:53 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20080, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000040)=0x5) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x18020000, @remote, 0x2}, 0x1c) 11:04:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x400000000000000, 0x10000000280}) 11:04:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x500000000000000, 0x10000000280}) 11:04:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x600000000000000, 0x10000000280}) 11:04:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2d, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x700000000000000, 0x10000000280}) 11:04:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x30, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:54 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xf3) 11:04:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x800000000000000, 0x10000000280}) 11:04:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x20000000, @remote, 0x2}, 0x1c) 11:04:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4e0, 0xbb8) 11:04:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x32, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:54 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xb00000000000000, 0x10000000280}) 11:04:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x34, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x18, 0x0, &(0x7f0000004000)) r2 = accept4(r1, 0x0, &(0x7f00000000c0), 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb}]}, 0x269}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r5, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042cbd7000fbdbdf250105000014000100000000000000000000000000000000011800040000000000440000000000000056000000000000800800030004000000"], 0x48}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) socketpair(0xa, 0x2, 0xff, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r8, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x8, 0xb, 0x11}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_REMOVEDEF(r7, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r8, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_ADDDEF(r6, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r8, 0x2299852f34424568, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x28}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x27}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r5, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @multicast2}}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 11:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x3f00000000000000, 0x10000000280}) [ 1396.024956][T28238] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1396.060669][T28238] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 11:04:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x35, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4000000000000000, 0x10000000280}) 11:04:55 executing program 0: r0 = memfd_create(&(0x7f0000000000)='#\x11%.ZdJv\xeb', 0x2) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) [ 1396.153457][T28238] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1396.188117][T28238] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 11:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x6}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) getrlimit(0x4, &(0x7f0000000080)) 11:04:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x3f000000, @remote, 0x2}, 0x1c) 11:04:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x3) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) listxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/178, 0xb2) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4800000000000000, 0x10000000280}) 11:04:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3d, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x102) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r2, 0x0, 0x18, 0x0, &(0x7f0000004000)) r3 = accept4(r2, 0x0, &(0x7f00000000c0), 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x269}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r6, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r6, 0x370ef6f8a490b954, 0x70bd26, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x40801) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x48, r6, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x8, 0x44, 0x0, 0x56, 0x80000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0xaa19bf8ba19fb817}, 0x4000) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x26419101}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r6, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0xf5ca, 0x1ff, 0x5, 0x6]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x20004021) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010002000100627066006000028006000300060000001800020000000000000000000000000000000000000000002c00040008000000000000e08e9364b66acfa3000000000000000000002d720000000000000000000000000000000400060012df0675562fe2830862499c703a282f247541ce53a99f20567b6a28be12cbb9d21c931331f9235f6edd38b3eeaab4563052c77de9c462ba7c9dff094f1fc396e44b682cd94947b7412c92b45ddd7e1b6e455af994fc60fad88e133dc19360341dee97e97f7ca0f8352500bccebe0e639307322650287f9ab8fbb722"], 0x78}}, 0x0) 11:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x4c00000000000000, 0x10000000280}) [ 1396.792653][T28280] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1396.806447][T28280] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 1396.825150][T28280] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1396.860730][T28280] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1396.882204][T28280] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 11:04:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6800000000000000, 0x10000000280}) 11:04:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x44, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:56 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:56 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x8, 0x4159873, r0, 0xa90a8000) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x45, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x6c00000000000000, 0x10000000280}) 11:04:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x40000000, @remote, 0x2}, 0x1c) 11:04:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x48, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7400000000000000, 0x10000000280}) 11:04:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4, 0x0, @initdev={0xfe, 0x88, [], 0x85, 0x0}, 0x3}, 0x1c) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) connect$ax25(r4, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) r5 = socket$inet6(0xa, 0x3, 0xff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_SUBDEV_S_EDID(r6, 0xc0285629, &(0x7f0000000200)={0x0, 0x19ee, 0x8000, [], &(0x7f00000001c0)=0x4}) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000100), &(0x7f0000000180)=0xfffffe1d) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:04:56 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000000c0)={0x9a0000, 0x23e, 0x2c69, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9909e3, 0x9, [], @string=&(0x7f0000000000)=0x1}}) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000140)) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x4c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:56 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x7a00000000000000, 0x10000000280}) 11:04:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xcbf918f858eefef1}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x154, r2, 0x6a6, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x42a}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe5a}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x4c015}, 0x4000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fcntl$setstatus(r0, 0x4, 0x45400) 11:04:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xff00000000000000, 0x10000000280}) 11:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x4d, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x50, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x40020000, @remote, 0x2}, 0x1c) 11:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x54, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:57 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000000)={0x1c, 0x7, 0x4, 0x10, 0x3, {0x0, 0x2710}, {0x2, 0x2, 0x8, 0x1, 0x0, 0x3, "09ae2d96"}, 0x8, 0x0, @offset=0x4, 0x2f5, 0x0, 0xffffffffffffffff}) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r6, 0x8, 0xff, 0x49b, 0x0, 0x4}, 0x14) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:04:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x40000000000002a, 0x8bb8) 11:04:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x5c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x84, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x70, 0x1, @m_bpf={0x6c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x14, 0x4, [{0x2, 0x1, 0x4, 0x8000}, {0x6, 0x40, 0x5, 0x7ff}]}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x84}}, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x8, 0xb, 0x11}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r2, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, r2, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x2000) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0xe712c282c2d1028a, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r5, 0x4, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_REMOVEDEF(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_VERSION(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0xd499ad7c1cc6690e}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r5, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x25}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xa}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000000}, 0x10) 11:04:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="6400000030044ff6000000000000000000000000500001004c00010008000100627066003c000280060003000500000018000200000831740c027ed6020e0000000000000000000000000000000000000018000200001000000004000003000000ff0f00"], 0x64}}, 0x0) 11:04:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x60, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:04:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x61, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1399.900470][T10228] tipc: TX() has been purged, node left! [ 1400.419673][T10228] device bridge_slave_1 left promiscuous mode [ 1400.447178][T10228] bridge0: port 2(bridge_slave_1) entered disabled state [ 1400.518313][T10228] device bridge_slave_0 left promiscuous mode [ 1400.524839][T10228] bridge0: port 1(bridge_slave_0) entered disabled state [ 1400.610249][T10228] device veth1_vlan left promiscuous mode [ 1400.637626][T10228] device veth0_vlan left promiscuous mode [ 1401.058015][T10228] device hsr_slave_0 left promiscuous mode [ 1401.098347][T10228] device hsr_slave_1 left promiscuous mode [ 1401.148072][T10228] team0 (unregistering): Port device team_slave_1 removed [ 1401.207704][T10228] team0 (unregistering): Port device team_slave_0 removed [ 