&(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x3000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 111.041498][ T5488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 111.072106][ T5488] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xab}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x400000000499a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad043e850000000f0000009563e937c588b4980d72a1a6b9e29c087ca917e2d3980e0b3d15e8da5a0759759467f5520b89982dfad7437e5c952c1ebf44b6ae6e77847fa7942b264de919044c48937091087ff1b8a84426d0999a937f52c2e570bb8462c34bbd9822bbdb384fd0e22be36a10af8d5899b85a2dca0d68715b155f5967678e3da38b86301b0b567b934532106f95ebe38fb107a65b524caaac4aefb4a4e3fbfbb138caf96e0044"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000544c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000546c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r11, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r12, 0x89a0, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xfe01}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001800)={0x0, r13, "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", "e26481ed1e7c639b5947fa03672a9556f2d9c88f35f8f8b62d6b01c1aef3d08f4ee43881217f959db47d280e8448925694f755ec0256840e58a31c14f0d78d223c58da8e0bd812fb893403e655823624c9e0581484207a6d914ad9befaa148971274f98aa0b753b38761ffcd20135aa09bee95ffc38cfb410de6eb0b1c0eaf69af8375bb982d21281acaa2966378f31ed037b8789d3bf55cda6f1fdefac7c7d4eec101525b850f72c5d3515de41ea6c4cc0a1d4c9d0e83fe98d8baa6325482d6270833cf890aba6768abf6a6ac45c0268bac824f692a521bf8500ce437d7bd4ecafbf918c063d8af3d110e24ddc569f535794d4c8c4ab3897b27310c8d39efca731b7a22caf0ec5f2df04ce6b496582e72b5cbb10480d59c191cd3eca3d3a973fe653216cd08c8de4098133f85da499af2f6a6c7513755f40d13810388f5476a67bb722dc832e4af4c76fda32aa9699c8191a644df90df4b2b2e7993e90bee48e3b65cbc84de44a15926c157018e46c849d57933b96f67dcec40eb733515b880aabbfd1324433ef61e0a112430d3829717820a9eb79c8767614facf386e07a7df2ceb2e9f9d33d65d33fecc7697f5bf74769a67ac297756ec495eaf87674ad5fae2fd772301896e85c617328f32f69bb718bf1ade1d8fd637a6bb4c7044929bf43757821b2bde4ce2ec164ef3841458207326249547ccd2c3ca3467e8c5474cb820ee8647c90d2da6af054fa1f25afb1b0792dcf21b2736c67fc8119a6bdbe19689bb639113f5b9165a50b6f2df8dd8c549220488da3bb10e45dcc7a6207635a550e5ee913aa8ec6ea5f92ba59eb003424e6ea472df633220c8e9644d5bf2f4b01027fc5c0422c39932531e1be7e62e021ac4592b57d95720d5ae86f4bd11d95ad82569ab24e0d1b5a144e6fbcc76c4d7800a70069a852979a3a1f02fcbef6bfeff2101576c998109c65350175bd05435d4be236097340cfafadfde768b1176e6c40f34731164afcd0c3620a0cd015494e432e9aff2c59a4cf476d9037a398183fe74789da0300172e1c02173ff867faf6fbed165ca819be3e4ea05fb6ff1633430984bece64ef93ff8d012b9c321941d59f5b8572008f6bb22597864ea1fbd6b9e349b6d9dc1adc185ea32d5e67e44ac5ebea2063635a53e1718a4246ea47a8874daae0ac6653f821f381a940cbfc98d4a25aea33c63309ee1c6c20f349b673509f09b5381956611359754bdb2eeda100ccb4834596de45556611d5b568f2604653c2129a7d5bd50a209a6d4a956c108b5349a8d208431a2edb17d7650332d308ea2e6f324e589f0e98de49ab655a77509637f0a65614c33f16f91e0d6305e8f9ba0766154e1599f67005ff75af7a6143e574acb799f2363dbb37971fc451c0054b5753de3e2278afe06b9e64b93ab09b4985fe26626a6266da1088f7b9755ac8a9e4e6e99a0dedfe2b1509de12f75d9dea83475543d2b328e986779f4992c870ad128b9d09e8ebcc264e8bb5b85d6d62ab902b8ed7409448cc26a777882627bf3e0c9cdd473289154560c2838c6d4fdaea97ff5d7992909c67710dfeb4977ea7bc06d77b06a19efa42178c46a3fa66ed7d6e2b67ab86be5d94721b099947563db706c5c3a12744ea61d63fce93f546f2669c50b6568e3f32d79bfc75adefc21ee93c5c5360cf2e7ac19571c3663857baf3325b666570642da4dcb309dab05b7ad05bf832d28fa8e871f7b89d6f4327953f4dbde3aac022f4dfe050d0924427e39a8027fbc4b54c4a8c2bf35f8c11c9c0ac4bc1fc31d6bdb2cee2675c5a782aa3ab5ffcc7be7207c89cdb8546fcfdd3a5aadfee5a296abd9afc127ebbf580649e9132b55d9f40a3778af49248b593e00c9f4812b8f7adb7323ab7852e4ed09c55aa356b2e8fee6eb14be3659fdf821d23ac556845f70670d8b6a417c29ac0b1585ea865634c0c921e9d930d4018f66d1e024179d80a7154c491c8662d427ab44a3633480782889f1d00c1d182ede30d4127d769291ef408b574a41c29153b7d949d4648b60a4faf32b380dbc87146c36479d47023876abd4ae7e289ba79d988f6c3a86a75bdc784bea2f0b7e2f77cb1282f54a18e1117e50ffa46ac208fcf8a7b5751e83b3e80cb428e4c2ae63ca3cf7b2c4353303edfe328626391f7925f1ab4ef1c7d0f54d0e45590188ecdb6d2c9c0db9b0552dc81b21dc1bbe9e94be5f78dad11f53d6fc3602e9ffb872d3557c44a133ee94e50d57d5eae2214569975982c63f22750db6f5c979ed81b3f68fe6be6daa85bcd98f25548c1d4db1f15394bc708933e0352e4059bedbf832abaf75e9bdca6fea93600357ca4153357d2e0661a308edf82c0f53e7a121c7e1e8bafdc5fdb61c21f4716d06b43a8395aa915a34c4dc4b5b15ba70a4e163728a9966515682b9ca3c2499aeb17a3c17f905fefed806b504f77c52564006273282db5e0c70565ee1016fc7c241830bef951294db9682ef41742b6550246e539143f15d6c2f017a8083ec97eb3a2de8bc2d8d5fec2b9b88996b3ff6c5aa5bed326f72fe9190de74a83e380b9fe89324421697d124d9a1bd3ced8e1856923147958582d737a36da6af4a0fd92b83f0ef0cb1a725d3a5ecb3a39ad039d200989a281a0686336457824ef582698222b7a063475b793a21745d6701940a0baf124461ad71de8dff6a6f7ed676d107e01ae6b7b79aa1f96efce91039dead977bf70365de8ebb3ec06634246d62f78287831984accef27048794468f520db5c71b4fa94818ddc7394fa1b609adb8cc80c0f32efac26a47bd74119100f0cfdcb889aab1019786cc0eefc1e4295ae919e9f6c8c8a16aa76a2bfe39adf5929e9b9925da0241e734378fe140981e3536bf0b77eb0263297a936a5f37605f128d79b16723b953331f99633b8d29ad1d1dbdb74188488ea0d1b7e0ddb652c040aa0477a079e92618e52f3b7ceebd62e0f0c6946469c19ae828b7eed288c3a53320c9d5468c39d608bd42d967a21e6b788de7c6826d1b99130083182562f63443290aeeb24308d3eb4881547db34b284d9af2bd7cac0d2f66bd14758c079c345d2bce3e1efc3599b0d06e69a92db7e05473673726e1848df75e83df50f98a9321468c10c6514dd7b3cb5b0ddf2fef13284463fe88ef2bc95d51288e41e3e0ba5c91bd686d7f7658b5bac8e3991a0f3b36f004585d9edd09d478ede73e7da067ea502894fc1247e62c1a84c9065ffccc3da96f07ddce135ceafdd784dda6f64a7add400d21ae13abf98e90fb96fcda23a8ad79905428a349b2230c19cf8cdca1724382bd19b4b075438098bd46cbc668bcbdcf1da85f733a50669f976a7106ff1936f20d799e7d01b0beeba7057a90016fb2d36bb3d14e11ac077ffb91f139d16ae5e78d84559312c9fd1a91ff70e5d9b4fd279420f7647151fe951b705082230ad20415d2f605665cd9374a50f7fc3c32efe30e4c0fc84f0c0e0bcd35e46665e4f29371c1c96324f65a94c85874e8e3baba68b88acc85c38f466d7353b5a00953c8ff5522cf0903e646301e3539d047286d10be16d9fbef02d450b7b12b1ead250f68c4c893fbc6f48765f34a81c477966278a1c6945d14d6531f0b5e4cef4edaf3708a5787162c39b236272694b0a302465d01004fa9d516414c040c27fccbf38466023b06293bd07f31fcdbb3b5378a8b2c7886e1551b1caeab96f7f3c159075756f5f8aaa05b6f87f581d802903c36d84169f87c01a77c43284adf66daa38fe8633a8f6d258231466aba89bb9e56ef289d2815cde433e381ddf74852302684b974c80d0a1d7d578039120a2db36213d167687e9390ed8f14c709d3149d2f5cfbc42a9b85e6d10c4ee77270534fdff2ccb816dedc6377257a73ba2a4ea82c0cc4a81bfb939f710b109beb279edeeda345867c0130ff6fc0fbbbbd25d16d2e73f6ab2fbb4c72abc0713ef9e4690b72208c468fa64c21f2247867b5edd514e5be23733ef2136b10e03161fe3b4e6018933df1f97a8250747e6140780a064e0c35bfafcb8177a75e8fde25e61e1c6332bbf7ddc3a11910feb3bd66707a7c1a9f87b320298acec88135a177b2f6f3c0ff02765f34c30b078b58470cd227ce4c0a1a77e662180b28fb360c3fbf47ba8982510979b86332b6d8a53d5f3947665c119a71e5b6ddc64228b47c3e23c30ebbede354d71d2780456de3f717a384112ccc9805dfe107fc9440ab7abccd8463150ce1306778fbea9793d88c4a7864a925bac5da593d6b72ee2c743f0b732a10285d293359c8126004f06fa12c0b3ca9c1e9c0a75b587207965c49f7450cb4210da01e5604f83f849b7eb9cb3f73de4bcff064b4fe08580971184db940bf29d6b8cea027dbfe0b78d6fa574da4b5b4db57b4e1939213c9848537baaf8076b1db4e767a467ec6a47c67aa33df96d7113cc9884124bca5579ce0058618b1b1f13ff3b102ff54e6bde7e29fd555acd6ffe6429af27301b6bbda38403d8f6f3266d7724f517778e7b2c1e13e3d83104ce743857c07b70cb5be8d6d8757d63a3bedfc9de79cc7e96c9833e15fd65f1336178568c2453a49cfc8c8dcb4f5d978f0a6144d62a5da6fd75d08a41084d4c59b345e07a5f4446af6e5216cc8d94347d333030015e262036f0a4fa6d2ae523654c55b37ac179efb66d230de5c70a9b33738ef0cd4ba2710d9ec03f426701101182051516a9be380a07e2555a8cda03eafc72d2bc2bc1dcadde4bb819692c1736b0ed203c4934842d791aae9e10bf239cc5393c9faf967109444c8f44532766ca5481f0ac16d25753a121727271c71d97b401dafe91588b362f2798f047deece9f860624b2d5753e46f929f8c2d03753e7245ffed6d8e36c7b380c4fb6a27e087a38b5e4a80f0043f95e5a20701c62692e684a764074e47badcecf8b2145be47b5b7089c249abcf0743a61b517004d120929d7846a39a46e0ddbcf5334fc01aca0bff31e67da8b3c88e38504db1dc3940c55bee158ae6dfcce289cf91106397d8e3990149a86c819e0354d785a4eed76fa6380491b01efbc23e7189ec253884d384865bca5da9a0917d68144a0a02cde867c365d339a025b7c8a16b82e341719a259ede8f09c165a354fd3e8f5d59e349e7c36302cf8ed115537969b598337fe7575157c89a254c0829cdb243d3d788321c756bf2817721db4bead96e1f25be5b8c7100d149d13900b6c6491ddbdbeaef7753ed5c5d9b07449bfd023501075ec08c37c13df696bf73500bd440a6522f5b955862c5eee8dc6e875c5055350b3397a6b31d2b764308ad24aafd4113af76f38f4aaba9e24efa3ad5b1c008a6cad2411ef6c7276dd3a5a2ae8130f91c36c34137731426fdf5272ef4ac5c4415e2d0f7b50da3ae910ba22bb5b962351e841746b"}) ioctl$BTRFS_IOC_INO_LOOKUP(r11, 0xd0009412, &(0x7f0000001200)={r13, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r15}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r17, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {r9}], 0x81}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0xfffffffffffffff7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {r8, r15}], 0x4, "b514444c55d2a4"}) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="940000004300010029bd7000fbdbdf259515526ea73a6c758099ebc8f10003000400000008000200fdffffff05000100000000000c00080006000000000000001400068008000a00ff0f000008000b00090001000800020064ffffff1c0002390c00060006000000010000000c0004000100000000000000120001006d656d6f72792e657665000e0001000000000000000000008b647c7149059e6540777d946f16703a9aa22825bad051ff867678ff0a03fcecaf56b8ea4d979cbb8496a257f37f2d0f987a29b82707617417b9182f64a427f2559c520603ba06fd6174bde10ed1b4966a9e18cc28841f144c460edc49cc67f035e4ede43b256a3b033acba60102904e88919314c2e0c50100694efe56716f0aee00f4594d94e82b5644ebe8bf9ae53a4161d2aade243a832f0e8ae661cfe3560c76aeda001490d9f30046c963c2194ef75a822fdc5a4878d42dd42443b44cbeca8017019af95979741cb7aa88c2e1cbeb4f15ad0151169980c7b60f936d8b746d891dea00ed81ea201d5e3af48a8db4b041a2288122b773d8347a0e33847f4b58fb5e2e37f226d86d57786608c4b663f4437735f2cf3ef247fc687443cfb45cd9f2a89b9bb5c7db"], 0x94}, 0x1, 0x0, 0x0, 0x4040855}, 0x4800) write$cgroup_int(r6, &(0x7f0000000200), 0xf000) sendfile(r6, r20, 0x0, 0xf03b0000) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="de0100a904c3"], 0xa) 01:00:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x8000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:14 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:14 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x3f00}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:15 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x0, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x4000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x9000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:15 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xa000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xab}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x400000000499a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad043e850000000f0000009563e937c588b4980d72a1a6b9e29c087ca917e2d3980e0b3d15e8da5a0759759467f5520b89982dfad7437e5c952c1ebf44b6ae6e77847fa7942b264de919044c48937091087ff1b8a84426d0999a937f52c2e570bb8462c34bbd9822bbdb384fd0e22be36a10af8d5899b85a2dca0d68715b155f5967678e3da38b86301b0b567b934532106f95ebe38fb107a65b524caaac4aefb4a4e3fbfbb138caf96e0044"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000544c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000546c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r11, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r12, 0x89a0, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xfe01}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001800)={0x0, r13, "02b66c11beed7c64705a2327ec95767e4393a580b2c3043a2fcfb08839b8897467f4a525091f0f7d2480b2fbdcfd2a3924b674e8aed38628fb035a463934e151ef7c0289d4fd7b308135026f77657ca78a849330727be579703bef5f51cf16a7198f8eb8e962cc55e47a88645dc99b6e4dfd15399b64e979124ef3a9120208d05d9de3ff1ce9cc9e6353b97b13c914e3530a6ec5b967674f3cbc69538c66356f6777af618dd96e1730048727e164fcc8139776c1e5061154ffe7838008ce90ccbf0827c03a28016d5f3bdabbc98bee9c405509e3e094ba1677d6b347061c346722828810ba1b68424c585770f6527f3856630aedb97f2ee0742e013d5d412046", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r11, 0xd0009412, &(0x7f0000001200)={r13, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r15}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r17, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {r9}], 0x81}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0xfffffffffffffff7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {r8, r15}], 0x4, "b514444c55d2a4"}) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x4040855}, 0x4800) write$cgroup_int(r6, &(0x7f0000000200), 0xf000) sendfile(r6, r20, 0x0, 0xf03b0000) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="de0100a904c3"], 0xa) 01:00:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x47ee}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:15 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xb000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:15 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:15 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:16 