1401.247617][T10228] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1401.291765][T10228] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1401.455226][T10228] bond0 (unregistering): Released all slaves [ 1403.389471][T28419] IPVS: ftp: loaded support on port[0] = 21 [ 1403.444514][T28419] chnl_net:caif_netlink_parms(): no params data found [ 1403.473545][T28419] bridge0: port 1(bridge_slave_0) entered blocking state [ 1403.482508][T28419] bridge0: port 1(bridge_slave_0) entered disabled state [ 1403.491063][T28419] device bridge_slave_0 entered promiscuous mode [ 1403.499413][T28419] bridge0: port 2(bridge_slave_1) entered blocking state [ 1403.506943][T28419] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.515161][T28419] device bridge_slave_1 entered promiscuous mode [ 1403.533380][T28419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1403.544823][T28419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1403.565479][T28419] team0: Port device team_slave_0 added [ 1403.573296][T28419] team0: Port device team_slave_1 added [ 1403.640203][T28419] device hsr_slave_0 entered promiscuous mode [ 1403.687929][T28419] device hsr_slave_1 entered promiscuous mode [ 1403.747771][T28419] debugfs: Directory 'hsr0' with parent '/' already present! [ 1403.777424][T28419] bridge0: port 2(bridge_slave_1) entered blocking state [ 1403.786559][T28419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1403.795431][T28419] bridge0: port 1(bridge_slave_0) entered blocking state [ 1403.804419][T28419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1403.838726][T28419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1403.852301][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1403.862025][T20820] bridge0: port 1(bridge_slave_0) entered disabled state [ 1403.872779][T20820] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.884671][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1403.900082][T28419] 8021q: adding VLAN 0 to HW filter on device team0 [ 1403.913851][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1403.926001][ T2513] bridge0: port 1(bridge_slave_0) entered blocking state [ 1403.934465][ T2513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1403.947318][T20820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1403.956941][T20820] bridge0: port 2(bridge_slave_1) entered blocking state [ 1403.965639][T20820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1403.989944][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1404.004895][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1404.017268][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1404.031393][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1404.049122][T28419] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1404.068624][T28419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1404.085791][T22277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1404.105173][T22277] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1404.115191][T22277] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1404.131462][T28419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1404.191220][T20822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1404.208658][T22277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1404.219850][T28419] device veth0_vlan entered promiscuous mode [ 1404.228061][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1404.236753][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1404.249798][T28419] device veth1_vlan entered promiscuous mode 11:05:03 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)=""/151, 0x97}, {&(0x7f0000000140)=""/52, 0x34}], 0x2, &(0x7f00000002c0)=""/123, 0x7b}, 0x10) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000380)=0x1, &(0x7f00000003c0)=0x4) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f00000001c0)=0x100000002, 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYRESOCT], &(0x7f0000000000)='./file0\x00', 0x0, 0x5000, 0x0) 11:05:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x276}) 11:05:03 executing program 5: add_key$user(0x0, &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x0, "0103000000000000000000080000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8400a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc126cb184a"}, 0x80) bind(0xffffffffffffffff, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a10eb80c00000000800000002e0a53b232394a000000010000f800ffff0f82e52b0a669ae43a620170a00021f069ca021f6ff9dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9e2ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00fbb70000d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0003f0100000000fca0d971e9fd2bb4b88e524ae03e6521c84c1d7afa5cac81f30f16cd3ba77e4d5a8a682d271d4e0b57a07686d8cd335d8541ca148e882dc5bafceed2dedb06c1d95dfcc7e08e6dc8bbcceb36c8006a8f1f30d73c8bed605e80f0ffffffffffff868f4201d9aefb6a5bbb0b991d5869ba58b29657e9f52d253cd1763b5b63f2e3a903a61b5f356a92a7cf414929d5a711c5e5ecccac591c16810e2139361bf5d4c622e51838be0519213dd7c5877769c93cf9834d14f4380af8105ed77b8270ce92bc9abd2bd3845c66c70438e35226614ccab04740fefdb60db0f84751d920ff76f11409f13e2e917e04430baaae9183bdbc425a676e446d1c9d2e6bddb8a2bc0fc34b47c489da04495a9d14c81173b48e00fe958fb7f4cfb3611d43fc5a36461c2e6175f6f5a4b69482d0"], 0x60}}, 0x0) fchmod(r0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) exit(0x2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x431, 0x30, 0x5cb2410691e7f64f, 0x70bd2c, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x3ffd, 0x0, 0x0, {{0x1, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_OPS_LEN={0x334, 0x3, 0x3}, @TCA_ACT_BPF_OPS_LEN={0x0, 0x3, 0x1}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xa23}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000340)="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", &(0x7f00000000c0)=""/179}, 0x20) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x64, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x8dffffff, @remote, 0x2}, 0x1c) [ 1404.442390][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1404.451516][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 11:05:03 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) getpeername$tipc(r1, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x6c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x2761, 0xfffffff5) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x5, 0x30}, &(0x7f0000000280)=0xfffffffffffffed5) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000001c0)={{0x8, 0x6}, 'port0\x00', 0x2, 0x20, 0x3, 0x3e06a715, 0xff47, 0x0, 0x2, 0x0, 0x1}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={r3, @in={{0x2, 0x4e20, @broadcast}}, 0x101, 0x1, 0x20, 0xb, 0x14, 0x7}, 0x9c) mkdir(&(0x7f0000000100)='./file0\x00', 0x101) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x74, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast2, r6}, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newqdisc={0x0, 0x24, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x6, 0xffe0}, {0xffe5, 0x5}, {0xffff, 0x5}}, [@TCA_STAB={0x0, 0x8, [{{0x0, 0x1, {0x6, 0x8e, 0x5, 0xffffffff, 0x0, 0x6b43, 0x10000}}, {0x0, 0x2, [0x95cd, 0x1, 0x8, 0x6]}}, {{0x0, 0x1, {0x4, 0xff, 0x8000, 0x9, 0x2, 0x81, 0x80000000}}, {0x0, 0x2, [0x9, 0x3f]}}, {{0x0, 0x1, {0x9, 0x6, 0x7fc, 0x3, 0x1, 0xa2a0, 0x5}}, {0x0, 0x2, [0x3, 0xff, 0x9, 0x4, 0x0, 0x9, 0x4]}}, {{0x0, 0x1, {0x7f, 0xf9, 0x1, 0x8, 0x1, 0x8, 0x9}}, {0x0, 0x2, [0x3f, 0x6, 0x8, 0x1, 0x8, 0x8, 0x2, 0x0, 0x1]}}, {{0x0, 0x1, {0x0, 0x20, 0x7fff, 0x8, 0x0, 0x1, 0xffff}}, {0x0, 0x2, [0x8, 0x401, 0x7, 0x96, 0x7fff, 0x6d36]}}, {{0x0, 0x1, {0x1, 0x14, 0x2, 0x9, 0x2, 0x9, 0x10001}}, {0x0, 0x2, [0x7, 0x401e, 0xd52, 0x396, 0x4, 0x4]}}]}]}, 0x284}}, 0x0) socket$packet(0x11, 0xa814d8b4c4721890, 0x300) 11:05:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x7c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:04 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x2, 0x101}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) 11:05:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x84, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x206, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x40010044) 11:05:04 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='#\'%n\xdb\x05\n\x00\x9b\x8c\x12\xfasH\f\xc9\x95\xbeo\xf6n\x8f\xc9H\x00\x94*\x89[\xd6\x16\xe8hs\xb5\x9e3h\v\xc6qmH|\xb8\x9f%\xa9\xa9\x86\xa2\xfe\xb4]W\xa8E\x9f)=\x15\x19\xa9Z\xb73\xea\xfb\xbdU\x03Km\xd8\xd3\x12\x82\xfc\xc3\xce\xd9i\x98\xaa\x01f\xba\xd6\x00\x00\x00\x00\xe9\xad\x8a}a\x1c\x99\xbb\xc9\xa3Q\xb0\x94\xa2d#\x11&gV\xe0\xdfu\xa7\xa2\xe0\x89\x00\xa1#\v\xa6x\xfa\xe8\xd1\x11\x9e\xad\a\xd2dr=%\xbau//n\x89\r\xd7\xd7\x1b\xdc\xe6m\xcb\xe8\xe7\xeba\x89\xe8\x03l\xf7\xaf\x8b\x868W\xce7~\f8\xe8VN\xe2\xad\xc7\x81I\x96\xfbK\xaf\x9c\x9d\xd5%k\xc3\xf639\x05\xc2\xbe\xc1\xb4s\xcaos\xc9\xd4G\xf0\x8f\xe40x0}) r3 = syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000001780)={0x1, "089f1821112f4822d73a364b2039d2048286e11537e15ec95b5cd20e173c1f2e", 0x0, 0x1}) r4 = socket$can_bcm(0x1d, 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) readv(r6, &(0x7f0000001700)=[{&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/108, 0x6c}, {&(0x7f0000001600)=""/207, 0xcf}, {&(0x7f0000000040)=""/13, 0xd}], 0x5) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) connect$can_bcm(r4, &(0x7f0000000000), 0x10) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000240)={0x1d, r9}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x1, 0x7ab0715dca68fab7, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "51d5205e4ca4b888d40047c37321760319cfff34bdfeff767c815dad738690b20cf465f6ef18683b77224a9922dd0c52d6f5d97258d9a57813477b6fc92af87b"}}, 0xffffff0a}}, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000140)={&(0x7f0000000240)={0x1d, r2}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x1, 0x7ab0715dca68f8b5, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "51d5205e4ca4b888d40047c37321760319cfff34bdfeff767c815dad738690b20cf465f6ef18683b77224a9922dd0c52d6f5d97258d9a57813477b6fc92af87b"}}, 0x80}}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x91ffffff, @remote, 0x2}, 0x1c) 11:05:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x19c, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x1, 0x0, @local, 0x8000}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$revoke(0x3, r3) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x288, &(0x7f0000000200)={&(0x7f0000000140)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x12}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_PARMS={0x0, 0x2, {0x7fffffff, 0x0, 0x0, 0x80000001, 0x7}}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x34000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="800100000001000000000000000000000200000713020e002c00010014000300ff01000000000000000000000000000114000400485b5e6b7289119ee05fd8d8a868e62b2c00010014000300fe88000000000000000000000000000114000400fe8000000000000000000000000000aa1400010000000300fe80000000000000000000000000003200000400fe88000000000000000000000000010122fd0e001400010008000100ac1414bb08000200ac1e00010c00020005000100110000005000060008000800000004017800060008000100e000000214000500ff010000000000000000000000000001080001007f0000011400040000000000000000000000ffffe000000214000400fd01000000000000000000000000000100000100ac1414bb14000500fe88000000000000000000000000000108000c0000000004"], 0x180}, 0x1, 0x0, 0x0, 0x4000000}, 0x8004) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x87, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1405.495301][T28503] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1405.600435][T28507] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x8}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1405.655380][T28511] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:05:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = getgid() write$FUSE_ENTRY(r1, &(0x7f0000000000)={0x90, 0x0, 0x6, {0x5, 0x1, 0xa87, 0x6734, 0xfffffffa, 0x6, {0x2, 0x100, 0x920, 0xffffffff, 0x76, 0x6, 0x5, 0xfd, 0xffffffff, 0x5, 0x0, r3, r4, 0x7, 0xffffffff}}}, 0x90) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x94, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:04 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x10000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="5800000030004ff600000000000000000000000044000100400001000800010062706600300002801800020000000000000000000000000000000000000000000400040008000500", @ANYRES32, @ANYBLOB="06eaa5000000000004000600"], 0x58}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0xfffffe46, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000004c0)={0x980000, 0x100, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={0x98090a, 0x100, [], @string=&(0x7f0000000440)=0x9}}) r12 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x4030582a, &(0x7f0000000040)) ioctl$TIOCGSID(r14, 0x5429, &(0x7f0000000500)=0x0) r16 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r17) sendmsg$unix(r1, &(0x7f0000000600)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f0000000200)="2dcda7ebc084e228bdf226a2d764c22d1d539be65bcd06bc7aebfb98411296041b71a9e4b390dbc9ede029d0381ca898d3c7570fa7e969c83ab4df78c75c5c7ed2991955ca689622", 0x48}], 0x1, &(0x7f0000000540)=[@rights={{0x1c, 0x1, 0x1, [r2, r3, r4]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @rights={{0x28, 0x1, 0x1, [r10, r0, r11, r12, r13, r0]}}, @cred={{0x1c, 0x1, 0x2, {r15, r17, 0xffffffffffffffff}}}], 0xa0, 0x80}, 0xc010) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x1, 0x0) getsockname$netlink(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="6c0000865990480169a5e700000000000000000058009b72601ca28f5d19171a27cee13501005400010008000100627066004400028006000300050000000c000400000014ff510400002c000457fa5419c4100008000000000000000000000000000000000000000000000004000600"], 0x6c}}, 0x0) 11:05:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_SUBDIVIDE(r1, 0xc0045009, &(0x7f0000000000)=0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x43, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'pids'}, {0x2b, 'rdma'}, {0x3d, 'rdma'}, {0x5a, 'rdma'}]}, 0x24) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000000c0)=""/55) [ 1406.026553][T28533] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 11:05:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x9c, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="71d8497949935578515817292940a31dccf09a8ed47b4434e48a000a848b9a9f7fa4ca9a53028bafa31215cf793c41dcbc2eaba74490bbb2c44f90e19f2c7f4f8171e046373c45307e195bacc65c438c878b9cef5db5de99a50806476eef8c4be4baa69d47d88f83921bf6cf60f13b2acb", 0x71}], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$SNDCTL_DSP_GETIPTR(r1, 0x800c5011, &(0x7f00000001c0)) 11:05:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xa4, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xe02e0000, @remote, 0x2}, 0x1c) 11:05:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@loopback, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f0000000040)={0x18, 0x0, 0x0, 0x8}) 11:05:05 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$getregs(0xe, r0, 0xb8e, &(0x7f0000000080)=""/22) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x5}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x40000000000017f, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:05 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000001780)='trusted.overlay.origin\x00', &(0x7f00000017c0)='y\x00', 0x2, 0x3) write(r0, &(0x7f0000002000)='/', 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000001640)=[{&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f0000000140)=""/101, 0x65}, {&(0x7f0000000200)=""/235, 0xeb}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/117, 0x75}, {&(0x7f0000001380)=""/193, 0xc1}, {&(0x7f0000001480)=""/133, 0x85}, {&(0x7f0000001540)=""/26, 0x1a}, {&(0x7f0000001580)=""/192, 0xc0}], 0x9, &(0x7f0000001700)=""/21, 0x15}, 0x41) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000000000/0x4000)=nil) 11:05:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xac, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x8, {{0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x37}, 0xff}}}, 0x88) [ 1406.822179][T28572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:05:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x1}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xb1, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:06 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8040, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r6, 0xb4, "4c09765c2587abaa12c914e700fe468a3fa7249247cccb34bf706b01d576a9a556f6ee1717300e365c2d42a58b84d5b6aad1ecdb86cd61653e908fe5fca5b3ee84ef6ec9221cd51f670a4403f1b99f64646835512da4f708efdda462c91bac8ffa8a9c3a08b8ddda5716b6e81120b371af257de72e41009957308957c86e1a30aec4f8e5e49f5fbf1f3afa29de90be17d7f329294a4887a5a3c2c4e122fd05a486fa149f5f72cdce08d16788cdaec0fa7cdfc7b3"}, &(0x7f0000000100)=0xbc) r8 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f00000003c0)={0x6, 'bond_slave_1\x00', {0x4}, 0x9}) keyctl$dh_compute(0x17, &(0x7f0000000040)={0x0, 0x0, r8}, &(0x7f0000000280)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha512-generic\x00'}}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r8, 0x52, 0x7d}, &(0x7f0000000200)=ANY=[@ANYBLOB="656e633d6f61657020686173683d7368613338340000000000000000000000000000000000000000000000000000000000000000ffff00"/78], &(0x7f00000009c0)="53e726f21d79783c733fff37b169cf8c36c6a7320e22a9cb3f56ac79aacb5284478df798669445241d4d7a1a431d9eda23dc4ab201f5627608152ac3d634e1856d158a27bee9f42336d9e275b20d85813826", &(0x7f0000000a40)=""/125) keyctl$read(0xb, r8, &(0x7f00000001c0)=""/76, 0x4c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r7, 0x400}, &(0x7f0000000180)=0x8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) 11:05:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xf5ffffff, @remote, 0x2}, 0x1c) 11:05:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x10001}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000080}, 0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x300, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @rand_addr="f5fcd31997ac9845ecd6db240bb9bd60", @mcast1, 0x0, 0x5, 0x4, 0x400, 0xfffffffffffffffc, 0x10000000280}) 11:05:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x7f, 0x5, 0x4, 0x800, 0x5c70, {}, {0x3, 0x1, 0x4, 0x80, 0x0, 0xf8, "b85d884b"}, 0x10000, 0x1, @fd, 0x2, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000180)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)=""/145, 0x91}) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f00000001c0)) 11:05:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3a3, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:07 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRES64=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT=r2, @ANYPTR64, @ANYRES32=r0], @ANYRESHEX, @ANYBLOB="5d762257c05d0b3cad5241e17978ee2a714bf7d5e9d8acfc0c20a7143a0fa5f677f0bbc39672b7b1d6905a5125931b86d1d15a4e39f785937992524e6d306fdf0d9b93414a16912ed13694a088d5e92cc901d25de76d914bf6591abd218114e28cf6427a913647c17af0ae778cdb44476b834ef85a50ca1b00f9fa676262ab8811453dc3f1e5bd7254b62f9d1157a3d16bf48dc2b46636087650db5bf7d55f643b203062d9818332a57af4b8e97eecdb74b950123ab7dada21971096a7ccad6293684c36709188625298b830b76b66e5e3cbdd148823972fa00101c452520a3c973f4b4087745c436f900a24e063af3aff239c549e47f279", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64=0x0, @ANYRES32=r3, @ANYRES64=r0, @ANYPTR64, @ANYRESHEX=0x0, @ANYRESDEC=r4], @ANYRES16], @ANYRESDEC=r4], &(0x7f0000000000)='./file0\x00', 0x0, 0x5000, 0x0) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x800, 0x0) 11:05:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f00000000c0)=0x101, 0x4) getsockname$ax25(r1, &(0x7f0000000000)={{0x3, @bcast}, [@default, @remote, @rose, @rose, @netrom, @remote, @default, @default]}, &(0x7f0000000080)=0x48) 11:05:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x500, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x600, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1408.229581][T28631] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 11:05:07 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = gettid() ptrace$setopts(0x38f4b4cc427da0c7, r0, 0x0, 0x10) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/igmp6\x00') write$UHID_CREATE2(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3000700faffffff090000000000000001800000c1642ad29a0bad99c7ca3cf259f08c469230f4d1467f892d253661b34fb3fbab9b9fd168a3fbee66e1661d697c2d0f4562cda895b0c23eb713f33dc9fa2c69cb8517c5b71e29fb6c07147103535e6a429afa8ecca6c3ad5a7560082dba30fc044b72ff74b93e0bbd7964431f081a9c4b2dc50aec801bc0d4ae8e29a5deb593956b4a4a31af31a6d927d8a497abb322a0d8222b7ba43ef5668f9070c68eda230ede6f462be427c45f0a37430ff8dfb0ab52eeee0645c5c827f9f246267d802dfa5e1696baab7548d722f6374dddff6ba25e735144028c64d45ea8fd7e7c18db17f5cf4af033b020490effca560234d2db6feb167b5713f59983bafe9bba35f79c0bb37102ca4f81d851a465cd38201f6ae206c37cdfbccba17b3bc5230c30e79bc6f40c7517f8936e45afc2dc63221390fcf43e73c9b5c6295430df9e0bc77cbc3a48a38ceb676541a53223e1603367822ac1ce"], 0x1fb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x400000001, 0x70, 0x1, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r3 = gettid() waitid(0x1, r3, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) sendmsg$key(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX, @ANYRESDEC=r3]], 0xfffffffffffffe56}}, 0x20004850) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, r5}}, 0x48) pipe(&(0x7f0000000200)) pipe(&(0x7f0000000200)) 11:05:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000028edb58ce800002c0004000800000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x14) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa6c1c0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000780)={{0x0, 0x4, 0x100, 0x0, 'syz0\x00', 0xfffff2c9}, 0x5, 0x30, 0x7383, r4, 0x5, 0x0, 'syz0\x00', &(0x7f0000000740)=['NLBL_MGMT\x00', 'NLBL_MGMT\x00', '\x00', '/proc/capi/capi20\x00', 'bpf\x00'], 0x2b, [], [0xa23, 0x7f, 0x7f, 0x101]}) sendmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000380)="23f1efd266712f1a8c99ac5459a1db1a8b93682fd4c220ec8a1c535d1a786d9a00c048dd6a120b919a6f6f5ea92782b5235f3ec320fd09289cea42fe5d9ab4c0f0c02a1da7b16054e4287d3106fc0a78e275b54d24cfe457cbd364386bed6e56b53f16b0fe88d79e8311da9620660c9a81ec12e2de07b0e69905846b617b5cfdd4d44470cfe8ea04656963ad5806533f42c4d8b12c71840a36796fc0c0e4a5897783214a995838e61e00da9e5bbe58ade7892163b77294019e3b8d8df68489bfdd23ed04621ee6f02e", 