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x0, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x80fe}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x10000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:16 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:16 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64, @ANYRES32=r0, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xb80b}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xab}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x400000000499a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad043e850000000f0000009563e937c588b4980d72a1a6b9e29c087ca917e2d3980e0b3d15e8da5a0759759467f5520b89982dfad7437e5c952c1ebf44b6ae6e77847fa7942b264de919044c48937091087ff1b8a84426d0999a937f52c2e570bb8462c34bbd9822bbdb384fd0e22be36a10af8d5899b85a2dca0d68715b155f5967678e3da38b86301b0b567b934532106f95ebe38fb107a65b524caaac4aefb4a4e3fbfbb138caf96e0044"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000544c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000546c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r11, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r12, 0x89a0, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xfe01}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001800)={0x0, r13, "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", "e26481ed1e7c639b5947fa03672a9556f2d9c88f35f8f8b62d6b01c1aef3d08f4ee43881217f959db47d280e8448925694f755ec0256840e58a31c14f0d78d223c58da8e0bd812fb893403e655823624c9e0581484207a6d914ad9befaa148971274f98aa0b753b38761ffcd20135aa09bee95ffc38cfb410de6eb0b1c0eaf69af8375bb982d21281acaa2966378f31ed037b8789d3bf55cda6f1fdefac7c7d4eec101525b850f72c5d3515de41ea6c4cc0a1d4c9d0e83fe98d8baa6325482d6270833cf890aba6768abf6a6ac45c0268bac824f692a521bf8500ce437d7bd4ecafbf918c063d8af3d110e24ddc569f535794d4c8c4ab3897b27310c8d39efca731b7a22caf0ec5f2df04ce6b496582e72b5cbb10480d59c191cd3eca3d3a973fe653216cd08c8de4098133f85da499af2f6a6c7513755f40d13810388f5476a67bb722dc832e4af4c76fda32aa9699c8191a644df90df4b2b2e7993e90bee48e3b65cbc84de44a15926c157018e46c849d57933b96f67dcec40eb733515b880aabbfd1324433ef61e0a112430d3829717820a9eb79c8767614facf386e07a7df2ceb2e9f9d33d65d33fecc7697f5bf74769a67ac297756ec495eaf87674ad5fae2fd772301896e85c617328f32f69bb718bf1ade1d8fd637a6bb4c7044929bf43757821b2bde4ce2ec164ef3841458207326249547ccd2c3ca3467e8c5474cb820ee8647c90d2da6af054fa1f25afb1b0792dcf21b2736c67fc8119a6bdbe19689bb639113f5b9165a50b6f2df8dd8c549220488da3bb10e45dcc7a6207635a550e5ee913aa8ec6ea5f92ba59eb003424e6ea472df633220c8e9644d5bf2f4b01027fc5c0422c39932531e1be7e62e021ac4592b57d95720d5ae86f4bd11d95ad82569ab24e0d1b5a144e6fbcc76c4d7800a70069a852979a3a1f02fcbef6bfeff2101576c998109c65350175bd05435d4be236097340cfafadfde768b1176e6c40f34731164afcd0c3620a0cd015494e432e9aff2c59a4cf476d9037a398183fe74789da0300172e1c02173ff867faf6fbed165ca819be3e4ea05fb6ff1633430984bece64ef93ff8d012b9c321941d59f5b8572008f6bb22597864ea1fbd6b9e349b6d9dc1adc185ea32d5e67e44ac5ebea2063635a53e1718a4246ea47a8874daae0ac6653f821f381a940cbfc98d4a25aea33c63309ee1c6c20f349b673509f09b5381956611359754bdb2eeda100ccb4834596de45556611d5b568f2604653c2129a7d5bd50a209a6d4a956c108b5349a8d208431a2edb17d7650332d308ea2e6f324e589f0e98de49ab655a77509637f0a65614c33f16f91e0d6305e8f9ba0766154e1599f67005ff75af7a6143e574acb799f2363dbb37971fc451c0054b5753de3e2278afe06b9e64b93ab09b4985fe26626a6266da1088f7b9755ac8a9e4e6e99a0dedfe2b1509de12f75d9dea83475543d2b328e986779f4992c870ad128b9d09e8ebcc264e8bb5b85d6d62ab902b8ed7409448cc26a777882627bf3e0c9cdd473289154560c2838c6d4fdaea97ff5d7992909c67710dfeb4977ea7bc06d77b06a19efa42178c46a3fa66ed7d6e2b67ab86be5d94721b099947563db706c5c3a12744ea61d63fce93f546f2669c50b6568e3f32d79bfc75adefc21ee93c5c5360cf2e7ac19571c3663857baf3325b666570642da4dcb309dab05b7ad05bf832d28fa8e871f7b89d6f4327953f4dbde3aac022f4dfe050d0924427e39a8027fbc4b54c4a8c2bf35f8c11c9c0ac4bc1fc31d6bdb2cee2675c5a782aa3ab5ffcc7be7207c89cdb8546fcfdd3a5aadfee5a296abd9afc127ebbf580649e9132b55d9f40a3778af49248b593e00c9f4812b8f7adb7323ab7852e4ed09c55aa356b2e8fee6eb14be3659fdf821d23ac556845f70670d8b6a417c29ac0b1585ea865634c0c921e9d930d4018f66d1e024179d80a7154c491c8662d427ab44a3633480782889f1d00c1d182ede30d4127d769291ef408b574a41c29153b7d949d4648b60a4faf32b380dbc87146c36479d47023876abd4ae7e289ba79d988f6c3a86a75bdc784bea2f0b7e2f77cb1282f54a18e1117e50ffa46ac208fcf8a7b5751e83b3e80cb428e4c2ae63ca3cf7b2c4353303edfe328626391f7925f1ab4ef1c7d0f54d0e45590188ecdb6d2c9c0db9b0552dc81b21dc1bbe9e94be5f78dad11f53d6fc3602e9ffb872d3557c44a133ee94e50d57d5eae2214569975982c63f22750db6f5c979ed81b3f68fe6be6daa85bcd98f25548c1d4db1f15394bc708933e0352e4059bedbf832abaf75e9bdca6fea93600357ca4153357d2e0661a308edf82c0f53e7a121c7e1e8bafdc5fdb61c21f4716d06b43a8395aa915a34c4dc4b5b15ba70a4e163728a9966515682b9ca3c2499aeb17a3c17f905fefed806b504f77c52564006273282db5e0c70565ee1016fc7c241830bef951294db9682ef41742b6550246e539143f15d6c2f017a8083ec97eb3a2de8bc2d8d5fec2b9b88996b3ff6c5aa5bed326f72fe9190de74a83e380b9fe89324421697d124d9a1bd3ced8e1856923147958582d737a36da6af4a0fd92b83f0ef0cb1a725d3a5ecb3a39ad039d200989a281a0686336457824ef582698222b7a063475b793a21745d6701940a0baf124461ad71de8dff6a6f7ed676d107e01ae6b7b79aa1f96efce91039dead977bf70365de8ebb3ec06634246d62f78287831984accef27048794468f520db5c71b4fa94818ddc7394fa1b609adb8cc80c0f32efac26a47bd74119100f0cfdcb889aab1019786cc0eefc1e4295ae919e9f6c8c8a16aa76a2bfe39adf5929e9b9925da0241e734378fe140981e3536bf0b77eb0263297a936a5f37605f128d79b16723b953331f99633b8d29ad1d1dbdb74188488ea0d1b7e0ddb652c040aa0477a079e92618e52f3b7ceebd62e0f0c6946469c19ae828b7eed288c3a53320c9d5468c39d608bd42d967a21e6b788de7c6826d1b99130083182562f63443290aeeb24308d3eb4881547db34b284d9af2bd7cac0d2f66bd14758c079c345d2bce3e1efc3599b0d06e69a92db7e05473673726e1848df75e83df50f98a9321468c10c6514dd7b3cb5b0ddf2fef13284463fe88ef2bc95d51288e41e3e0ba5c91bd686d7f7658b5bac8e3991a0f3b36f004585d9edd09d478ede73e7da067ea502894fc1247e62c1a84c9065ffccc3da96f07ddce135ceafdd784dda6f64a7add400d21ae13abf98e90fb96fcda23a8ad79905428a349b2230c19cf8cdca1724382bd19b4b075438098bd46cbc668bcbdcf1da85f733a50669f976a7106ff1936f20d799e7d01b0beeba7057a90016fb2d36bb3d14e11ac077ffb91f139d16ae5e78d84559312c9fd1a91ff70e5d9b4fd279420f7647151fe951b705082230ad20415d2f605665cd9374a50f7fc3c32efe30e4c0fc84f0c0e0bcd35e46665e4f29371c1c96324f65a94c85874e8e3baba68b88acc85c38f466d7353b5a00953c8ff5522cf0903e646301e3539d047286d10be16d9fbef02d450b7b12b1ead250f68c4c893fbc6f48765f34a81c477966278a1c6945d14d6531f0b5e4cef4edaf3708a5787162c39b236272694b0a302465d01004fa9d516414c040c27fccbf38466023b06293bd07f31fcdbb3b5378a8b2c7886e1551b1caeab96f7f3c159075756f5f8aaa05b6f87f581d802903c36d84169f87c01a77c43284adf66daa38fe8633a8f6d258231466aba89bb9e56ef289d2815cde433e381ddf74852302684b974c80d0a1d7d578039120a2db36213d167687e9390ed8f14c709d3149d2f5cfbc42a9b85e6d10c4ee77270534fdff2ccb816dedc6377257a73ba2a4ea82c0cc4a81bfb939f710b109beb279edeeda345867c0130ff6fc0fbbbbd25d16d2e73f6ab2fbb4c72abc0713ef9e4690b72208c468fa64c21f2247867b5edd514e5be23733ef2136b10e03161fe3b4e6018933df1f97a8250747e6140780a064e0c35bfafcb8177a75e8fde25e61e1c6332bbf7ddc3a11910feb3bd66707a7c1a9f87b320298acec88135a177b2f6f3c0ff02765f34c30b078b58470cd227ce4c0a1a77e662180b28fb360c3fbf47ba8982510979b86332b6d8a53d5f3947665c119a71e5b6ddc64228b47c3e23c30ebbede354d71d2780456de3f717a384112ccc9805dfe107fc9440ab7abccd8463150ce1306778fbea9793d88c4a7864a925bac5da593d6b72ee2c743f0b732a10285d293359c8126004f06fa12c0b3ca9c1e9c0a75b587207965c49f7450cb4210da01e5604f83f849b7eb9cb3f73de4bcff064b4fe08580971184db940bf29d6b8cea027dbfe0b78d6fa574da4b5b4db57b4e1939213c9848537baaf8076b1db4e767a467ec6a47c67aa33df96d7113cc9884124bca5579ce0058618b1b1f13ff3b102ff54e6bde7e29fd555acd6ffe6429af27301b6bbda38403d8f6f3266d7724f517778e7b2c1e13e3d83104ce743857c07b70cb5be8d6d8757d63a3bedfc9de79cc7e96c9833e15fd65f1336178568c2453a49cfc8c8dcb4f5d978f0a6144d62a5da6fd75d08a41084d4c59b345e07a5f4446af6e5216cc8d94347d333030015e262036f0a4fa6d2ae523654c55b37ac179efb66d230de5c70a9b33738ef0cd4ba2710d9ec03f426701101182051516a9be380a07e2555a8cda03eafc72d2bc2bc1dcadde4bb819692c1736b0ed203c4934842d791aae9e10bf239cc5393c9faf967109444c8f44532766ca5481f0ac16d25753a121727271c71d97b401dafe91588b362f2798f047deece9f860624b2d5753e46f929f8c2d03753e7245ffed6d8e36c7b380c4fb6a27e087a38b5e4a80f0043f95e5a20701c62692e684a764074e47badcecf8b2145be47b5b7089c249abcf0743a61b517004d120929d7846a39a46e0ddbcf5334fc01aca0bff31e67da8b3c88e38504db1dc3940c55bee158ae6dfcce289cf91106397d8e3990149a86c819e0354d785a4eed76fa6380491b01efbc23e7189ec253884d384865bca5da9a0917d68144a0a02cde867c365d339a025b7c8a16b82e341719a259ede8f09c165a354fd3e8f5d59e349e7c36302cf8ed115537969b598337fe7575157c89a254c0829cdb243d3d788321c756bf2817721db4bead96e1f25be5b8c7100d149d13900b6c6491ddbdbeaef7753ed5c5d9b07449bfd023501075ec08c37c13df696bf73500bd440a6522f5b955862c5eee8dc6e875c5055350b3397a6b31d2b764308ad24aafd4113af76f38f4aaba9e24efa3ad5b1c008a6cad2411ef6c7276dd3a5a2ae8130f91c36c34137731426fdf5272ef4ac5c4415e2d0f7b50da3ae910ba22bb5b962351e841746b"}) ioctl$BTRFS_IOC_INO_LOOKUP(r11, 0xd0009412, &(0x7f0000001200)={r13, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r15}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r17, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {r9}], 0x81}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0xfffffffffffffff7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {r8, r15}], 0x4, "b514444c55d2a4"}) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x4040855}, 0x4800) write$cgroup_int(r6, &(0x7f0000000200), 0xf000) sendfile(r6, r20, 0x0, 0xf03b0000) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="de0100a904c3"], 0xa) 01:00:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x10080000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:16 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64, @ANYRES32=r0, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:16 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xdc05}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xee47}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 112.858609][ T5536] syz-executor.1 (5536) used greatest stack depth: 10584 bytes left 01:00:17 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x0, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x11000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:17 executing program 5: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64, @ANYRES32=r0, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 01:00:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfe80}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x34000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xab}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x400000000499a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad043e850000000f0000009563e937c588b4980d72a1a6b9e29c087ca917e2d3980e0b3d15e8da5a0759759467f5520b89982dfad7437e5c952c1ebf44b6ae6e77847fa7942b264de919044c48937091087ff1b8a84426d0999a937f52c2e570bb8462c34bbd9822bbdb384fd0e22be36a10af8d5899b85a2dca0d68715b155f5967678e3da38b86301b0b567b934532106f95ebe38fb107a65b524caaac4aefb4a4e3fbfbb138caf96e0044"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xd8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000544c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f00000546c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a700)={0x0, ""/256, 0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r12 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r11, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r12, 0x89a0, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xfe01}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r12, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001800)={0x0, r13, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r11, 0xd0009412, &(0x7f0000001200)={r13, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {0x0, r15}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {r17, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {r9}], 0x81}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000548c0)={0xfffffffffffffff7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {r8, r15}], 0x4, "b514444c55d2a4"}) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x4040855}, 0x4800) write$cgroup_int(r6, &(0x7f0000000200), 0xf000) sendfile(r6, r20, 0x0, 0xf03b0000) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="de0100a904c3"], 0xa) 01:00:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x30000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:17 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x40000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 01:00:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x3f000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:18 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x0, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x100000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x40000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 01:00:18 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x47ee0000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 114.487145][ T5600] __nla_validate_parse: 16 callbacks suppressed [ 114.487159][ T5600] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 114.508687][ T5600] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:18 