0xc9}, {&(0x7f0000000480)="61759fca876d775a07721079871acfcc6cb7f927c7050b83b5d43df71fba026635e1ca0f830eabe6d02d58a3c06795c990ca6e1609e9122ceb87d076bb55f458be6178f3df5c6613c2f268293706ec6e36839f074a56f16dadf84dee693ca938c1652248280cb142736a0ce04e0221249a64e5db06633112632b69557dee8475bd5d6d79c1bb229980dc88054aa71577a2095405a3cec288f126ff76758abadbdd62c92e667feaa09d8f7391bffe94e0452010e76ff5f5c3c9fa62bedeee593a2767ee7d4eaf378dcdb68ca9a59b08e25e5473bbd39db8edf0f479f5", 0xdc}, {&(0x7f00000002c0)="3733e4351392d3ee3b17d7453a26345552c3f60c6db09c756929040f07ef669257a45aada0d5918ec029b6c8211ba8b75f00fe3bc112a45a29dc83d4f542fddaa585e842dd3d373cf7fe716e6ecac1b2b4de8f86cd83b9c383fbec1de852e7683e101184e3e52d7d125ba811330740a7e34086fdaeee30e8ac", 0x79}, {&(0x7f0000000580)="fe8bef6c884140b2a8312c5263017ab1119280fce5c2058fb82c65d02953236014b3b26fd6f236bb038225155f6d68f584f36165c4839b27906bb08d890ab0", 0x3f}, {&(0x7f00000005c0)="f6fc6f197e24df980cfd974a12138993c8e7d4534bfccaefae5c55b3a8210d002f5d3d07c8d53446aeb916c0d222ffa820ecb7d5dc27de3d79ccdf3f2e0b71d222cc0fdf68cd553089eadcbdd54b45c81bffe424a23bea52a884edc4ee76c94b00cb76b9cf908d59c37f5471d9eaa90d73d1f3d30158817519025da914bb2e8b7f561065543d7d85eb56869a618e0a6fb2be9a8a2b71b9605f81d54f37588c", 0x9f}], 0x5}, 0x4000080) pwritev(r1, &(0x7f0000000b00)=[{&(0x7f0000000940)="92a1ef03f3b84cc228c7d90fffd13555b2fdbdb8ff136b525a774b50ae6bad5443902a9ec2bd60eadb140bad7ed1586c7b5f0abb6c6bdae95e524a39b655bba34adb34a4c4f1034e28eb7141ba517a7f384880fecc76e56d2c46b5a014bdfa35f0510cb0503d9c0780d602bb4c831556c9c8fb700bf5ea850ad9ea432262d8f7ead668bf2f4a3a720a01099f2c40cf4131879ddf", 0x94}, {&(0x7f0000000a00)="487372c14ab6a049965b2bfc94d7bdae0fcb8bbf69916bccb5f9796e9fe5acc0c139d1c2693deeeb569ae91e9486cef4c3804e66", 0x34}, {&(0x7f0000000a40)="b2e648a5f72e703fbc95c8a52da0471b7583bd67bc9dfe45c7647261099a290c8e9c8260ae7afda47dd2abc41999526c2ce76089a8dbac216d3e0c373118e3b568f64289de4c50c8254b1a7d316c57bb54965fc30c491bcea03cd6f91c2b6718fb0d2cb7a5f17fb77048d288b22847fa4c0d6c8da45f3b8c52defe9e3e6509f67feba51b02b799ddc1dce5", 0x8b}], 0x3, 0xa4) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000068}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_FAMILY={0x8, 0xb, 0x11}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004861}, 0x8000040) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x26}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40401e5) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xfb22dc963ae21acd}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r5, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x17404a4412d175d9}, 0x80040) 11:05:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xfe800000, @remote, 0x2}, 0x1c) [ 1408.490041][T28641] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1408.523726][T28641] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1408.554774][T28613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 11:05:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000000c0)={0x200, 0x0, 0x40}) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000100)="d22becfc2c84caaa28e4580c00e648b9", 0x10) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x700, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:07 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x5000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000080)={0x80000000, 0x6, 0x4, 0x9cdcf6298c667db3, 0x20, {}, {0x2, 0x8, 0x3f, 0x1, 0x40, 0x60, "6bab8ef5"}, 0x4, 0x3, @fd, 0xffffff00, 0x0, 0xffffffffffffffff}) write$dsp(r4, &(0x7f0000000200)="31da2f062a57077aece0ab2b4663f4c0d37bc4f9dc790e430a873adbfd9d04aea92ae2f8e37175eca8e2b8856709766c0fcb09675484325023539c8b8a9c205305960728d266521149cf4b9a2686192052c91e08958d3db95a9d3c3722eb719741742ba175fff4f0ddf7ef8792e72f1dfe8187cbb29f08f15d3645ab946f5e06a26408eb43ad1c90067088007d814b851b346f0d1b515214c582a388cc8318fa84cb25797087590c23757d8865fdc3ead2", 0xb1) 11:05:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = fcntl$dupfd(r1, 0xc0a, r0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000080)={0x8, 0x1fb1, 0x6, 0x3, 0x0, 0x7fff}) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff6000000000000000000000000640001006000010008000100005000028006000300050000001800020000000000000000000000000000000005392350a8e00f9d15cfea9be800000016002c0004000800"/117], 0x78}}, 0x0) 11:05:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) waitid(0x0, r1, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x94204, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000140)={0x1, 0xc7, &(0x7f0000000040)="5ddc067eff743937c600bddadbbf804f6da73f986e0b066228fcd19fe8a40e54cb1f55f050ba6afc29a7528830ec24eaa421583fc6dc8bc22fcff15775f128bb78053ea1f78c21894ff01813c03155308187d3f71a8cc9564d0f23077b482f52e171b12fb9f90ca711a2f9bedf4a2729df3f11736fd45f5dbfe9b0bcfcdbf79d8d7984d217a25e8e21bcbe7c3869906972c3c2e5471c8db851470923b94c5d2ceb5d314d5c361abbccd8d8b2fd435d4b5645b9f376d92b60aa12f905a8bf300b9470b6fd3bfbbc"}) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001e00)={[{@rodir='rodir'}, {@fat=@errors_continue='errors=continue'}]}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) sendto$unix(r3, &(0x7f0000000380)="d8df2410c46618362679f2490fc786b4728791fd53f63418cfcdc568f9205c892c0867043ab5b291e6c2b9cc0792db85b7a9a54c15548cc3be5a4268f5a3693061280fe6b402433ffdc71bc6dd4e08fc493db40e8b376ca6d06ddce7077ccf788b796c747b14b7ccd30f37523904c7d75ef6f7883438267a844afef0a5780eb3566c97f58bcb51a8d69fc933146326911456dfc4a217a3e06e30aa56d49f4288f59edb0e97b7ddc2975de1460811749f4d425614c7cda8476785b4e213fbf43d382e74eae0bf733cfc2599d85f5e20", 0xcf, 0x0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="5800000030004df6000006000000000000000000440001004000010066003000e1801800020000000000000000000000000000000000000000001600040008000500", @ANYRES32, @ANYBLOB="060003000000000004000600"], 0x58}}, 0x0) dup2(r2, r0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0x30}, @ipv4={[], [], @multicast2}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x5, 0x4, 0x0, 0x0, 0xdbecc49306079b8e}) [ 1408.931445][T28664] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. 11:05:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x900, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) setsockopt$inet6_dccp_int(r1, 0x21, 0x1, &(0x7f0000000080)=0x1000, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x1200, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000900)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000a00)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x78, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2a5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7fffffff}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 11:05:08 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xfffffffffffeffff, 0x6) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xa00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x2, 0x5, 0x4, 0x0, 0x9, 0x10000000280}) getpid() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) 11:05:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xff0f0000, @remote, 0x2}, 0x1c) 11:05:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="7800000030004ff60000000000000000000000006400010060000100080082c9ffda4b8f126ca18ebbdaa5010062706600500002800600030005000000180002000000000000000000002c00040008000000000000000000000000000000000000000000cfa15e4e78533ce9f35a76000000000000000000000000000000000000040006002d6b24f6120f0012c0a3aee8ac47c120784a944348a059320eb6a6a847446e9eb44b849c87bef25de31aaf21d6e096c8109311ba9dc94067b1ef332b857c2a1edf03387d4471f74863bcbe93aaa4dec35ffea7ef8540b8b1829840000000150c5d6536007e974c88eafd83cd3a56ae66f89ba8237ea77038bd89b07759d1213ad5cd00d70878db4931a14b116332b335aa41ea7ccc0fafd4639468948f058ff55df0c6a5f02bf027ffe2c348e978361f74b158e150274ec952"], 0x78}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x3) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0xb, 0x801, 0x0, 0x0, {0x8, 0x0, 0x1}, [@NFTA_COMPAT_NAME={0x8, 0x1, 'bpf\x00'}, @NFTA_COMPAT_NAME={0xf, 0x1, '(^\\selinux\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_NAME={0x8, 0x1, 'bpf\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x20000048) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) 11:05:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xb00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xc00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0xfffffffffffffee4, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x14, 0x30, 0x5cb2410691e7f64f, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 11:05:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000004c0)={r6, 0x9, 0xa, [0x7fff, 0x81, 0x1000, 0x4f5, 0x81, 0x1, 0x1, 0x1, 0x2, 0x0]}, &(0x7f0000000500)=0x1c) r8 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r9 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r10 = dup2(r9, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r10, 0x80045301, 0x0) r11 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r10, 0x84, 0x1a, &(0x7f0000000400)={r12}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r12}, &(0x7f00000000c0)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002000)=[{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x20, @loopback, 0xbc1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000040)="e8325590af3338ef0c14d207559cad88a505db583144bf38d3c958095f2f6340311884a7686c325c69", 0x29}, {&(0x7f0000000080)="e8cc83ee253958a446f3e3caae7968b8075fa94d2d0eb6bbcf17cd4876d46da4bce47614b4065572b59a348efe7674cc71d6b0bc680446d00cf1e3e7b0cc75308f9d187d9991075fe8ff457124db27820b22cc80e3be3a10b51c1cc5f69f02ddeb99d7a67ef0c8c898f1700f", 0x6c}, {&(0x7f0000000100)="7f4df26c36ff16ef70511472124c174a1aa2e2d9df32179b260dd5ee07ac8d0eb97a9f2da4ff61231f87ceec45d2f87d9f7ee0a2c89938b59ad180", 0x3b}, {&(0x7f0000000140)="85752a26f9bf61900f303832", 0xc}, {&(0x7f0000000180)="db31f32b6dc3c098885bdd78e2a4e45bef69715cff22fd19e78e83d0df9843f9261c62251aca362407a8f94ded56533e17286fd6bc7a7826e930c2e27bfc20ee2571df7ec3bd7133516589d31b1e1b0a425e81884ff56bd1b2fb87a9eb8f5154ba8926a3798fe089c6a66ae881d1446f5feb4b0ba684063d44a73f5b8f48956e643efeb9a14f78225573664d329cc7744e745c7b37577dc7c322cdc4e48cfc59c88b61bb84549674b740d84c042a78440cd17b29c819a87b7973cccc8eb739cb9e6aa28ee84853e2595e1b391de55de9d9b355cfc888746efbe75fc91f0d31957d7da3c8b0d6ff1c8c56aa42c55e6f09fac573eb", 0xf4}, {&(0x7f0000000280)="64ae91e8476204a3ff1aecce7209c063bb8c89a5f35b383dac5fef8cfedfdea1d1f3acabd218fb59fdd96fd2ce13c0b2b000dc5bbb22ed951a9f", 0x3a}, {&(0x7f0000000340)="525a957c1802c7e3807f54e8aaa2be2d5974252d022c9584c03352e9cb38c115e1f02d5c95d3804293d3aaeb98234e919adff16aa6d91f7c1cedc768f520c7296050b8c8bc1c371a1cb9c0518331f2a1a8530cab421fff709f4f816838bc475de9048faa3bda1aceb964f8319f3fe14547bb45a3011cc714b7c857aad23143681a2da2c3826dfba864d173ef187a76370e3e2e5c82cfe58167c2463742133613649805bbe6a02f272a01cc0eb54fe3e56ce005", 0xb3}, {&(0x7f0000000400)='GH', 0x2}], 0x8, &(0x7f0000000540)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x0, 0x208, 0x2f, 0x800, 0x4, 0x6, 0x9, r7}}, @authinfo={0x18, 0x84, 0x6, {0x3ff}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8, 0x6, 0x0, r12}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x7}}], 0x80}, {&(0x7f00000005c0)=@in6={0xa, 0x4e22, 0x20, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2}, 0x1c, &(0x7f0000001940)=[{&(0x7f0000000600)="eda7645c2f7045bcbe755ccbf231e8d49cea532dd24a13a9f3dfb5e97f2de94767ef2bdc389b305cff215339e6d53a1193e717975073794d1e7c36a456b8a276f4f847f7b24a00b3048a91046cef3b08a643f45072c93036457153f4cbab4066ec49a8e4764c2e07b04ae862b76b46a60b465ed43348678e3f34c532ed6248ca6eeaee55cb7d6940acfecf7ccbce0503424713e0b4385d1b57682fb92ed40bc070b77e5f461c8cc1992bf51d04cd086ec0a1faa78546a5af9260add0", 0xbc}, {&(0x7f00000006c0)="507f71f79148c69f1808e7192b641d91dbf7062a348b5b216ee21ecd81fd9470b85c5c69996ef686c51b37db0057481b4ff48f0157b3ab73af8393714f", 0x3d}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="6fdb3fe3a93a85788adbbcb4b9d73a9475d18726728042fdbb2371b2cc8b9aec113a0c1ce28e27247b82c2c529779d571d6765c7c1ffce0fdfe7bbf1e8c466dc70a93c37a2bc542aa94059810948ee78f7c917ac6b1d367006bc56832d51f5dbed6c287039a1a7f3d234f4ab5de0a65db2fa7ebde4e2a180d1471ba19fc1d231dbe71489db04e83592081dbe6742", 0x8e}, {&(0x7f00000017c0)="234c46ae791498e3b307371b04dc460d64a934f0cb68e9f07476", 0x1a}, {&(0x7f0000001800)="b38c66c06c95a1d27f4e2fd29c5571c38aa872ed8a14f81b40d2477eac359c20bdcfd5ce227a91771d2f33bc96908eb21d70187967ba882281c3525752ca6c47c59a112e1b3250ece2527e90439ffdf2394900d156c46404c7ab9fd4e7e67e0d9a5924104325691f7f2a6c79a68251cc0a52e740d9195ceaf17411ffcf0b1a9add6248445b6e4a5294492f0b2a9d8763e843558ef64c4e016c5fc82be86b3e16794dccda13fd13b9b8d74c27f87840cd48e9fb2a7a9584661c8663ad4ca674d9fae64b929f4b", 0xc6}, {&(0x7f0000001900)="196ec003a8cc84fe79df1a174f3f5c7cded794614ded68eed33496f3222273f146942a5c4e471a41f91f85f977c9496e79bc036bd576d179f7f62b17", 0x3c}], 0x7, &(0x7f00000019c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x24}}, @authinfo={0x18, 0x84, 0x6, {0xfff9}}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @prinfo={0x18, 0x84, 0x5, {0x18, 0x5}}], 0x98, 0x4000000}, {&(0x7f0000001a80)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000001ac0)="842b3b34d8be8139ee2e3571e2bb1ecf4346500848619f0633f6fb03cd28a7687d6297d2f014c30f697ebd955a91602cdc5f341ec51b6b67cfbeb5b2c42a89fa48be87fb5a46cf34d66e235f24cf944a39f676c7b6a58b03f800cfbcf7684d31fb33a5e8290bbebd38993142b208dbb24f7a62bdbb8250ed15c763d7aad55f19", 0x80}, {&(0x7f0000001b40)="0b2157af81d9f375b79b31862d2069dc1be145e1d94f0e6c5cc692854a1154455f7d70cd96df769e9b87edab6696359239c337316594ffb97435138798276cac67631e9b508b44369460b9ed98d235c58d4c2a131112de6fb4d4577d8189afbad6136194ee44869c8b256fb66935532339f32e249a706cba3833b2bb8071bf601e3a7552b4213ac660758aa7f14638b7a1f54553230b6e7d65437f118f92ceefc2f5d376972174c843817a5e44883a326da0128e558786aef152f122efdff9d04d982cd6f489", 0xc6}, {&(0x7f0000001c40)="0a17f4f6410d58", 0x7}, {&(0x7f0000001c80)="792021b9c0a1f0686f923d723f76980d6aef07c0ab6f91df4ecc3e958dc9f96c3027dcb8c39ebc588b2c7e59cd49fe949badd7063c75d779e07ab30f710e507cc6f9d36e3da5c3c6ce0d9008ac31a9d7912fdabc6d3587aefdc4618ba11139916ee150974deac27f66ec34de1f8e643dcdb5cbb186", 0x75}, {&(0x7f0000001d00)="bafc722153f8fa026a67a1c75ea5556461ba1dd1aea5a8637a536d8ebd464836a56ae97783ee6d0784b66236cc30b582bdfd83764c43beeda5ede4dee5773c9f883151ebb75649515feff7e3668ba2b07c3659218a63f822749112eefaba422447ee188dfa3ccd081314fe1a911b3b836d305aa70a144b8c08e677db075974b75e06", 0x82}, {&(0x7f0000001dc0)="9c6c5c83a8d1f95295df879879217d423156abaf674f572aa35d0e37b3d98d7a88d837139ee603c379973948cc2ed6677ddebd7c9aa69a4e1e301d85678cb37892656afc6b6c8cb9019f617428383b0acb5520b19d67f7ce61755811070306d063d635db8a2fa978659dd5dff9f80673ca1df74ea77b81da00f29e32b566979cda10b42be37d2f8830f3819bec0b382d7450a984445b177ffad7db918224f9ec90ea893cc961daea84d9ce81b7bf2ed6005e3b9d632d00d1531e61e9543316b0107bf0523aed9d531b8bc338b09dfe", 0xcf}, {&(0x7f0000001ec0)="e5a1ea342e77c74490484f6b1eafd78d0c33877081a2cf12c0a6d09dd2640e9e62f7589b9aa5b78bf2eca2837de0fd436f26795232143a0c2f37d0c5690f0911be10a4e29759c71f8679deb1d91f3776aacfbbd5ccbd6e226e9dca81c850705b4fcf3512af4645f3f57dd106614308906d12032154", 0x75}], 0x7, &(0x7f0000001fc0)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0xacd}}], 0x18, 0x80d0}], 0x3, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000000000)='/', 0xfffffffffffffdb2) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x110, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xe00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x100, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xbcc) 11:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x492703, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000001440)=@ccm_128={{0x86e37dc841589e6d}, "7dccf91e1166b48e", "366c8c1dc6c20b5488441046183a959e", "29be3b82", "b89a15720ce3252f"}, 0x28) write(r0, &(0x7f0000002000)='/', 0x1) r2 = epoll_create1(0x80000) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x8, 0x0) shmget$private(0x0, 0x3000, 0x10, &(0x7f0000001000/0x3000)=nil) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000200)=0x0) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000840)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x20042041}, 0xc, &(0x7f0000000900)={&(0x7f00000009c0)=ANY=[@ANYPTR, @ANYRES16=r9, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x26006045}, 0x4008000) tkill(r8, 0x3c) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_GET_DIRTY_LOG(r10, 0x4010ae42, &(0x7f0000000980)={0x1fe, 0x0, &(0x7f0000000000/0x4000)=nil}) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r8, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r8, r1, 0x0, 0x5, &(0x7f0000000300)='ppp1\x00', 0xffffffffffffffff}, 0x30) sendmsg$nl_generic(r1, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="000008001200", @ANYRES32=r7, @ANYBLOB="59e17581f5b50f6cc315c84585ae0b6263f2fb89144cbe663437209411837460e908008800", @ANYRES32=r11, @ANYBLOB="08000a0001000000bfd54e30ea05486851faa7c7b5000000"], 0x9}, 0x1, 0x0, 0x0, 0x20000010}, 0x910b334113f1f3cb) r12 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_TUNER(r12, 0xc054561d, &(0x7f0000000140)={0x7d, "d5f054e1727458a8701eeedd955477f229b5abf0beac2a250bf2c74ea424366e", 0x2, 0x4, 0x67, 0x8000, 0x4, 0x3, 0x7, 0x800001}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xf00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xffffff8d, @remote, 0x2}, 0x1c) 11:05:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x81000, 0xef) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) 11:05:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1100, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x40, 0x0) 11:05:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="17df000000000000000004000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r2, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x8, 0x3, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x12}, 0x454) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc}]}, 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001640)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000427bd701efddbdf250400e300c56732883cad6330000000000000000000080006005c00000008000300010100000800070003000000082100"/67], 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x228880, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r2, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r4}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @local, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0xa4, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x90, 0x1, @m_bpf={0x8c, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x8}}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4e, 0x6, "f541887aa698aec390443c8faeb8b033fa8ba888977e5d7d64fa9ef03d2d05ba40c83be594669539464a6c365454701ffd07bafda353978cf2006072b81a3264ac5b923f5c4d1a4b885c"}}}}]}, 0xa4}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000000)=0x6) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r6, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, {0xa, 0x4e23, 0xffffffff, @rand_addr="c7a6d80068228dc0533e818e40e439bc", 0x6}, 0x0, [0x100, 0x3e, 0x9, 0x6, 0x8, 0x7, 0x3, 0x5011]}, 0x5c) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000040)='./file0\x00', 0x0, 0x1, 0x0) 11:05:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x5}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1200, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109a81, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000000c0)={r2, &(0x7f0000000080)=""/42}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0xb}, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x60ee7) 11:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x6, 0x3, 0x1, 0x4}, {0x8, 0x40, 0x7, 0xd99e}, {0x7, 0x80, 0x7f, 0x7}, {0xe565, 0x8, 0x4, 0x9}, {0x6, 0x0, 0x1}, {0x4, 0x9, 0x3, 0x900}, {0x401, 0x6, 0x9, 0x6}, {0x400, 0x6, 0x1}]}, 0x10) ioctl$sock_proto_private(r0, 0x89e8, &(0x7f0000000080)="0e2a97e3136db46bd7b44cdbcca9e2c15361c2d1cf1af302e7581681649fd299068a5fde51ffce7a3479a0e0ec44bf404f56458667d0a94d126634a5bcf4b7ca6fe467191c1bdd919a2cfb9b9a1d6518732fa3aeffa1e6b4712b967446431272d1ccb7") sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newtaction={0x98, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x84, 0x1, @m_skbmod={0x80, 0x18, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa, 0x3, @remote}, @TCA_SKBMOD_SMAC={0xa}]}, {0x54, 0x6, "78c1884453801c68a5eeb078375368f9ddf2b2d0aa90f7b7534490b1093137e63f75928143497039ccaab0f2d971ee6155f0f886bd108a46b554abdff1b7199633ac06802f985b30ab9eecf5b72bbc6b"}}}}]}, 0x98}}, 0x40000) 11:05:10 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000040)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x20, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x6}}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0xfffffffffffffcad}}, 0x0) pwrite64(r2, &(0x7f0000000080)="5e21006c08d82e65b17d9cfd0c30", 0xe, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) 11:05:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xffffff91, @remote, 0x2}, 0x1c) 11:05:10 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x0) accept$inet(r2, &(0x7f0000000400)={0x2, 0x0, @loopback}, &(0x7f0000000440)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x2008000, &(0x7f0000000300)={[{@default_permissions='default_permissions'}, {@metacopy_off='metacopy=off'}, {@xino_on='xino=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@obj_type={'obj_type', 0x3d, '#\'%nodev\x00'}}, {@subj_role={'subj_role', 0x3d, 'selinux'}}, {@subj_type={'subj_type', 0x3d, '#\'%nodev\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#\'%nodev\x00'}}, {@fowner_gt={'fowner>', 0xee00}}, {@fowner_lt={'fowner<', r1}}, {@euid_gt={'euid>', r3}}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, '#\'%nodev\x00'}}]}) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x8, 0x80) getpeername$tipc(r4, &(0x7f00000004c0)=@name, &(0x7f0000000500)=0x10) 11:05:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1300, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) open(&(0x7f0000000000)='./file0\x00', 0x4202, 0x88) 