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_print_times', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x6, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408a44}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xfc, r2, 0xd09, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x30}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x200}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xf8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40040}, 0x40) 01:00:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 01:00:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x7ffffff7}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x400300}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:18 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x800000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x8dffffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 114.641615][ T5614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 114.651652][ T5614] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 114.659742][ T5616] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 01:00:19 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x0, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:19 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x97ffffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x1000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_print_times', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x9) (async) sendfile(r0, r0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x6, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) (async) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x6, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408a44}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xfc, r2, 0xd09, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x30}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x200}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xf8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40040}, 0x40) 01:00:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 01:00:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x2000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xb80b0000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_print_times', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x800}}, './file0\x00'}) (async) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x6, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x408a44}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xfc, r2, 0xd09, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0x30}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x200}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xf8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40040}, 0x40) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xdc050000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x3000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 115.352990][ T5630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 115.353646][ T5627] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 115.378433][ T5628] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 115.390012][ T5630] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 115.442927][ T5644] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 01:00:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x4000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x0, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 01:00:19 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) gettid() syz_clone3(&(0x7f00000005c0)={0x40000100, 0x0, 0x0, &(0x7f00000003c0), {}, 0x0, 0x0, &(0x7f0000000480)=""/248, 0x0}, 0x58) accept(0xffffffffffffffff, &(0x7f0000000d80)=@caif=@dbg, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0x18, 0x0, 0x10, 0x0, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000000c0)={0x1, 'bond0\x00', {}, 0x1}) 01:00:19 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xeffdffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x5000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xf5ffffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', 0x0}) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xf7ffff7f}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 116.228660][ T5657] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x6000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:00:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfe800000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 116.278612][ T5657] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 116.353633][ T5676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 116.363523][ T5676] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:20 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x0, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x7000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:20 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', 0x0}) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfffffdef}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:20 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) (async) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) gettid() syz_clone3(&(0x7f00000005c0)={0x40000100, 0x0, 0x0, &(0x7f00000003c0), {}, 0x0, 0x0, &(0x7f0000000480)=""/248, 0x0}, 0x58) accept(0xffffffffffffffff, &(0x7f0000000d80)=@caif=@dbg, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0x18, 0x0, 0x10, 0x0, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000000c0)={0x1, 'bond0\x00', {}, 0x1}) 01:00:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:00:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xffffff7f}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x8000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:20 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', 0x0}) r1 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}, 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r2, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:00:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xffffff8d}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:20 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x9000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:21 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x0, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xffffff97}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:21 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xa000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:21 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) (async) gettid() syz_clone3(&(0x7f00000005c0)={0x40000100, 0x0, 0x0, &(0x7f00000003c0), {}, 0x0, 0x0, &(0x7f0000000480)=""/248, 0x0}, 0x58) accept(0xffffffffffffffff, &(0x7f0000000d80)=@caif=@dbg, 0x0) (async) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0x18, 0x0, 0x10, 0x0, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) (async) bind$packet(0xffffffffffffffff, 0x0, 0x0) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) (async) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000000c0)={0x1, 'bond0\x00', {}, 0x1}) 01:00:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfffffff5}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xb000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:21 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x10000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:22 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x0, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:22 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x10080000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x2, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:22 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) sendfile(r1, r2, 0x0, 0x7fffff67) fadvise64(r2, 0x0, 0x0, 0x1) 01:00:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x11000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x18, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1b, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x30000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:22 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) (async) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) (async) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) (async) sendfile(r1, r2, 0x0, 0x7fffff67) (async) fadvise64(r2, 0x0, 0x0, 0x1) 01:00:22 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 118.841374][ T5740] bridge54: port 1(vlan2) entered blocking state [ 118.847875][ T5740] bridge54: port 1(vlan2) entered disabled state [ 118.860233][ T5740] vlan2: entered allmulticast mode [ 118.867779][ T5740] vlan2: left allmulticast mode [ 118.870216][ T5746] loop1: detected capacity change from 0 to 2048 01:00:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x3f000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 118.972725][ T5763] loop1: detected capacity change from 0 to 2048 01:00:23 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x0, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:23 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x40000000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:23 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) sendfile(r1, r2, 0x0, 0x7fffff67) fadvise64(r2, 0x0, 0x0, 0x1) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) (async) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") (async) open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) (async) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) (async) write(r1, &(0x7f0000000600)="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", 0x200) (async) creat(&(0x7f0000000280)='./file0\x00', 0x0) (async) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) (async) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) (async) sendfile(r1, r2, 0x0, 0x7fffff67) (async) fadvise64(r2, 0x0, 0x0, 0x1) (async) 01:00:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x64, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x64}}, 0x0) 01:00:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x47ee0000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:23 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x0, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 119.717311][ T5777] __nla_validate_parse: 12 callbacks suppressed [ 119.717327][ T5777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 119.721100][ T5775] loop1: detected capacity change from 0 to 2048 [ 119.732304][ T5777] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x7ffffff7}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 119.784950][ T5797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 119.810251][ T5797] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 119.837725][ T5777] bridge55: port 1(vlan2) entered blocking state [ 119.844110][ T5777] bridge55: port 1(vlan2) entered disabled state [ 119.850847][ T5777] vlan2: entered allmulticast mode [ 119.856518][ T5777] vlan2: left allmulticast mode [ 119.866897][ T5797] bridge6: port 1(vlan0) entered blocking state [ 119.873182][ T5797] bridge6: port 1(vlan0) entered disabled state [ 119.879757][ T5797] vlan0: entered allmulticast mode [ 119.885241][ T5797] vlan0: left allmulticast mode 01:00:24 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x0, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:24 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x0, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x8dffffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x58}}, 0x0) 01:00:24 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x7f, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0x97ffffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:24 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) sendfile(r1, r2, 0x0, 0x7fffff67) fadvise64(r2, 0x0, 0x0, 0x1) 01:00:24 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x0, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 120.592647][ T5814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 120.606809][ T5814] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xb80b0000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 120.647018][ T5818] loop1: detected capacity change from 0 to 2048 [ 120.664431][ T5827] bridge56: port 1(vlan2) entered blocking state [ 120.671085][ T5827] bridge56: port 1(vlan2) entered disabled state [ 120.678328][ T5827] vlan2: entered allmulticast mode [ 120.687701][ T5827] vlan2: left allmulticast mode 01:00:25 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xdc050000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) sendfile(r1, r2, 0x0, 0x7fffff67) fadvise64(r2, 0x0, 0x0, 0x1) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0x0, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x9}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xeffdffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0x0, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 121.444750][ T5837] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 121.471361][ T5840] loop1: detected capacity change from 0 to 2048 01:00:25 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) sendfile(r1, r2, 0x0, 0x7fffff67) fadvise64(r2, 0x0, 0x0, 0x1) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xf5ffffff}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 