11:05:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3ff, 0x800) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000000c0)=0x1c) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="780000003020c35f3a7d0863004ff6000000000000000000f00000640001006000010008000100627066005000028006000300050000001800020000000000000000200000000000000000000000002c0004000800"/120], 0x1}, 0x1, 0x0, 0x0, 0x40000800}, 0x0) write$nbd(r1, &(0x7f0000000100)={0x67446698, 0x1, 0x3, 0x0, 0x2, "e8513fdb998c10cc1e3cf909042c186829047d965e10a3860536ac43aace6bc5bda60a710a7000bd4fd0e8d1bbd576bc825b45fa119df09b131e691f2c71e776dde01eda751d5139ed2318ecb0a0a66485481c0c5aae64a2da5af9b6723150ca47e65dac8f6010969fb286416c5a8ee7bf2dd450342e"}, 0x86) 11:05:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x80, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0xfffffffffffffcbe) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ioctl$VIDIOC_S_CROP(r2, 0x4014563c, &(0x7f00000000c0)={0x1a, {0x3, 0x2, 0xba, 0x9b}}) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) ioprio_get$pid(0x3, r4) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0xfffffe97, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0xfffffffffffffde1}]}, {0x4}}}}]}, 0x58}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r5, &(0x7f0000000100)={0x100000014}) r6 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:10 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast2, 0x0, 0x5, 0x4, 0x0, 0x401}) 11:05:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1400, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="e9e338f3c400dea040c42bc55a891b0f5cfb4ec503c854c5017ad8fdd8a1c82ae6a716a62886c38ed06ec33ab081c4ebcb90a1ed672342c687511f0d8c51c958e329a443f9b13ae73ea601a3f1e174ad9c0751f9c64307f42ee56ed68a367a9e1cc8d83bca1bb83716"], 0x0, 0x1c}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xff, 0x1, 0x0, 0x0, 0x100], 0x1f004}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6]}) clock_getres(0x5, &(0x7f0000000000)) ioctl$KVM_RUN(r6, 0xae80, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000001300)=[{0x0}]) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vcsu(0xffffffffffffff9c, 0x0, 0x6c8000, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000540)={'veth0_to_bond\x00', 0x2}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r7 = add_key$keyring(0x0, &(0x7f0000000880)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r7) 11:05:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1500, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:11 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast2, r6}, 0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="500200002500000129bd7000ffdbdf2500000000", @ANYRES32=r6, @ANYBLOB="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"], 0x250}}, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4015000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="e8030000", @ANYRES16=r7, @ANYBLOB="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"], 0x3e8}, 0x1, 0x0, 0x0, 0x8}, 0x800) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x264880) r8 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8801, 0x0) io_setup(0xd57b, &(0x7f0000000240)) ioctl$sock_inet6_SIOCADDRT(r8, 0x890b, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @remote, 0x0, 0x5, 0x4, 0x500, 0x0, 0x10040670380}) 11:05:11 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\x0f\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_NONBLOCK(r1, 0x500e, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x82) fremovexattr(r0, &(0x7f0000000140)=@known='system.advise\x00') ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x2, 0x2a, "22b865ea611ee2c4c764858cf9c8c101655f0301b4b787b4bf7c77e9d88e455543cbbace9e1d2b8209cd"}) 11:05:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0xfffffff5, @remote, 0x2}, 0x1c) 11:05:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1600, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1c00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:11 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x103) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f00000000c0)=0x165) r1 = memfd_create(&(0x7f0000000100)='p\xb7&\x12L\xe3J:\x00', 0x3) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'hsr0\x00', 0x1}) 11:05:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1d00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x9, 0x0, 0x0, 0x10000000280}) 11:05:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x8001}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r4, 0x1, 0xffff, 0x1, 0x50, 0xff}, 0x14) sendmmsg(r3, &(0x7f0000001c80)=[{{&(0x7f0000000180)=@caif=@rfm={0x25, 0x3, "f719e6c9e64491ed6addffea56490b05"}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)="e061e1de39a03b607fdb49", 0xb}], 0x1}}, {{&(0x7f0000000340)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x5, @loopback, 0x7}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000003c0)="e519663bb5ffbfb6668426a97e04a57899ee99f8422c36e03b694d87b7ac73e8cadc1a7b6b897fe331b865cac842a62e502ae8f5aae6654575fa6bbe2622ac6acfab91740d94280c4d60b9e79d388cc913479b4ebd2832b2471396e275d7d771675374078d33ab4040da812c208c5f007d59f2639daaa2a63f1328c0f2e6f89aad204f896dbea61c1d9fc24b8f58a1840402ae16d3a668f19db6221103133ebf38f9928843f0edf4f527ec75577e70917553ee9bc54167", 0xb7}, {&(0x7f00000002c0)="a7672abdb1561d6f0809c82c32e84e58", 0x10}, {&(0x7f0000000480)="362a0ad51d034962cee9228b7178b7acdff1a3c290dd3a0b5db3019bf35be53137c34da263e0d95702a51bb2f1c876", 0x2f}, {&(0x7f00000004c0)="a2cd79162f6519d770bdc56797ad73b21fa074305216ee49cf0c212edf4f9463731cd45a457835cf598948f607fc0042ecbb47e0272f4dad", 0x38}, {&(0x7f0000000500)="6f31dfed780a37dbc0095eb207b611cad4359d4e20f4739daa70dbc85558f631ec011945d4e8c4610c9e1612ede9c894946d18eb3f8b05aaa0abcf48749f193eb223f54a730716238279262c7a106979caaa84deb2893b9a8773cb3446f83b2a2c1314e73ccb2947fc6051bae50ff340a70485b0b0461131bfd590371fd362cbb122eff58a386ab01e0953fc579f2f7cbc0d122f7a4240c350793a7051980ce7549e", 0xa2}, {&(0x7f00000005c0)="a91f483c306c01f5e43c628aa37c4ef4fd9549f131ac10a30b2e3caf75bdc7fdab54843288e417d59b979afaf06ef0ec271b618939f776bea3cc46e63413e7c181205fb1687732e662b5d50772713dff4172072ba3517dbaff9e9b54d668dddf7b8cf7a75f0279dd331c9a09a24361b24e1832fcc219d2476cab446ed6132705050dd9d95f6f9a7ebcdc1dda6a06bebe6ed75e5a4eca4cf32953151b4b198cd30a6820250b344e2ba5577e097b659b78c331fe192d608c71f00bd537f0cc3149", 0xc0}, {&(0x7f0000000680)="0f9507f3419358f512c94ca1b04f12c495ba89846d2c2389231cdb5c22189986394c083b785fade3f8d1af4ff507915d13bbb4f6a396b2573daff40aca2763904dbd38e18d6e38cf32e4f6710dc5abce5f0fd7d5f2929a5e748eb7bb0e2cf727d135229a0498321bb206f42d5872fe4320f7c94c221bab3e0224ad20470997246a5265295e0dfbffe7166a3df2979e23a81436605472d42e8db45162e1c1d14f423600047e55f3fa80860d2c2b81df6dd0ff62a8948f25e51136717c037fc82f6162dbf042043212dc1b4ac647", 0xcd}, {&(0x7f0000000780)="2cf04eb96a8bdd0bfd2aff6932db4231a435849aa67d72e12a8e48c7b0e969de94ae9ef1070f00000000000000d43eed25bc00"/62, 0x3e}], 0x8, &(0x7f0000000840)=[{0xa0, 0x119, 0x8000, "74b01f62accc766d36c1b7f63c081be828c23a3109957cda929e6007ed1b22560c2b14d63ae72f070d107c02c18da69306c2ea0319f27ed9c89964e246cb333d360ca72fb0cabce5e5d34162f93f67021f5eb6fd616d416e6664e33da1fc7f65c2231d4d74f421eb5198674c1554286387cde79da5c3b6c26bf4509eb79f2be612dfda5315152c4591d5"}, {0x1010, 0x1, 0x1, "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"}], 0x10b0}}, {{&(0x7f0000001900)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001980)="f518880934ace5684c31a568acaed26ffb018cb34b101612debdd7733e8e98ddf210df20ef83ba01446fcbcf470dbd4da196ad790aa198072a6eab7b2372996bd503e74c6395cb23e64b3d91e8231a9bd4e36f0bc7bc996a4f3c9c3d08e576bb10362fa3404d85829a89a31ca84ad2ae89b6cbbc4ea4811f2f4f26e454d6da511762dbb25c7828bfeb70544b1ce9", 0x8e}], 0x1, &(0x7f0000001a80)=[{0xd0, 0x105, 0x930, "fdae981338e5fb4056cc8c79e92420fbc73717299fb2dbe087fd9e9cd3b4875a550b71960840d8cf44b638247010b7f8690f0379c2c63dc677362528d95ccf0f4ef4212248ffcb10bab1513c9f5f862c435697e2157089459d8c9f319bcca23fc129c2a1151f102ca0a033a4d368958eeeb59e7d3dbd31027940a0a93c436b2089e8f9410aa38ef32c1f7e711eac2c803b973cfe1e9b037f2bc94318f23d7f2bc6e4b07b3e9fde0937c89c8b4f995289f54fd5a6188e50334ffafc"}, {0x108, 0x10e, 0x8000, "ed857767b4a4e6657f94c02efbcfa08d18d84f507cdb3c6b5e2e679c86177d418a4413e21aa0d7e22570d01d4adbc54ed8ed8c878cc9a37ae597be33d313b5aa75cd72d9489325f6339486e911f15ad48b822ecc7190317e40b728e629a5b11ef51a4a77deaf3d705cba65d10eb4724d55a43c2b5e8455f54668278b402bbff6992adc5aa74cd663295fabef9e4502ce05bd586901cc125bdbe67718b20b525d80c9658ad5531ab998fdf2087f99ee021a496389fff8b898ff0e3ccd3e50657bfc1eb20541da40087e07b4d2cb07dfb5c112c36e3b66c11023468c68eabfaeef5ed39d65aeeb8081337a38c5b187cb22cfd9c4d3"}], 0x1d8}}], 0x3, 0x20000ad8) prctl$PR_GET_TSC(0x19, &(0x7f0000001d40)) 11:05:12 executing program 2: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @multicast2, @multicast1}, &(0x7f0000004180)=0xc) socket(0x18, 0xa, 0x80) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280, r0}) 11:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2000, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], 0x1}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0xaaf, 0x0, 0x40}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0x990000, 0x53c, 0xf11a, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x980902, 0x68, [], @value64=0x2}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x9, 0x4}, 0x0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r4}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x31, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x7, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x42}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8c2a}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0xf3, &(0x7f0000000240)=""/243, 0x40f00, 0x4, [], 0x0, 0xa, r1, 0x8, &(0x7f0000000380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xf, 0x5, 0x8}, 0x10, r4, r5}, 0x78) 11:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2100, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) 11:05:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) 11:05:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800ff0f00004ff6000000000000000000000000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000000000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) 11:05:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x1600, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="17df000000000000000004000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r2, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x8, 0x3, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x12}, 0x454) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x1c, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc}]}, 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001640)={&(0x7f00000001c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000427bd701efddbdf250400e300c56732883cad6330000000000000000000080006005c00000008000300010100000800070003000000082100"/67], 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x8) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x228880, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x34, r2, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r4}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @local, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2400, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:12 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x9, {{0xa, 0x4e21, 0x1177, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}}}, 0x88) 11:05:13 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x508, 0x70bd25, 0x17e3ad0b, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x40080081) 11:05:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001480)='NLBL_MGMT\x00') ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000080)={0x3, "cfe44f710c510a873eae4de1a4e2c50f479ca99891c745abb3d36f6d59fceda3", 0x0, 0x1}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) statx(r1, &(0x7f00000015c0)='./file0\x00', 0x2000, 0x4, &(0x7f00000014c0)) r2 = socket$netlink(0x10, 0x3, 0x8) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) pwritev(r4, &(0x7f0000001400)=[{&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000000100)="8601023f793dab59edb42381e0a5fcbd449461eb74171ac7b73075c8c302b187fcc7557b107028fbf044c4590ab25399ae6ea05e028f6ebacd290b9ab9df2313df2055a2457aa00c1342609d4a042748f23658985f438a22704f768a7310c786480a8fca8d3f6c5c1356c31e0befe60cad82e82545d1036b5546f977ab25c5c03bccbec52dbced0453e7fe184b3cb5309c467ae46b2c72bd1a1aea3b2bf1", 0x9e}, {&(0x7f0000000240)="4fdc578bfbc5fb9e035adc394ec99bed7663c9ff7f32bcbd7fb9a344d28cb2905f039b99a7cbba0c09b7cbc774dbce4c3cf78f881a0420e7b98a831b82e88c0d16d387450e1d7efa052d6f534ae6aeab0f6cfb91", 0x54}, {&(0x7f00000001c0)="22d1d44a0662c030497717043a22cdb78269a5a0fae067eb31e96c0c6513072209555d9d2bd781", 0x27}, {&(0x7f00000002c0)="4d045d8b31e5b3661775df4a4d737123992a782c9c16f863e490cc71df6b941d7114a23dd378bb52233280b7032bdc73ed591b40365fdb93a11469d7ed9343", 0x3f}, {&(0x7f0000001380)="ea3ab791c97aebc379829461b5cfd15a40308663ff81c9497a254d1d097c90538e13ac82ad1f91796d7522e8d92aada2b43e8e2442bbc975fb4900099d70b344f793aabfd9a66b23f090d8536033f85e7bb2344ccb1760a471b15a9537c9948f6693847634c9f435e28ee500a8a7", 0x6e}], 0x6, 0x3ff) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)=0x72c) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2500, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$IMSETDEVNAME(r3, 0x80184947, &(0x7f00000000c0)={0x3ff, 'syz1\x00'}) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2100, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xe00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2800, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x10, 0x3000) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)={0x20000000, 0x8}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000100)=0x7, 0x4) get_thread_area(&(0x7f00000000c0)={0x1, 0x20000000, 0x1000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}) 11:05:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x2]}, 0x2}, 0x1c) 11:05:13 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0xfffffffffffeffff, 0x6) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='.', 0x0, 0x5000, 0x0) 11:05:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2c00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4, r2, 0x430, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xba22}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0xffffffffffffff9e, 0x4, 0x205}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0xffffffffffffffac}, 0x1, 0x0, 0x0, 0x40000}, 0x80) 11:05:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x3]}, 0x2}, 0x1c) 11:05:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2d00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x800) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x80a00, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r5 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000000240)={@mcast1, 0x0}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280, r6}) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40040000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r4, 0x200, 0x0, 0x25dfdbff, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x9, 0x3}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4044007}, 0x6840) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r4, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x3}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x10800}, 0x8000) 11:05:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff60000000000000000000000006400627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000300000000000000000000000000000000000000000000000004000600"], 0x78}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x200, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000140), &(0x7f00000001c0)=0x4) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000080)='system\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) 11:05:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x4]}, 0x2}, 0x1c) 11:05:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)={0x6, [0x5e2a, 0x4d, 0x4, 0xffff, 0x3, 0x5]}, &(0x7f0000000140)=0x10) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xbb8) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) 11:05:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x2fff, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x5]}, 0x2}, 0x1c) 11:05:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0xa00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x4000) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r1, 0x76669c153da0d932, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000004}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x436, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {0x5}, {}]}]}, {0x1}}}}]}, 0x78}}, 0x4020) 11:05:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3000, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:14 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000100)={&(0x7f0000000000), &(0x7f0000000040)=""/136, 0x88}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @empty, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000a00280}) 11:05:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x6]}, 0x2}, 0x1c) 11:05:14 executing program 0: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x5000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000080)={0x80000000, 0x6, 0x4, 0x9cdcf6298c667db3, 0x20, {}, {0x2, 0x8, 0x3f, 0x1, 0x40, 0x60, "6bab8ef5"}, 0x4, 0x3, @fd, 0xffffff00, 0x0, 0xffffffffffffffff}) write$dsp(r4, &(0x7f0000000200)="31da2f062a57077aece0ab2b4663f4c0d37bc4f9dc790e430a873adbfd9d04aea92ae2f8e37175eca8e2b8856709766c0fcb09675484325023539c8b8a9c205305960728d266521149cf4b9a2686192052c91e08958d3db95a9d3c3722eb719741742ba175fff4f0ddf7ef8792e72f1dfe8187cbb29f08f15d3645ab946f5e06a26408eb43ad1c90067088007d814b851b346f0d1b515214c582a388cc8318fa84cb25797087590c23757d8865fdc3ead2", 0xb1) [ 1415.698082][T29019] __nla_validate_parse: 4 callbacks suppressed [ 1415.698094][T29019] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. 11:05:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3200, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1415.803171][T29024] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. 11:05:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3400, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x7]}, 0x2}, 0x1c) 11:05:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x80045301, 0x0) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000400)={r5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r5}, &(0x7f00000000c0)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000000a00)=[{&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @empty}, 0x5}, 0x1c, &(0x7f0000000340)=[{&(0x7f00000000c0)="363f184f7bfbebabc2cf4e58256decc0c53c2ff151c4a75eb6008777cfd75775715053e322b7d49b23a488ace379fc73f5c7fc1bc4d34c80e16c2b131ab915d86c8d40ea193e49bf36a8247ddece8d50282454b632a918bd8794055c01bef3f452397b7937beff2674452d8b3f53e42f18eb45d4a0871a92dc536f736cd1cc6086faeba82ed84896832abe", 0x8b}, {&(0x7f00000001c0)="ece1aea11fe05ced837021685882c6c2e4d360823c84d1941831da9dc9fc9b5a8278c9c39f81309fa4fc7f702fe1438c69c0dcec4aef08627796baa649e165bac5c8111ee9f498c252e5518a6bfe5656a0860e69772c8c5e53326985b44ffca61c67580c1a9de984c98df5c934d75f9b66ffb08775fdce9f958bafbea59f184ca9a911577135a67b9aeab03c14ccb1f1389bd32bda4f5dd389379036f9e97526ecf2e06f15c119473c1ba5a1cad10179e61e487b5de523ff34bd6667a9b03d4d8b81aa394a99fcbb6a3f2147661254975d68d8e9e9e2efd13a9996ab163966218cc58344ba2570a8a5a6234905e2d3f218f458bf684c842aeb", 0xf9}], 0x2, &(0x7f0000000380)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @authinfo={0x18, 0x84, 0x6, {0x7}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x9}, @init={0x18, 0x84, 0x0, {0x4, 0x2, 0x6, 0x1}}, @sndinfo={0x20, 0x84, 0x2, {0x1f, 0x1, 0x9, 0x52ab, r5}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x37}}], 0xd8, 0x804}, {&(0x7f0000000480)=@in={0x2, 0x4e22, @remote}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000004c0)="a26deb456fad0976bbc648f96f44cc2281566d94f6bba8bdb4982bf4fb6a114d7900f46b95e99e5a84f5238d74ebd3e64a4241cfc9252233414a25c8152cdabd0b06a3d37369786ca8398d28e40ee78a4a6390f66167d61ab5eb2b39ea6893ffa19314d59b8c50438487f0adb911d1515da5f24f6606c38fe42a17bd68aa4d16a3d4ed10677e848280b80f33c078fb8ee86ed09f29dc8d39c22d3a5adcc5a94c397b900c72c62734bfd7f721a0f4370a1db72eeefb252cba43a016f4bf0df30a527e0a67a6d5f64e55020b37b0e79223", 0xd0}], 0x1, &(0x7f0000000600)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}], 0x20}, {&(0x7f0000000640)=@in6={0xa, 0x4e21, 0x1, @mcast2, 0x3}, 0x1c, &(0x7f0000000980)=[{&(0x7f0000000680)="c34110bd1c05e408a3adb73936a7420048b0ec95b55566cd7a2f660b8152e9c05d57c023bc981cb74c8b3e93f892ae4c5d4e3c74a1cd089dd35bf92409ea682da3a85e47682da4fbb413", 0x4a}, {&(0x7f0000000700)="d1aa7e6a5672ae04083dba3bacccc21e1e4da58eb3f9e546a23b2b5807ca5a964cb2b4d4c62703a1c46cc67f4c41a479eb0ec4f693abb1730d723e1b141a906ec32770a9e9d6638e329541ffb3faecb377b7a27213ba766d1da1a88fd020493f5ac2e5837bb3770a6f0878a792eb1c50c6b23bd1e7d56080e6326d3797306d578f2c6f661d3f5e44d2fdf84eecabf6605e90703f77e4a1c6d7e39c63302df3bbcb0e9c26288be5e8c5074ad6dbae5637afba54eb45d155e3f8fefb615ae0b5b5dc6dac8b57067ecca870", 0xca}, {&(0x7f0000000800)="06303ed6c80723afe9aa87d093d0b54d7410f3d406348e291eaffa17192f85c34737fbb4484208b52de987453f0815e82ab6619e4a0f2c2ac550bc15e858d6263ddd64273de4eddca736d7eb446afa5f3c9d658b0a92143bbd70a10cea349a9cd3ecdbedb946aa906ee4b839f060c1e95e8f1d7adf7959e03105356830ffb206e701dbb005f739ce0c0a", 0x8a}, {&(0x7f00000008c0)="5e572c8db7f7b91b8b16dc8b271ea7abc98d9db7ab93a2ebb946ea51ce2cf59b42630f26ebbee3da87d75d3718e507d7e026496882cbfd817cd56ce0cf436feaba61f839c299344ba0d7bdfc66217ee7165ddb2bbcdb2a9c", 0x58}, {&(0x7f0000000940)="b6c5", 0x2}], 0x5, 0x0, 0x0, 0x4000}], 0x3, 0x8000) connect$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) 11:05:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="7800000030004ff600000000000000000000000064000100600001000866005000028006000300050000001800020000000000000000000000000000000000000000002c00040008000000000000000000000000000000000000000000000000000000000000000000000000000000040006000000000000"], 0x78}}, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000080)) 11:05:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x8]}, 0x2}, 0x1c) 11:05:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3500, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="da82080d83614ea89a92520b54e35b67f5b10b035f30744491886749a8b205970b41e0e6134e0a4df9ffa2417ba2f5cfbf4a86734f3b3e2c17f8c032a6a076288538026dd11d1b7505443383cb1fd14b62ecb90ad575552b6f53bcb63473e42136a1d259fab317951986b5c2e08ac4a87fc604913404f47762ded9398b9d78f507f74a6327c2734295a7ea00e8fc3b08b85cb11a2e1ceaaa2c05240dae32cfee797f13c23a818a1485d96e42192059", 0xaf}], 0x1fc, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) bind$netrom(r4, &(0x7f0000000180)={{0x3, @null, 0x1}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 1416.339884][T29048] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1416.363825][T29048] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.5'. 