121.489981][ T5837] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xf7ffff7f}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0x0, 0x4, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:25 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x11}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfe800000}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f00000002c0)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)={0x40000010}) sendfile(r1, r2, 0x0, 0x7fffff67) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x0, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 121.597908][ T5861] loop1: detected capacity change from 0 to 2048 [ 121.628563][ T5871] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:25 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x30}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfffffdef}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 121.679649][ T5880] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) 01:00:25 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xffffff7f}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x0, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 121.731306][ T5885] loop1: detected capacity change from 0 to 2048 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xffffff8d}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r0 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:25 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba868012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f00000002c0)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0x40000010}) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x0, @private2, @mcast2, 0x700, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x500}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xffffff97}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev, 0xfffffff5}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x0, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x5dc}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f00000002c0)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 01:00:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x600}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x2, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 121.867353][ T5910] loop1: detected capacity change from 0 to 2048 [ 121.970151][ T5930] loop1: detected capacity change from 0 to 2048 01:00:26 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r0 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:26 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x0, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 01:00:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x18, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x700}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:26 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, &(0x7f00000002c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1b, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x810}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 01:00:26 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x0, 0x8, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x900}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 122.714386][ T5940] loop1: detected capacity change from 0 to 2048 01:00:27 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r0 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:27 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x0, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 01:00:27 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) creat(&(0x7f0000000280)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:27 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x0, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 01:00:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xbb8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 123.558726][ T5964] loop1: detected capacity change from 0 to 2048 01:00:28 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r0 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r0}, 0x20) ioctl$int_in(r0, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:28 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") r1 = open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:28 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x0, 0xff, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1008}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 01:00:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1100}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x58}}, 0x0) 01:00:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 124.462859][ T5991] loop1: detected capacity change from 0 to 2048 01:00:28 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r0 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r0}, 0x20) ioctl$int_in(r0, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x9}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3f00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:28 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x565080, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x58}}, 0x0) 01:00:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:28 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 125.287931][ T6014] __nla_validate_parse: 16 callbacks suppressed [ 125.287944][ T6014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 125.319525][ T6014] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x47ee}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:29 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 125.333453][ T6013] loop1: detected capacity change from 0 to 2048 01:00:29 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r0 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r0}, 0x20) ioctl$int_in(r0, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}, @IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x58}}, 0x0) 01:00:29 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") open(&(0x7f0000001100)='./file0\x00', 0x241c2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x80fe}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:29 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0x0, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x11}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb80b}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:29 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0x0, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xdc05}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:29 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x30}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 126.164812][ T6038] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 126.186220][ T6036] loop1: detected capacity change from 0 to 2048 [ 126.194715][ T6038] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 126.293962][ T6057] loop1: detected capacity change from 0 to 2048 01:00:30 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x30}}, 0x0) 01:00:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xee47}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:30 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0x0, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:30 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) getuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:30 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) getuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfe80}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:30 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x34000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 127.030695][ T6066] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 127.040925][ T6066] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:30 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) getuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:30 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x0, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:31 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x30}}, 0x0) 01:00:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x500}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x40000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:31 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:31 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x0, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x5dc}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x100000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:31 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x600}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 127.898179][ T6094] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 127.919482][ T6094] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:31 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x0, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x400300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x30}}, 0x0) [ 127.952046][ T6092] loop1: detected capacity change from 0 to 2048 [ 127.988684][ T6092] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 127.993494][ T6112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 128.025651][ T6112] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:32 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:32 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x700}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x10, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 01:00:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x810}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x900}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x2000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x10, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 01:00:32 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 128.818765][ T6124] loop1: detected capacity change from 0 to 2048 [ 128.846671][ T6124] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value 01:00:33 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), 0x0}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x10, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1f}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x50}}, 0x0) 01:00:33 executing program 1: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESHEX], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:33 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}, 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) r6 = socket(0xa, 0x3, 0x3a) r7 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r6, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r8}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32=r3, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r8, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r11 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r11, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r10, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xbb8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) 01:00:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x5000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:33 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x6000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 129.700223][ T6161] loop1: detected capacity change from 0 to 2048 [ 129.719587][ T6161] FAT-fs (loop1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ184467440737095516150xffffffffffffffff" or missing value [ 129.746033][ T6168] bridge75: port 1(vlan8) entered blocking state [ 129.752576][ T6168] bridge75: port 1(vlan8) entered disabled state [ 129.761583][ T6168] vlan8: entered allmulticast mode [ 129.767362][ T6168] vlan8: left allmulticast mode 01:00:34 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), 0x0}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1008}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x7000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:34 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:34 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 1) 01:00:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1100}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:34 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 01:00:34 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:34 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x9000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 130.511597][ T6182] loop1: detected capacity change from 0 to 2048 [ 130.512937][ T6185] __nla_validate_parse: 8 callbacks suppressed [ 130.512962][ T6185] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 130.597973][ T6185] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 130.615534][ T6195] loop1: detected capacity change from 0 to 2048 [ 130.626348][ T6185] FAULT_INJECTION: forcing a failure. [ 130.626348][ T6185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 130.639545][ T6185] CPU: 1 PID: 6185 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 130.649895][ T6185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 130.659957][ T6185] Call Trace: [ 130.663432][ T6185] [ 130.666360][ T6185] dump_stack_lvl+0xda/0x130 [ 130.671041][ T6185] dump_stack+0x15/0x20 [ 130.675267][ T6185] should_fail_ex+0x21f/0x230 [ 130.679929][ T6185] should_fail+0xb/0x10 [ 130.684112][ T6185] should_fail_usercopy+0x1a/0x20 [ 130.689131][ T6185] _copy_from_user+0x1e/0xd0 [ 130.693717][ T6185] copy_msghdr_from_user+0x54/0x2a0 [ 130.698969][ T6185] __sys_sendmsg+0x17d/0x270 [ 130.703625][ T6185] __x64_sys_sendmsg+0x46/0x50 [ 130.708670][ T6185] do_syscall_64+0x41/0xc0 [ 130.713160][ T6185] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.719634][ T6185] RIP: 0033:0x7fbb4510cae9 [ 130.724131][ T6185] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 130.743737][ T6185] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.752221][ T6185] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 130.760228][ T6185] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 130.768199][ T6185] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 130.776168][ T6185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.784216][ T6185] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 130.792188][ T6185] 01:00:35 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), 0x0}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3f00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r2 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) r5 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:35 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 01:00:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 2) 01:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r2 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) r5 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x47ee}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 131.381231][ T6208] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 131.410163][ T6206] loop1: detected capacity change from 0 to 2048 [ 131.413058][ T6208] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10080000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 131.464175][ T6208] FAULT_INJECTION: forcing a failure. [ 131.464175][ T6208] name failslab, interval 1, probability 0, space 0, times 0 [ 131.476856][ T6208] CPU: 1 PID: 6208 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 131.487568][ T6208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 131.497807][ T6208] Call Trace: [ 131.501093][ T6208] [ 131.504082][ T6208] dump_stack_lvl+0xda/0x130 [ 131.508690][ T6208] dump_stack+0x15/0x20 [ 131.512875][ T6208] should_fail_ex+0x21f/0x230 [ 131.517650][ T6208] __should_failslab+0x92/0xa0 [ 131.522473][ T6208] should_failslab+0x9/0x20 [ 131.527066][ T6208] slab_pre_alloc_hook+0x38/0x180 [ 131.532115][ T6208] kmem_cache_alloc_node+0x54/0x240 [ 131.537344][ T6208] ? __alloc_skb+0x109/0x2e0 [ 131.541972][ T6208] __alloc_skb+0x109/0x2e0 [ 131.546392][ T6208] netlink_sendmsg+0x483/0x770 [ 131.551211][ T6208] ? netlink_getsockopt+0x3e0/0x3e0 [ 131.556421][ T6208] ____sys_sendmsg+0x37c/0x4d0 [ 131.561177][ T6208] __sys_sendmsg+0x1e9/0x270 [ 131.565845][ T6208] __x64_sys_sendmsg+0x46/0x50 [ 131.570658][ T6208] do_syscall_64+0x41/0xc0 [ 131.575080][ T6208] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 131.581052][ T6208] RIP: 0033:0x7fbb4510cae9 [ 131.585617][ T6208] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 131.605512][ T6208] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 131.613933][ T6208] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 131.621955][ T6208] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 131.630001][ T6208] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 131.637960][ T6208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.645969][ T6208] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 131.654006][ T6208] 01:00:35 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x80fe}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 01:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x11000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r2 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) r5 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 3) 01:00:35 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb80b}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x30000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:35 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, 0x0, 0x0) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 132.265838][ T6232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 132.271679][ T6233] loop1: detected capacity change from 0 to 2048 01:00:35 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (fail_nth: 1) 01:00:35 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, 0x0, 0x0) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3f000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 132.308869][ T6232] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 132.359906][ T6243] loop1: detected capacity change from 0 to 2048 [ 132.377500][ T6243] FAULT_INJECTION: forcing a failure. [ 132.377500][ T6243] name failslab, interval 1, probability 0, space 0, times 0 [ 132.390179][ T6243] CPU: 0 PID: 6243 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 132.400527][ T6243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 132.410568][ T6243] Call Trace: [ 132.413830][ T6243] [ 132.416747][ T6243] dump_stack_lvl+0xda/0x130 [ 132.421351][ T6243] dump_stack+0x15/0x20 [ 132.425555][ T6243] should_fail_ex+0x21f/0x230 [ 132.430223][ T6243] __should_failslab+0x92/0xa0 [ 132.435051][ T6243] should_failslab+0x9/0x20 [ 132.439635][ T6243] slab_pre_alloc_hook+0x38/0x180 [ 132.444746][ T6243] kmem_cache_alloc+0x52/0x220 [ 132.449521][ T6243] ? getname_flags+0x85/0x360 [ 132.454210][ T6243] getname_flags+0x85/0x360 [ 132.458706][ T6243] getname+0x19/0x20 [ 132.462623][ T6243] do_sys_openat2+0x67/0x110 [ 132.467199][ T6243] __x64_sys_openat+0xf3/0x120 [ 132.471952][ T6243] do_syscall_64+0x41/0xc0 [ 132.476374][ T6243] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 132.482362][ T6243] RIP: 0033:0x7fe1f0864ae9 [ 132.486767][ T6243] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 132.506361][ T6243] RSP: 002b:00007fe1efbe70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 132.514759][ T6243] RAX: ffffffffffffffda RBX: 00007fe1f0983f80 RCX: 00007fe1f0864ae9 [ 132.522720][ T6243] RDX: 0000000000200002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 132.530727][ T6243] RBP: 00007fe1efbe7120 R08: 0000000000000000 R09: 0000000000000000 [ 132.538689][ T6243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.546683][ T6243] R13: 000000000000000b R14: 00007fe1f0983f80 R15: 00007ffc2c8b00f8 [ 132.554678][ T6243] 01:00:36 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 4) 01:00:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xdc05}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:36 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, 0x0, 0x0) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x40000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:36 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (fail_nth: 2) 01:00:36 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xee47}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x47ee0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:36 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 133.136593][ T6259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 133.143517][ T6255] loop1: detected capacity change from 0 to 2048 [ 133.157182][ T6259] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 133.191589][ T6259] FAULT_INJECTION: forcing a failure. [ 133.191589][ T6259] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.204754][ T6259] CPU: 1 PID: 6259 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 133.215090][ T6259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 133.225163][ T6259] Call Trace: [ 133.228515][ T6259] [ 133.230419][ T6255] FAULT_INJECTION: forcing a failure. [ 133.230419][ T6255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.231458][ T6259] dump_stack_lvl+0xda/0x130 [ 133.231488][ T6259] dump_stack+0x15/0x20 [ 133.253221][ T6259] should_fail_ex+0x21f/0x230 [ 133.258076][ T6259] should_fail+0xb/0x10 [ 133.262223][ T6259] should_fail_usercopy+0x1a/0x20 [ 133.267239][ T6259] _copy_from_iter+0xd8/0xa40 [ 133.271941][ T6259] ? kmalloc_reserve+0xfb/0x190 [ 133.276795][ T6259] ? __build_skb_around+0x196/0x1f0 [ 133.282060][ T6259] ? __virt_addr_valid+0x16a/0x1b0 [ 133.287287][ T6259] ? __check_object_size+0x363/0x520 [ 133.292620][ T6259] netlink_sendmsg+0x53c/0x770 [ 133.297451][ T6259] ? netlink_getsockopt+0x3e0/0x3e0 [ 133.302711][ T6259] ____sys_sendmsg+0x37c/0x4d0 [ 133.307495][ T6259] __sys_sendmsg+0x1e9/0x270 [ 133.312243][ T6259] __x64_sys_sendmsg+0x46/0x50 [ 133.317024][ T6259] do_syscall_64+0x41/0xc0 [ 133.321531][ T6259] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.327451][ T6259] RIP: 0033:0x7fbb4510cae9 [ 133.331869][ T6259] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 133.351478][ T6259] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.359925][ T6259] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 133.367899][ T6259] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 133.375860][ T6259] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 133.383822][ T6259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 01:00:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfe80}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x7ffffff7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 5) [ 133.391786][ T6259] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 133.399842][ T6259] [ 133.402851][ T6255] CPU: 0 PID: 6255 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 133.413217][ T6255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 133.423418][ T6255] Call Trace: [ 133.426730][ T6273] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 133.426929][ T6273] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 133.435977][ T6255] [ 133.435986][ T6255] dump_stack_lvl+0xda/0x130 [ 133.436013][ T6255] dump_stack+0x15/0x20 [ 133.436035][ T6255] should_fail_ex+0x21f/0x230 [ 133.452552][ T6273] FAULT_INJECTION: forcing a failure. [ 133.452552][ T6273] name failslab, interval 1, probability 0, space 0, times 0 [ 133.452804][ T6255] should_fail+0xb/0x10 [ 133.478609][ T6255] should_fail_usercopy+0x1a/0x20 [ 133.483643][ T6255] strncpy_from_user+0x25/0x270 [ 133.488568][ T6255] ? getname_flags+0x85/0x360 [ 133.493288][ T6255] getname_flags+0xb3/0x360 [ 133.497782][ T6255] getname+0x19/0x20 [ 133.501754][ T6255] do_sys_openat2+0x67/0x110 [ 133.506402][ T6255] __x64_sys_openat+0xf3/0x120 [ 133.511200][ T6255] do_syscall_64+0x41/0xc0 [ 133.515673][ T6255] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.521568][ T6255] RIP: 0033:0x7fe1f0864ae9 [ 133.525983][ T6255] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 133.545616][ T6255] RSP: 002b:00007fe1efbe70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 133.554097][ T6255] RAX: ffffffffffffffda RBX: 00007fe1f0983f80 RCX: 00007fe1f0864ae9 [ 133.562056][ T6255] RDX: 0000000000200002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 133.570057][ T6255] RBP: 00007fe1efbe7120 R08: 0000000000000000 R09: 0000000000000000 [ 133.578093][ T6255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.586105][ T6255] R13: 000000000000000b R14: 00007fe1f0983f80 R15: 00007ffc2c8b00f8 [ 133.594145][ T6255] [ 133.597238][ T6273] CPU: 1 PID: 6273 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 133.608258][ T6273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 133.618320][ T6273] Call Trace: [ 133.621612][ T6273] [ 133.624541][ T6273] dump_stack_lvl+0xda/0x130 [ 133.629196][ T6273] dump_stack+0x15/0x20 [ 133.633401][ T6273] should_fail_ex+0x21f/0x230 [ 133.638094][ T6273] __should_failslab+0x92/0xa0 [ 133.642867][ T6273] should_failslab+0x9/0x20 [ 133.647450][ T6273] slab_pre_alloc_hook+0x38/0x180 [ 133.652555][ T6273] kmem_cache_alloc+0x52/0x220 [ 133.657312][ T6273] ? skb_clone+0x154/0x1e0 [ 133.661858][ T6273] skb_clone+0x154/0x1e0 [ 133.666086][ T6273] __netlink_deliver_tap+0x2c0/0x4c0 [ 133.671462][ T6273] netlink_unicast+0x615/0x640 [ 133.676280][ T6273] netlink_sendmsg+0x665/0x770 [ 133.681078][ T6273] ? netlink_getsockopt+0x3e0/0x3e0 [ 133.686308][ T6273] ____sys_sendmsg+0x37c/0x4d0 [ 133.691108][ T6273] __sys_sendmsg+0x1e9/0x270 [ 133.695758][ T6273] __x64_sys_sendmsg+0x46/0x50 [ 133.700529][ T6273] do_syscall_64+0x41/0xc0 [ 133.704929][ T6273] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 133.710894][ T6273] RIP: 0033:0x7fbb4510cae9 [ 133.715315][ T6273] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 133.734900][ T6273] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.743313][ T6273] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 133.751277][ T6273] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 133.759288][ T6273] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 133.767246][ T6273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.775261][ T6273] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 133.783230][ T6273] [ 133.790406][ T6273] bridge80: port 1(vlan8) entered blocking state [ 133.796819][ T6273] bridge80: port 1(vlan8) entered disabled state [ 133.803307][ T6273] vlan8: entered allmulticast mode [ 133.811559][ T6273] vlan8: left allmulticast mode 01:00:37 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:37 