11:05:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x9]}, 0x2}, 0x1c) 11:05:15 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast2, r3}, 0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={@rand_addr="5ba8b183c1c26dbe65df737d1082bce1", @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0xffffffffffffffff, 0x10000000280, r3}) 11:05:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x10c00, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x8}, {}, {}, {}, {}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x8, 0x11, 0x10001}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000080}, 0x10) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r4 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3c00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) 11:05:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xa]}, 0x2}, 0x1c) 11:05:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0xbb8) r3 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sched_setattr(0xffffffffffffffff, &(0x7f00000000c0)={0x38, 0x1, 0x10000004, 0x270, 0xe2, 0x100000001, 0x0, 0x3, 0x0, 0x925}, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:05:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast1, @mcast1, @mcast1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x10000000280}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000000)={@dev, @multicast2, r6}, 0xc) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000000)={@mcast1, @loopback, @ipv4={[], [], @multicast2}, 0xfff, 0x7, 0x2b43, 0x400, 0xb5d0, 0x2080308, r6}) 11:05:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r6}, &(0x7f0000000080)=0x8) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000440)=@assoc_value, 0x0) r8 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r9 = dup2(r8, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r9, 0x80045301, 0x0) r10 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x1a, &(0x7f0000000400)={r11}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r11}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r11, 0xffffffff, 0x1f}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r6, 0x5}, &(0x7f00000001c0)=0x8) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x78}}, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4030582a, &(0x7f0000000040)) r13 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r13, 0x80284504, &(0x7f0000000540)=""/242) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0xffffffffffffffff}, 0x16, 0x1) 11:05:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newtaction={0x78, 0x30, 0x501, 0x0, 0x3d00, {}, [{0x64, 0x1, @m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {0x6}]}]}, {0x4}}}}]}, 0x78}}, 0x0) [ 1417.085301][T29085] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1417.168620][T29088] ================================================================== [ 1417.176922][T29088] BUG: KCSAN: data-race in dst_alloc / percpu_counter_add_batch [ 1417.184696][T29088] [ 1417.187030][T29088] write to 0xffff8880a7fe0ac8 of 8 bytes by interrupt on cpu 0: [ 1417.194690][T29088] percpu_counter_add_batch+0xca/0x150 [ 1417.200167][T29088] dst_destroy+0x1df/0x210 [ 1417.204600][T29088] dst_destroy_rcu+0x1f/0x30 [ 1417.209203][T29088] rcu_do_batch+0x256/0x5b0 [ 1417.213735][T29088] rcu_core+0x365/0x4c0 [ 1417.217916][T29088] rcu_core_si+0x12/0x20 [ 1417.222174][T29088] __do_softirq+0x115/0x33f [ 1417.226692][T29088] run_ksoftirqd+0x46/0x60 [ 1417.231120][T29088] smpboot_thread_fn+0x37d/0x4a0 [ 1417.236074][T29088] kthread+0x1d4/0x200 [ 1417.240165][T29088] ret_from_fork+0x1f/0x30 [ 1417.244574][T29088] [ 1417.246893][T29088] read to 0xffff8880a7fe0ac8 of 8 bytes by task 29088 on cpu 1: [ 1417.248645][T29085] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1417.254527][T29088] dst_alloc+0x55/0x149 11:05:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0xe]}, 0x2}, 0x1c) [ 1417.254546][T29088] ip6_dst_alloc+0x3d/0x80 [ 1417.254572][T29088] ip6_rt_cache_alloc+0x12b/0x480 [ 1417.277430][T29088] ip6_pol_route+0x5d2/0x730 [ 1417.282032][T29088] ip6_pol_route_output+0x48/0x60 [ 1417.287083][T29088] fib6_rule_lookup+0x3d6/0x470 [ 1417.291960][T29088] ip6_route_output_flags_noref+0x16b/0x230 [ 1417.298047][T29088] ip6_route_output_flags+0x50/0x1a0 [ 1417.303342][T29088] ip6_dst_lookup_tail+0x25d/0xc50 [ 1417.308464][T29088] ip6_dst_lookup_flow+0x5c/0x110 [ 1417.313512][T29088] rawv6_sendmsg+0x9be/0x2340 11:05:16 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xa02002, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@unspec, 0xc) sendmsg$nl_route_sched(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x5cb2410691e7f64f, 0x0, 0x0, {}, [{0x44, 0x1, @m_bpf={0x40, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6}]}, {0x4}}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="7800000030004ff60000dc8c771a61d1e0390000640001006000010008000100627066005000028006000300050000001800020000000000000000000000000000000000000000002c0004000800000000000000000000000000000000060000000000000000000000000000000000000000000004000600", @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES64=0x0, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r3, @ANYRESOCT=r4, @ANYRESHEX, @ANYPTR, @ANYRES32=r5], @ANYRES64=0x0, @ANYRESDEC=r2, @ANYRESOCT, @ANYPTR], @ANYRESOCT, @ANYRESDEC, @ANYRES64=r2], 0x5}}, 0x60008893) [ 1417.318203][T29088] inet_sendmsg+0x6d/0x90 [ 1417.322546][T29088] sock_sendmsg+0x9f/0xc0 [ 1417.326894][T29088] ____sys_sendmsg+0x212/0x4d0 [ 1417.331709][T29088] ___sys_sendmsg+0xb5/0x100 [ 1417.336326][T29088] __sys_sendmmsg+0x123/0x350 [ 1417.337639][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.341013][T29088] __x64_sys_sendmmsg+0x64/0x80 [ 1417.341047][T29088] do_syscall_64+0xcc/0x3a0 [ 1417.346785][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1417.351627][T29088] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1417.351631][T29088] [ 1417.351635][T29088] Reported by Kernel Concurrency Sanitizer on: [ 1417.351653][T29088] CPU: 1 PID: 29088 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1417.351673][T29088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.356419][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1417.362081][T29088] ================================================================== [ 1417.362092][T29088] Kernel panic - not syncing: panic_on_warn set ... [ 1417.362113][T29088] CPU: 1 PID: 29088 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1417.362134][T29088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1417.368173][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1417.370435][T29088] Call Trace: [ 1417.370456][T29088] dump_stack+0x11d/0x181 [ 1417.370487][T29088] panic+0x210/0x640 [ 1417.453639][T29088] ? vprintk_func+0x8d/0x140 [ 1417.458239][T29088] kcsan_report.cold+0xc/0xd [ 1417.462922][T29088] kcsan_setup_watchpoint+0x3fe/0x460 [ 1417.468288][T29088] __tsan_read8+0xc6/0x100 [ 1417.472970][T29088] dst_alloc+0x55/0x149 [ 1417.477217][T29088] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1417.483484][T29088] ip6_dst_alloc+0x3d/0x80 [ 1417.488069][T29088] ip6_rt_cache_alloc+0x12b/0x480 [ 1417.493120][T29088] ip6_pol_route+0x5d2/0x730 [ 1417.497826][T29088] ? __const_udelay+0x36/0x40 [ 1417.502505][T29088] ip6_pol_route_output+0x48/0x60 [ 1417.507547][T29088] fib6_rule_lookup+0x3d6/0x470 [ 1417.512421][T29088] ? ip6_pol_route_input+0x70/0x70 [ 1417.517535][T29088] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1417.523383][T29088] ? dev_get_by_index_rcu+0xbe/0xe0 [ 1417.528646][T29088] ip6_route_output_flags_noref+0x16b/0x230 [ 1417.534553][T29088] ip6_route_output_flags+0x50/0x1a0 [ 1417.539852][T29088] ip6_dst_lookup_tail+0x25d/0xc50 [ 1417.545060][T29088] ? debug_smp_processor_id+0x43/0x137 [ 1417.550566][T29088] ? dst_destroy+0x210/0x210 [ 1417.555248][T29088] ? debug_smp_processor_id+0x43/0x137 [ 1417.560707][T29088] ? dst_destroy+0x210/0x210 [ 1417.565388][T29088] ? __call_rcu+0x153/0x390 [ 1417.569878][T29088] ip6_dst_lookup_flow+0x5c/0x110 [ 1417.575003][T29088] rawv6_sendmsg+0x9be/0x2340 [ 1417.579682][T29088] ? __ipv6_dev_get_saddr+0x217/0x2d0 [ 1417.586501][T29088] ? __rcu_read_unlock+0x66/0x3d0 [ 1417.591569][T29088] ? __const_udelay+0x36/0x40 [ 1417.596295][T29088] ? __udelay+0x10/0x20 [ 1417.600541][T29088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1417.606807][T29088] ? aa_label_sk_perm+0x89/0xe0 [ 1417.611912][T29088] ? aa_sk_perm+0x1d3/0x590 [ 1417.616782][T29088] ? tomoyo_socket_sendmsg_permission+0xb4/0x217 [ 1417.623181][T29088] inet_sendmsg+0x6d/0x90 [ 1417.627615][T29088] ? inet_sendmsg+0x6d/0x90 [ 1417.632144][T29088] ? inet_send_prepare+0x200/0x200 [ 1417.637246][T29088] sock_sendmsg+0x9f/0xc0 [ 1417.641595][T29088] ____sys_sendmsg+0x212/0x4d0 [ 1417.646366][T29088] ___sys_sendmsg+0xb5/0x100 [ 1417.651015][T29088] ? __fget+0xb8/0x1d0 [ 1417.655299][T29088] ? __fget_light+0xaf/0x190 [ 1417.659893][T29088] ? __fdget+0x2c/0x40 [ 1417.664027][T29088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1417.670814][T29088] __sys_sendmmsg+0x123/0x350 [ 1417.675500][T29088] ? __read_once_size+0x5a/0xe0 [ 1417.680364][T29088] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1417.686131][T29088] ? _copy_to_user+0x84/0xb0 [ 1417.690794][T29088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1417.697031][T29088] ? put_timespec64+0x94/0xc0 [ 1417.701822][T29088] __x64_sys_sendmmsg+0x64/0x80 [ 1417.706839][T29088] do_syscall_64+0xcc/0x3a0 [ 1417.711803][T29088] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1417.718104][T29088] RIP: 0033:0x45aff9 [ 1417.722256][T29088] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1417.742087][T29088] RSP: 002b:00007f2e81239c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1417.750495][T29088] RAX: ffffffffffffffda RBX: 00007f2e8123a6d4 RCX: 000000000045aff9 [ 1417.758696][T29088] RDX: 00000000000004ff RSI: 00000000200092c0 RDI: 0000000000000006 [ 1417.767622][T29088] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1417.775871][T29088] R10: 0000000000000bb8 R11: 0000000000000246 R12: 00000000ffffffff [ 1417.783994][T29088] R13: 00000000000008a3 R14: 00000000004c9bd7 R15: 000000000075c07c [ 1417.793541][T29088] Kernel Offset: disabled [ 1417.797878][T29088] Rebooting in 86400 seconds..