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (fail_nth: 3) 01:00:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x34000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8dffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 6) 01:00:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x97ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x40000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 134.024383][ T6284] loop1: detected capacity change from 0 to 2048 [ 134.040980][ T6284] FAULT_INJECTION: forcing a failure. [ 134.040980][ T6284] name failslab, interval 1, probability 0, space 0, times 0 [ 134.059331][ T6284] CPU: 1 PID: 6284 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 134.070830][ T6284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 134.075072][ T6287] FAULT_INJECTION: forcing a failure. [ 134.075072][ T6287] name failslab, interval 1, probability 0, space 0, times 0 [ 134.082622][ T6284] Call Trace: [ 134.082634][ T6284] [ 134.082641][ T6284] dump_stack_lvl+0xda/0x130 [ 134.082715][ T6284] dump_stack+0x15/0x20 [ 134.119083][ T6284] should_fail_ex+0x21f/0x230 [ 134.123828][ T6284] __should_failslab+0x92/0xa0 [ 134.128601][ T6284] should_failslab+0x9/0x20 [ 134.133301][ T6284] slab_pre_alloc_hook+0x38/0x180 [ 134.138385][ T6284] kmem_cache_alloc+0x52/0x220 [ 134.143279][ T6284] ? alloc_empty_file+0xd0/0x310 [ 134.148232][ T6284] alloc_empty_file+0xd0/0x310 [ 134.153026][ T6284] path_openat+0x64/0x1d10 [ 134.157449][ T6284] ? _parse_integer+0x27/0x30 [ 134.162125][ T6284] ? kstrtoull+0x110/0x140 [ 134.166535][ T6284] ? kstrtouint+0x77/0xb0 [ 134.170898][ T6284] do_filp_open+0xf6/0x200 [ 134.175362][ T6284] do_sys_openat2+0xab/0x110 [ 134.179954][ T6284] __x64_sys_openat+0xf3/0x120 [ 134.184764][ T6284] do_syscall_64+0x41/0xc0 [ 134.189179][ T6284] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.195105][ T6284] RIP: 0033:0x7fe1f0864ae9 [ 134.199555][ T6284] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 134.219392][ T6284] RSP: 002b:00007fe1efbe70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 134.228072][ T6284] RAX: ffffffffffffffda RBX: 00007fe1f0983f80 RCX: 00007fe1f0864ae9 [ 134.236210][ T6284] RDX: 0000000000200002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 134.244269][ T6284] RBP: 00007fe1efbe7120 R08: 0000000000000000 R09: 0000000000000000 [ 134.252233][ T6284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.260376][ T6284] R13: 000000000000000b R14: 00007fe1f0983f80 R15: 00007ffc2c8b00f8 [ 134.268459][ T6284] 01:00:37 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (fail_nth: 4) 01:00:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x100000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb80b0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xdc050000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 134.271561][ T6287] CPU: 0 PID: 6287 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 134.282076][ T6287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 134.292138][ T6287] Call Trace: [ 134.295420][ T6287] [ 134.298355][ T6287] dump_stack_lvl+0xda/0x130 [ 134.302962][ T6287] dump_stack+0x15/0x20 [ 134.307159][ T6287] should_fail_ex+0x21f/0x230 [ 134.311910][ T6287] ? rtnl_newlink+0x5d/0x1600 [ 134.316606][ T6287] __should_failslab+0x92/0xa0 [ 134.321410][ T6287] should_failslab+0x9/0x20 [ 134.325940][ T6287] slab_pre_alloc_hook+0x38/0x180 [ 134.331052][ T6287] ? rtnl_newlink+0x5d/0x1600 [ 134.335755][ T6287] __kmem_cache_alloc_node+0x48/0x1d0 [ 134.341241][ T6287] ? rtnl_newlink+0x5d/0x1600 [ 134.345955][ T6287] kmalloc_trace+0x2a/0xa0 [ 134.350461][ T6287] rtnl_newlink+0x5d/0x1600 [ 134.355055][ T6287] ? rb_insert_color+0x6a/0x290 [ 134.359913][ T6287] ? enqueue_task_fair+0x678/0x850 [ 134.365039][ T6287] ? check_preempt_wakeup+0x1e9/0x320 [ 134.370502][ T6287] ? __rcu_read_unlock+0x4d/0x70 [ 134.375437][ T6287] ? avc_has_perm_noaudit+0x1c8/0x210 [ 134.380948][ T6287] ? selinux_capable+0x1ec/0x250 [ 134.385888][ T6287] ? __mutex_lock+0x54/0x8d0 [ 134.390616][ T6287] ? rtnl_setlink+0x300/0x300 [ 134.395276][ T6287] rtnetlink_rcv_msg+0x807/0x8c0 [ 134.401100][ T6287] ? slab_post_alloc_hook+0x8c/0x340 [ 134.406432][ T6287] ? kmem_cache_alloc+0x10f/0x220 [ 134.411447][ T6287] ? xas_load+0x37c/0x390 [ 134.415927][ T6287] ? skb_release_data+0x542/0x560 [ 134.421025][ T6287] ? kmem_cache_free+0x1db/0x3a0 [ 134.425959][ T6287] ? __kfree_skb+0x104/0x140 [ 134.430557][ T6287] ? nlmon_xmit+0x4b/0x60 [ 134.434992][ T6287] ? __kfree_skb+0x104/0x140 [ 134.439568][ T6287] ? consume_skb+0x57/0x180 [ 134.444065][ T6287] ? nlmon_xmit+0x4b/0x60 [ 134.448412][ T6287] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 134.453886][ T6287] ? ref_tracker_free+0x3a1/0x400 [ 134.458934][ T6287] ? __dev_queue_xmit+0xabb/0x1d10 [ 134.464073][ T6287] netlink_rcv_skb+0x126/0x220 [ 134.468821][ T6287] ? rtnetlink_bind+0x60/0x60 [ 134.473513][ T6287] rtnetlink_rcv+0x1c/0x20 [ 134.477975][ T6287] netlink_unicast+0x56f/0x640 [ 134.482755][ T6287] netlink_sendmsg+0x665/0x770 [ 134.487592][ T6287] ? netlink_getsockopt+0x3e0/0x3e0 [ 134.492820][ T6287] ____sys_sendmsg+0x37c/0x4d0 [ 134.497657][ T6287] __sys_sendmsg+0x1e9/0x270 [ 134.502244][ T6287] __x64_sys_sendmsg+0x46/0x50 [ 134.506993][ T6287] do_syscall_64+0x41/0xc0 [ 134.511390][ T6287] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.517313][ T6287] RIP: 0033:0x7fbb4510cae9 [ 134.521769][ T6287] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 134.541356][ T6287] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 134.549776][ T6287] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 134.557851][ T6287] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 134.565914][ T6287] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 134.573869][ T6287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.581882][ T6287] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 134.589879][ T6287] [ 134.614595][ T6304] loop1: detected capacity change from 0 to 2048 [ 134.627279][ T6304] FAULT_INJECTION: forcing a failure. [ 134.627279][ T6304] name failslab, interval 1, probability 0, space 0, times 0 [ 134.640274][ T6304] CPU: 0 PID: 6304 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 134.650801][ T6304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 134.661026][ T6304] Call Trace: [ 134.664286][ T6304] [ 134.667209][ T6304] dump_stack_lvl+0xda/0x130 [ 134.671802][ T6304] dump_stack+0x15/0x20 [ 134.675981][ T6304] should_fail_ex+0x21f/0x230 [ 134.680692][ T6304] __should_failslab+0x92/0xa0 [ 134.685451][ T6304] should_failslab+0x9/0x20 [ 134.690023][ T6304] slab_pre_alloc_hook+0x38/0x180 [ 134.695203][ T6304] kmem_cache_alloc+0x52/0x220 [ 134.699955][ T6304] ? security_file_alloc+0x32/0xd0 [ 134.705148][ T6304] ? kmem_cache_alloc+0x10f/0x220 [ 134.710228][ T6304] security_file_alloc+0x32/0xd0 [ 134.715225][ T6304] alloc_empty_file+0x120/0x310 [ 134.720098][ T6304] path_openat+0x64/0x1d10 [ 134.724497][ T6304] ? _parse_integer+0x27/0x30 [ 134.729213][ T6304] ? kstrtoull+0x110/0x140 [ 134.733635][ T6304] ? kstrtouint+0x77/0xb0 [ 134.738013][ T6304] do_filp_open+0xf6/0x200 [ 134.742419][ T6304] do_sys_openat2+0xab/0x110 [ 134.747018][ T6304] __x64_sys_openat+0xf3/0x120 [ 134.751830][ T6304] do_syscall_64+0x41/0xc0 [ 134.756432][ T6304] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.762456][ T6304] RIP: 0033:0x7fe1f0864ae9 [ 134.766855][ T6304] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 134.786713][ T6304] RSP: 002b:00007fe1efbe70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 134.795141][ T6304] RAX: ffffffffffffffda RBX: 00007fe1f0983f80 RCX: 00007fe1f0864ae9 [ 134.803127][ T6304] RDX: 0000000000200002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 134.811106][ T6304] RBP: 00007fe1efbe7120 R08: 0000000000000000 R09: 0000000000000000 01:00:38 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x400300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:38 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 7) 01:00:38 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (fail_nth: 5) 01:00:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf5ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 134.822017][ T6304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.830018][ T6304] R13: 000000000000000b R14: 00007fe1f0983f80 R15: 00007ffc2c8b00f8 [ 134.838062][ T6304] [ 134.899296][ T6315] FAULT_INJECTION: forcing a failure. [ 134.899296][ T6315] name failslab, interval 1, probability 0, space 0, times 0 [ 134.906946][ T6317] loop1: detected capacity change from 0 to 2048 [ 134.912070][ T6315] CPU: 1 PID: 6315 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 134.928933][ T6315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 134.938981][ T6315] Call Trace: [ 134.942247][ T6315] [ 134.945245][ T6315] dump_stack_lvl+0xda/0x130 [ 134.950001][ T6315] dump_stack+0x15/0x20 [ 134.954154][ T6315] should_fail_ex+0x21f/0x230 [ 134.958871][ T6315] ? kvmalloc_node+0x72/0x160 [ 134.963552][ T6315] __should_failslab+0x92/0xa0 [ 134.968333][ T6315] should_failslab+0x9/0x20 [ 134.972886][ T6315] slab_pre_alloc_hook+0x38/0x180 [ 134.977999][ T6315] ? kvmalloc_node+0x72/0x160 [ 134.982697][ T6315] __kmem_cache_alloc_node+0x48/0x1d0 [ 134.988136][ T6315] ? kvmalloc_node+0x72/0x160 [ 134.992820][ T6315] __kmalloc_node+0x98/0x1a0 [ 134.997514][ T6315] kvmalloc_node+0x72/0x160 [ 135.002049][ T6315] alloc_netdev_mqs+0x89/0x880 [ 135.006876][ T6315] ? vlan_dev_free_egress_priority+0xa0/0xa0 [ 135.012955][ T6315] rtnl_create_link+0x23b/0x810 [ 135.017814][ T6315] rtnl_newlink+0xd9d/0x1600 [ 135.022435][ T6315] ? rtnl_newlink+0x5d/0x1600 [ 135.027156][ T6315] ? rtnl_newlink+0x781/0x1600 [ 135.031976][ T6315] ? security_capable+0x5e/0x80 [ 135.036914][ T6315] ? ns_capable+0x7c/0xb0 [ 135.041241][ T6315] ? rtnl_setlink+0x300/0x300 [ 135.045929][ T6315] rtnetlink_rcv_msg+0x807/0x8c0 [ 135.050867][ T6315] ? slab_post_alloc_hook+0x8c/0x340 [ 135.056305][ T6315] ? kmem_cache_alloc+0x10f/0x220 [ 135.061455][ T6315] ? xas_load+0x37c/0x390 [ 135.065841][ T6315] ? skb_release_data+0x542/0x560 [ 135.070867][ T6315] ? kmem_cache_free+0x1db/0x3a0 [ 135.075802][ T6315] ? __kfree_skb+0x104/0x140 [ 135.080485][ T6315] ? nlmon_xmit+0x4b/0x60 [ 135.084815][ T6315] ? __kfree_skb+0x104/0x140 [ 135.089402][ T6315] ? consume_skb+0x57/0x180 [ 135.093902][ T6315] ? nlmon_xmit+0x4b/0x60 [ 135.098298][ T6315] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 135.103680][ T6315] ? ref_tracker_free+0x3a1/0x400 [ 135.108724][ T6315] ? __dev_queue_xmit+0xabb/0x1d10 [ 135.113867][ T6315] netlink_rcv_skb+0x126/0x220 [ 135.118646][ T6315] ? rtnetlink_bind+0x60/0x60 [ 135.123351][ T6315] rtnetlink_rcv+0x1c/0x20 [ 135.127930][ T6315] netlink_unicast+0x56f/0x640 [ 135.132762][ T6315] netlink_sendmsg+0x665/0x770 [ 135.137720][ T6315] ? netlink_getsockopt+0x3e0/0x3e0 [ 135.143055][ T6315] ____sys_sendmsg+0x37c/0x4d0 [ 135.147877][ T6315] __sys_sendmsg+0x1e9/0x270 [ 135.152480][ T6315] __x64_sys_sendmsg+0x46/0x50 [ 135.157293][ T6315] do_syscall_64+0x41/0xc0 [ 135.161711][ T6315] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 135.168008][ T6315] RIP: 0033:0x7fbb4510cae9 [ 135.172433][ T6315] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 135.192135][ T6315] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:00:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 8) 01:00:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 135.200595][ T6315] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 135.208559][ T6315] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 135.216728][ T6315] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 135.224694][ T6315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.232754][ T6315] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 135.241259][ T6315] 01:00:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf7ffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 135.284576][ T6325] FAULT_INJECTION: forcing a failure. [ 135.284576][ T6325] name failslab, interval 1, probability 0, space 0, times 0 [ 135.297327][ T6325] CPU: 1 PID: 6325 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 135.307694][ T6325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 135.317762][ T6325] Call Trace: [ 135.321107][ T6325] [ 135.324042][ T6325] dump_stack_lvl+0xda/0x130 [ 135.328641][ T6325] dump_stack+0x15/0x20 [ 135.332879][ T6325] should_fail_ex+0x21f/0x230 [ 135.334014][ T6317] FAULT_INJECTION: forcing a failure. [ 135.334014][ T6317] name failslab, interval 1, probability 0, space 0, times 0 [ 135.337602][ T6325] ? __hw_addr_add_ex+0x13d/0x350 [ 135.337637][ T6325] __should_failslab+0x92/0xa0 [ 135.360067][ T6325] should_failslab+0x9/0x20 [ 135.364611][ T6325] slab_pre_alloc_hook+0x38/0x180 [ 135.369947][ T6325] ? __hw_addr_add_ex+0x13d/0x350 [ 135.374992][ T6325] __kmem_cache_alloc_node+0x48/0x1d0 [ 135.380388][ T6325] ? __hw_addr_add_ex+0x13d/0x350 [ 135.385526][ T6325] kmalloc_trace+0x2a/0xa0 [ 135.390072][ T6325] __hw_addr_add_ex+0x13d/0x350 [ 135.394930][ T6325] dev_addr_init+0xb2/0x120 [ 135.399497][ T6325] ? stack_depot_init+0x4f/0x130 [ 135.404436][ T6325] alloc_netdev_mqs+0x1cc/0x880 [ 135.409428][ T6325] ? vlan_dev_free_egress_priority+0xa0/0xa0 [ 135.415465][ T6325] rtnl_create_link+0x23b/0x810 [ 135.420394][ T6325] rtnl_newlink+0xd9d/0x1600 [ 135.424978][ T6325] ? rtnl_newlink+0x5d/0x1600 [ 135.429680][ T6325] ? rtnl_newlink+0x781/0x1600 [ 135.434501][ T6325] ? security_capable+0x5e/0x80 [ 135.439347][ T6325] ? ns_capable+0x7c/0xb0 [ 135.443698][ T6325] ? rtnl_setlink+0x300/0x300 [ 135.448418][ T6325] rtnetlink_rcv_msg+0x807/0x8c0 [ 135.453385][ T6325] ? slab_post_alloc_hook+0x8c/0x340 [ 135.458738][ T6325] ? kmem_cache_alloc+0x10f/0x220 [ 135.463870][ T6325] ? xas_load+0x37c/0x390 [ 135.468296][ T6325] ? skb_release_data+0x542/0x560 [ 135.473318][ T6325] ? kmem_cache_free+0x1db/0x3a0 [ 135.478283][ T6325] ? __kfree_skb+0x104/0x140 [ 135.482943][ T6325] ? nlmon_xmit+0x4b/0x60 [ 135.487276][ T6325] ? __kfree_skb+0x104/0x140 [ 135.491984][ T6325] ? consume_skb+0x57/0x180 [ 135.496512][ T6325] ? nlmon_xmit+0x4b/0x60 [ 135.500937][ T6325] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 135.506284][ T6325] ? ref_tracker_free+0x3a1/0x400 [ 135.511314][ T6325] ? __dev_queue_xmit+0xabb/0x1d10 [ 135.516448][ T6325] netlink_rcv_skb+0x126/0x220 [ 135.521219][ T6325] ? rtnetlink_bind+0x60/0x60 [ 135.526002][ T6325] rtnetlink_rcv+0x1c/0x20 [ 135.530415][ T6325] netlink_unicast+0x56f/0x640 [ 135.535189][ T6325] netlink_sendmsg+0x665/0x770 [ 135.540069][ T6325] ? netlink_getsockopt+0x3e0/0x3e0 [ 135.545284][ T6325] ____sys_sendmsg+0x37c/0x4d0 [ 135.550137][ T6325] __sys_sendmsg+0x1e9/0x270 [ 135.554772][ T6325] __x64_sys_sendmsg+0x46/0x50 [ 135.559616][ T6325] do_syscall_64+0x41/0xc0 [ 135.564035][ T6325] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 135.569941][ T6325] RIP: 0033:0x7fbb4510cae9 [ 135.574351][ T6325] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 135.593990][ T6325] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 135.602412][ T6325] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 135.610375][ T6325] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 135.618335][ T6325] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 135.626340][ T6325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 01:00:38 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x0, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:39 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfe800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 9) [ 135.634731][ T6325] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 135.642719][ T6325] [ 135.645790][ T6317] CPU: 0 PID: 6317 Comm: syz-executor.1 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 135.656140][ T6317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 135.666269][ T6317] Call Trace: [ 135.667254][ T6325] syz-executor.2 (6325) used greatest stack depth: 10472 bytes left [ 135.669585][ T6317] [ 135.669593][ T6317] dump_stack_lvl+0xda/0x130 [ 135.685297][ T6317] dump_stack+0x15/0x20 [ 135.688309][ T6336] __nla_validate_parse: 6 callbacks suppressed [ 135.688321][ T6336] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 135.689525][ T6317] should_fail_ex+0x21f/0x230 [ 135.689551][ T6317] __should_failslab+0x92/0xa0 [ 135.696491][ T6336] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 135.704904][ T6317] should_failslab+0x9/0x20 [ 135.721564][ T6336] FAULT_INJECTION: forcing a failure. [ 135.721564][ T6336] name failslab, interval 1, probability 0, space 0, times 0 [ 135.723605][ T6317] slab_pre_alloc_hook+0x38/0x180 [ 135.745822][ T6317] kmem_cache_alloc_lru+0x4e/0x220 [ 135.750953][ T6317] ? __d_alloc+0x3d/0x380 [ 135.755276][ T6317] __d_alloc+0x3d/0x380 [ 135.759427][ T6317] ? xa_load+0xb9/0xe0 [ 135.763558][ T6317] d_alloc_parallel+0x54/0xc90 [ 135.768993][ T6317] ? __rcu_read_unlock+0x33/0x70 [ 135.773964][ T6317] ? __d_lookup_rcu_op_compare+0x239/0x270 [ 135.779764][ T6317] ? avc_has_perm_noaudit+0x1c8/0x210 [ 135.785239][ T6317] ? lockref_get_not_dead+0x12b/0x1d0 [ 135.790674][ T6317] ? down_read+0x16f/0x4a0 [ 135.795118][ T6317] __lookup_slow+0x8d/0x230 [ 135.799619][ T6317] lookup_slow+0x3c/0x60 [ 135.803903][ T6317] link_path_walk+0x648/0x7e0 [ 135.808663][ T6317] path_lookupat+0x72/0x2a0 [ 135.813265][ T6317] do_o_path+0x44/0x120 [ 135.817468][ T6317] path_openat+0x1a01/0x1d10 [ 135.822080][ T6317] ? _parse_integer+0x27/0x30 [ 135.826801][ T6317] ? kstrtoull+0x110/0x140 [ 135.831300][ T6317] ? kstrtouint+0x77/0xb0 [ 135.835623][ T6317] do_filp_open+0xf6/0x200 [ 135.840101][ T6317] do_sys_openat2+0xab/0x110 [ 135.844726][ T6317] __x64_sys_openat+0xf3/0x120 [ 135.849569][ T6317] do_syscall_64+0x41/0xc0 [ 135.853981][ T6317] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 135.860312][ T6317] RIP: 0033:0x7fe1f0864ae9 [ 135.864791][ T6317] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 135.884518][ T6317] RSP: 002b:00007fe1efbe70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 135.893001][ T6317] RAX: ffffffffffffffda RBX: 00007fe1f0983f80 RCX: 00007fe1f0864ae9 [ 135.901009][ T6317] RDX: 0000000000200002 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 135.910897][ T6317] RBP: 00007fe1efbe7120 R08: 0000000000000000 R09: 0000000000000000 [ 135.919043][ T6317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.927356][ T6317] R13: 000000000000000b R14: 00007fe1f0983f80 R15: 00007ffc2c8b00f8 01:00:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 135.935324][ T6317] [ 135.938420][ T6336] CPU: 1 PID: 6336 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 135.948846][ T6336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 135.958911][ T6336] Call Trace: [ 135.962192][ T6336] [ 135.965134][ T6336] dump_stack_lvl+0xda/0x130 [ 135.970180][ T6336] dump_stack+0x15/0x20 [ 135.974352][ T6336] should_fail_ex+0x21f/0x230 [ 135.979057][ T6336] ? kvmalloc_node+0x72/0x160 01:00:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x2000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 135.983794][ T6336] __should_failslab+0x92/0xa0 [ 135.988573][ T6336] should_failslab+0x9/0x20 [ 135.993098][ T6336] slab_pre_alloc_hook+0x38/0x180 [ 135.998141][ T6336] ? kvmalloc_node+0x72/0x160 [ 136.002838][ T6336] __kmem_cache_alloc_node+0x48/0x1d0 [ 136.008235][ T6336] ? kvmalloc_node+0x72/0x160 [ 136.012935][ T6336] __kmalloc_node+0x98/0x1a0 [ 136.017619][ T6336] ? dev_addr_init+0xf2/0x120 [ 136.022486][ T6336] kvmalloc_node+0x72/0x160 [ 136.027038][ T6336] alloc_netdev_mqs+0x53b/0x880 [ 136.031925][ T6336] rtnl_create_link+0x23b/0x810 01:00:39 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:39 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 136.036804][ T6336] rtnl_newlink+0xd9d/0x1600 [ 136.041433][ T6336] ? rb_insert_color+0x6a/0x290 [ 136.046294][ T6336] ? rtnl_newlink+0x781/0x1600 [ 136.051477][ T6336] ? security_capable+0x5e/0x80 [ 136.056400][ T6336] ? ns_capable+0x7c/0xb0 [ 136.060743][ T6336] ? rtnl_setlink+0x300/0x300 [ 136.065660][ T6336] rtnetlink_rcv_msg+0x807/0x8c0 [ 136.070704][ T6336] ? slab_post_alloc_hook+0x8c/0x340 [ 136.076017][ T6336] ? kmem_cache_alloc+0x10f/0x220 [ 136.081063][ T6336] ? xas_load+0x37c/0x390 01:00:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff8d}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 136.085478][ T6336] ? skb_release_data+0x542/0x560 [ 136.090598][ T6336] ? kmem_cache_free+0x1db/0x3a0 [ 136.095596][ T6336] ? __kfree_skb+0x104/0x140 [ 136.100199][ T6336] ? nlmon_xmit+0x4b/0x60 [ 136.104555][ T6336] ? __kfree_skb+0x104/0x140 [ 136.109164][ T6336] ? consume_skb+0x57/0x180 [ 136.113679][ T6336] ? nlmon_xmit+0x4b/0x60 [ 136.118106][ T6336] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 136.123448][ T6336] ? ref_tracker_free+0x3a1/0x400 [ 136.128639][ T6336] ? __dev_queue_xmit+0xabb/0x1d10 [ 136.133773][ T6336] netlink_rcv_skb+0x126/0x220 [ 136.138643][ T6336] ? rtnetlink_bind+0x60/0x60 [ 136.143448][ T6336] rtnetlink_rcv+0x1c/0x20 [ 136.147896][ T6336] netlink_unicast+0x56f/0x640 [ 136.152759][ T6336] netlink_sendmsg+0x665/0x770 [ 136.157553][ T6336] ? netlink_getsockopt+0x3e0/0x3e0 [ 136.162764][ T6336] ____sys_sendmsg+0x37c/0x4d0 [ 136.167686][ T6336] __sys_sendmsg+0x1e9/0x270 [ 136.172356][ T6336] __x64_sys_sendmsg+0x46/0x50 [ 136.177119][ T6336] do_syscall_64+0x41/0xc0 [ 136.181527][ T6336] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 136.187459][ T6336] RIP: 0033:0x7fbb4510cae9 [ 136.192025][ T6336] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 136.211712][ T6336] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 136.220111][ T6336] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 136.228073][ T6336] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 01:00:39 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x0, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff97}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x5000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 10) 01:00:39 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x0, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 136.236053][ T6336] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 136.244018][ T6336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.251978][ T6336] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 136.259998][ T6336] 01:00:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfffffff5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 136.298994][ T6369] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 136.323786][ T6369] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 136.330242][ T6370] loop1: detected capacity change from 0 to 2048 [ 136.338995][ T6369] FAULT_INJECTION: forcing a failure. [ 136.338995][ T6369] name failslab, interval 1, probability 0, space 0, times 0 [ 136.352056][ T6369] CPU: 1 PID: 6369 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 136.362573][ T6369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 136.372634][ T6369] Call Trace: [ 136.375912][ T6369] [ 136.379054][ T6369] dump_stack_lvl+0xda/0x130 [ 136.383678][ T6369] dump_stack+0x15/0x20 [ 136.387835][ T6369] should_fail_ex+0x21f/0x230 [ 136.392511][ T6369] ? kvmalloc_node+0x72/0x160 [ 136.397226][ T6369] __should_failslab+0x92/0xa0 [ 136.402370][ T6369] should_failslab+0x9/0x20 [ 136.406892][ T6369] slab_pre_alloc_hook+0x38/0x180 [ 136.411952][ T6369] ? kvmalloc_node+0x72/0x160 [ 136.416720][ T6369] __kmem_cache_alloc_node+0x48/0x1d0 [ 136.422178][ T6369] ? kvmalloc_node+0x72/0x160 [ 136.428487][ T6369] __kmalloc_node+0x98/0x1a0 [ 136.433199][ T6369] ? dev_addr_init+0xf2/0x120 [ 136.437901][ T6369] kvmalloc_node+0x72/0x160 [ 136.442437][ T6369] alloc_netdev_mqs+0x6c2/0x880 [ 136.447390][ T6369] rtnl_create_link+0x23b/0x810 [ 136.452268][ T6369] rtnl_newlink+0xd9d/0x1600 [ 136.456965][ T6369] ? rtnl_newlink+0x5d/0x1600 [ 136.461647][ T6369] ? rtnl_newlink+0x781/0x1600 [ 136.466573][ T6369] ? security_capable+0x5e/0x80 [ 136.471736][ T6369] ? ns_capable+0x7c/0xb0 [ 136.476063][ T6369] ? rtnl_setlink+0x300/0x300 [ 136.480740][ T6369] rtnetlink_rcv_msg+0x807/0x8c0 [ 136.485768][ T6369] ? slab_post_alloc_hook+0x8c/0x340 [ 136.491072][ T6369] ? kmem_cache_alloc+0x10f/0x220 [ 136.496217][ T6369] ? xas_load+0x37c/0x390 [ 136.500595][ T6369] ? skb_release_data+0x542/0x560 [ 136.505677][ T6369] ? kmem_cache_free+0x1db/0x3a0 [ 136.510799][ T6369] ? __kfree_skb+0x104/0x140 [ 136.515407][ T6369] ? nlmon_xmit+0x4b/0x60 [ 136.519814][ T6369] ? __kfree_skb+0x104/0x140 [ 136.524560][ T6369] ? consume_skb+0x57/0x180 [ 136.529121][ T6369] ? nlmon_xmit+0x4b/0x60 [ 136.533477][ T6369] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 136.538859][ T6369] ? ref_tracker_free+0x3a1/0x400 [ 136.543915][ T6369] ? __dev_queue_xmit+0xabb/0x1d10 [ 136.549065][ T6369] netlink_rcv_skb+0x126/0x220 [ 136.553850][ T6369] ? rtnetlink_bind+0x60/0x60 [ 136.558530][ T6369] rtnetlink_rcv+0x1c/0x20 [ 136.562949][ T6369] netlink_unicast+0x56f/0x640 [ 136.567810][ T6369] netlink_sendmsg+0x665/0x770 [ 136.572829][ T6369] ? netlink_getsockopt+0x3e0/0x3e0 [ 136.578170][ T6369] ____sys_sendmsg+0x37c/0x4d0 [ 136.582941][ T6369] __sys_sendmsg+0x1e9/0x270 [ 136.587550][ T6369] __x64_sys_sendmsg+0x46/0x50 [ 136.592393][ T6369] do_syscall_64+0x41/0xc0 [ 136.596869][ T6369] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 136.603137][ T6369] RIP: 0033:0x7fbb4510cae9 [ 136.607572][ T6369] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 136.627278][ T6369] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 136.635810][ T6369] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 01:00:40 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200003, 0x0) 01:00:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x6000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x0, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 11) 01:00:40 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x0, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 136.644138][ T6369] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 136.652161][ T6369] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 136.660131][ T6369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 136.668279][ T6369] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 136.676260][ T6369] 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x7000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x0, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 136.718956][ T6383] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 136.757138][ T6383] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 136.792419][ T6383] FAULT_INJECTION: forcing a failure. [ 136.792419][ T6383] name failslab, interval 1, probability 0, space 0, times 0 [ 136.797224][ T6391] loop1: detected capacity change from 0 to 2048 [ 136.805183][ T6383] CPU: 0 PID: 6383 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 136.822235][ T6383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 136.832402][ T6383] Call Trace: [ 136.835702][ T6383] [ 136.838636][ T6383] dump_stack_lvl+0xda/0x130 [ 136.843684][ T6383] dump_stack+0x15/0x20 [ 136.847890][ T6383] should_fail_ex+0x21f/0x230 [ 136.852908][ T6383] ? vlan_vid_add+0xbc/0x4c0 [ 136.858403][ T6383] __should_failslab+0x92/0xa0 [ 136.863536][ T6383] should_failslab+0x9/0x20 [ 136.868229][ T6383] slab_pre_alloc_hook+0x38/0x180 [ 136.873924][ T6383] ? vlan_vid_add+0xbc/0x4c0 [ 136.878603][ T6383] __kmem_cache_alloc_node+0x48/0x1d0 [ 136.884087][ T6383] ? vlan_vid_add+0xbc/0x4c0 [ 136.888697][ T6383] kmalloc_trace+0x2a/0xa0 [ 136.894075][ T6383] vlan_vid_add+0xbc/0x4c0 [ 136.898562][ T6383] ? __xdp_rxq_info_reg+0x12d/0x150 [ 136.904192][ T6383] ? strcpy+0x30/0x50 [ 136.908184][ T6383] register_vlan_dev+0x65/0x460 [ 136.913047][ T6383] ? validate_linkmsg+0x511/0x590 [ 136.918125][ T6383] ? vlan_changelink+0x211/0x240 [ 136.923073][ T6383] vlan_newlink+0x317/0x350 [ 136.927689][ T6383] ? vlan_validate+0x420/0x420 [ 136.932474][ T6383] rtnl_newlink+0xe83/0x1600 [ 136.937101][ T6383] ? rtnl_newlink+0x5d/0x1600 [ 136.941822][ T6383] ? security_capable+0x5e/0x80 [ 136.946693][ T6383] ? ns_capable+0x7c/0xb0 [ 136.951071][ T6383] ? rtnl_setlink+0x300/0x300 [ 136.956520][ T6383] rtnetlink_rcv_msg+0x807/0x8c0 [ 136.961488][ T6383] ? __rcu_read_unlock+0x4d/0x70 [ 136.966576][ T6383] ? slab_post_alloc_hook+0x8c/0x340 [ 136.971871][ T6383] ? kmem_cache_alloc+0x10f/0x220 [ 136.976997][ T6383] ? xas_load+0x37c/0x390 [ 136.981338][ T6383] ? skb_release_data+0x542/0x560 [ 136.986367][ T6383] ? kmem_cache_free+0x1db/0x3a0 [ 136.991308][ T6383] ? __kfree_skb+0x104/0x140 [ 136.995899][ T6383] ? nlmon_xmit+0x4b/0x60 [ 137.000227][ T6383] ? __kfree_skb+0x104/0x140 [ 137.004818][ T6383] ? consume_skb+0x57/0x180 [ 137.009417][ T6383] ? nlmon_xmit+0x4b/0x60 [ 137.013811][ T6383] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 137.019093][ T6383] ? ref_tracker_free+0x3a1/0x400 [ 137.024176][ T6383] ? __dev_queue_xmit+0xabb/0x1d10 [ 137.029283][ T6383] netlink_rcv_skb+0x126/0x220 [ 137.034089][ T6383] ? rtnetlink_bind+0x60/0x60 [ 137.038771][ T6383] rtnetlink_rcv+0x1c/0x20 [ 137.043192][ T6383] netlink_unicast+0x56f/0x640 [ 137.048008][ T6383] netlink_sendmsg+0x665/0x770 [ 137.052773][ T6383] ? netlink_getsockopt+0x3e0/0x3e0 [ 137.057976][ T6383] ____sys_sendmsg+0x37c/0x4d0 [ 137.062854][ T6383] __sys_sendmsg+0x1e9/0x270 [ 137.067454][ T6383] __x64_sys_sendmsg+0x46/0x50 [ 137.072392][ T6383] do_syscall_64+0x41/0xc0 [ 137.076806][ T6383] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.082704][ T6383] RIP: 0033:0x7fbb4510cae9 [ 137.087121][ T6383] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 137.107051][ T6383] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.115482][ T6383] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 137.123569][ T6383] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 137.131548][ T6383] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 01:00:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 12) [ 137.139517][ T6383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.147484][ T6383] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 137.155770][ T6383] [ 137.163273][ T26] audit: type=1400 audit(1692320440.814:216): avc: denied { unlink } for pid=2749 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 01:00:40 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x2) 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, 0x0) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x9000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x0) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 137.209543][ T6405] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 137.220294][ T6405] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 137.235684][ T6405] FAULT_INJECTION: forcing a failure. [ 137.235684][ T6405] name failslab, interval 1, probability 0, space 0, times 0 [ 137.248441][ T6405] CPU: 1 PID: 6405 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x200000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x300000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:40 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, 0x0) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 137.258814][ T6405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 137.268968][ T6405] Call Trace: [ 137.272292][ T6405] [ 137.275284][ T6405] dump_stack_lvl+0xda/0x130 [ 137.280335][ T6405] dump_stack+0x15/0x20 [ 137.284592][ T6405] should_fail_ex+0x21f/0x230 [ 137.289287][ T6405] ? vlan_vid_add+0x1d4/0x4c0 [ 137.294076][ T6405] __should_failslab+0x92/0xa0 [ 137.300899][ T6405] should_failslab+0x9/0x20 01:00:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 137.305618][ T6405] slab_pre_alloc_hook+0x38/0x180 [ 137.310672][ T6405] ? vlan_vid_add+0x1d4/0x4c0 [ 137.315849][ T6405] __kmem_cache_alloc_node+0x48/0x1d0 [ 137.321250][ T6405] ? vlan_vid_add+0x1d4/0x4c0 [ 137.325947][ T6405] kmalloc_trace+0x2a/0xa0 [ 137.330478][ T6405] vlan_vid_add+0x1d4/0x4c0 [ 137.335079][ T6405] register_vlan_dev+0x65/0x460 [ 137.340023][ T6405] ? validate_linkmsg+0x511/0x590 [ 137.345073][ T6405] ? vlan_changelink+0x211/0x240 [ 137.350022][ T6405] vlan_newlink+0x317/0x350 [ 137.354610][ T6405] ? vlan_validate+0x420/0x420 [ 137.359409][ T6405] rtnl_newlink+0xe83/0x1600 [ 137.364188][ T6405] ? rtnl_newlink+0x5d/0x1600 [ 137.368987][ T6405] ? security_capable+0x5e/0x80 [ 137.373852][ T6405] ? ns_capable+0x7c/0xb0 [ 137.378296][ T6405] ? rtnl_setlink+0x300/0x300 [ 137.383037][ T6405] rtnetlink_rcv_msg+0x807/0x8c0 [ 137.387991][ T6405] ? slab_post_alloc_hook+0x8c/0x340 [ 137.393298][ T6405] ? try_charge_memcg+0xb45/0xd20 [ 137.398362][ T6405] ? xas_load+0x37c/0x390 [ 137.402787][ T6405] ? skb_release_data+0x542/0x560 [ 137.408180][ T6405] ? kmem_cache_free+0x1db/0x3a0 [ 137.414164][ T6405] ? __kfree_skb+0x104/0x140 [ 137.418876][ T6405] ? nlmon_xmit+0x4b/0x60 [ 137.423280][ T6405] ? __kfree_skb+0x104/0x140 [ 137.428218][ T6405] ? consume_skb+0x57/0x180 [ 137.433226][ T6405] ? nlmon_xmit+0x4b/0x60 [ 137.437798][ T6405] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 137.443168][ T6405] ? ref_tracker_free+0x3a1/0x400 [ 137.448187][ T6405] ? __dev_queue_xmit+0xabb/0x1d10 [ 137.453283][ T6405] netlink_rcv_skb+0x126/0x220 [ 137.458396][ T6405] ? rtnetlink_bind+0x60/0x60 [ 137.463081][ T6405] rtnetlink_rcv+0x1c/0x20 [ 137.467498][ T6405] netlink_unicast+0x56f/0x640 [ 137.472390][ T6405] netlink_sendmsg+0x665/0x770 [ 137.477237][ T6405] ? netlink_getsockopt+0x3e0/0x3e0 [ 137.482833][ T6405] ____sys_sendmsg+0x37c/0x4d0 [ 137.487699][ T6405] __sys_sendmsg+0x1e9/0x270 [ 137.492317][ T6405] __x64_sys_sendmsg+0x46/0x50 [ 137.497098][ T6405] do_syscall_64+0x41/0xc0 [ 137.501664][ T6405] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.507628][ T6405] RIP: 0033:0x7fbb4510cae9 [ 137.512378][ T6405] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 137.532175][ T6405] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.540766][ T6405] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 137.548720][ T6405] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 13) [ 137.556675][ T6405] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 137.564722][ T6405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.573027][ T6405] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 137.580992][ T6405] 01:00:41 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x3) 01:00:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x500000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, 0x0) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:41 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x0) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 137.613401][ T6435] loop1: detected capacity change from 0 to 2048 [ 137.621361][ T6437] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 137.631019][ T6437] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 137.649927][ T6437] FAULT_INJECTION: forcing a failure. [ 137.649927][ T6437] name failslab, interval 1, probability 0, space 0, times 0 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10080000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x600000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 137.662684][ T6437] CPU: 0 PID: 6437 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 137.673104][ T6437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 137.683256][ T6437] Call Trace: [ 137.686647][ T6437] [ 137.689578][ T6437] dump_stack_lvl+0xda/0x130 [ 137.694230][ T6437] dump_stack+0x15/0x20 [ 137.698416][ T6437] should_fail_ex+0x21f/0x230 [ 137.703109][ T6437] ? garp_init_applicant+0x96/0x2c0 [ 137.708324][ T6437] __should_failslab+0x92/0xa0 01:00:41 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x11000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x30000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 137.713113][ T6437] should_failslab+0x9/0x20 [ 137.717663][ T6437] slab_pre_alloc_hook+0x38/0x180 [ 137.723184][ T6437] ? garp_init_applicant+0x96/0x2c0 [ 137.728410][ T6437] __kmem_cache_alloc_node+0x48/0x1d0 [ 137.733868][ T6437] ? garp_init_applicant+0x96/0x2c0 [ 137.739886][ T6437] kmalloc_trace+0x2a/0xa0 [ 137.744330][ T6437] garp_init_applicant+0x96/0x2c0 [ 137.749483][ T6437] vlan_gvrp_init_applicant+0x1c/0x20 [ 137.755005][ T6437] register_vlan_dev+0xf9/0x460 [ 137.760151][ T6437] vlan_newlink+0x317/0x350 [ 137.764702][ T6437] ? vlan_validate+0x420/0x420 [ 137.769683][ T6437] rtnl_newlink+0xe83/0x1600 [ 137.774296][ T6437] ? rtnl_newlink+0x5d/0x1600 [ 137.779370][ T6437] ? security_capable+0x5e/0x80 [ 137.784374][ T6437] ? ns_capable+0x7c/0xb0 [ 137.788806][ T6437] ? rtnl_setlink+0x300/0x300 [ 137.793834][ T6437] rtnetlink_rcv_msg+0x807/0x8c0 [ 137.798795][ T6437] ? slab_post_alloc_hook+0x8c/0x340 [ 137.804179][ T6437] ? try_charge_memcg+0xb45/0xd20 [ 137.809410][ T6437] ? xas_load+0x37c/0x390 [ 137.813793][ T6437] ? skb_release_data+0x542/0x560 [ 137.819645][ T6437] ? kmem_cache_free+0x1db/0x3a0 [ 137.824890][ T6437] ? __kfree_skb+0x104/0x140 [ 137.829812][ T6437] ? nlmon_xmit+0x4b/0x60 [ 137.836237][ T6437] ? __kfree_skb+0x104/0x140 [ 137.840867][ T6437] ? consume_skb+0x57/0x180 [ 137.845479][ T6437] ? nlmon_xmit+0x4b/0x60 [ 137.849812][ T6437] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 137.855171][ T6437] ? ref_tracker_free+0x3a1/0x400 [ 137.860451][ T6437] ? __dev_queue_xmit+0xabb/0x1d10 [ 137.865756][ T6437] netlink_rcv_skb+0x126/0x220 [ 137.870583][ T6437] ? rtnetlink_bind+0x60/0x60 [ 137.875436][ T6437] rtnetlink_rcv+0x1c/0x20 [ 137.879867][ T6437] netlink_unicast+0x56f/0x640 [ 137.884811][ T6437] netlink_sendmsg+0x665/0x770 [ 137.889594][ T6437] ? netlink_getsockopt+0x3e0/0x3e0 [ 137.894931][ T6437] ____sys_sendmsg+0x37c/0x4d0 [ 137.899887][ T6437] __sys_sendmsg+0x1e9/0x270 [ 137.904499][ T6437] __x64_sys_sendmsg+0x46/0x50 [ 137.909299][ T6437] do_syscall_64+0x41/0xc0 [ 137.913703][ T6437] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 137.919857][ T6437] RIP: 0033:0x7fbb4510cae9 [ 137.924302][ T6437] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 137.945283][ T6437] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.953719][ T6437] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 01:00:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 14) [ 137.961698][ T6437] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 137.969714][ T6437] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 137.977838][ T6437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.985810][ T6437] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 137.993854][ T6437] 01:00:41 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x4) 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3f000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x700000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:41 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x0) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 138.032506][ T6469] loop1: detected capacity change from 0 to 2048 [ 138.036966][ T6468] FAULT_INJECTION: forcing a failure. [ 138.036966][ T6468] name failslab, interval 1, probability 0, space 0, times 0 [ 138.051564][ T6468] CPU: 1 PID: 6468 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 138.062281][ T6468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 138.072400][ T6468] Call Trace: [ 138.075694][ T6468] 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x40000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x800000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x900000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 138.078634][ T6468] dump_stack_lvl+0xda/0x130 [ 138.083330][ T6468] dump_stack+0x15/0x20 [ 138.087502][ T6468] should_fail_ex+0x21f/0x230 [ 138.092216][ T6468] ? garp_init_applicant+0xd5/0x2c0 [ 138.097583][ T6468] __should_failslab+0x92/0xa0 [ 138.102404][ T6468] should_failslab+0x9/0x20 [ 138.107035][ T6468] slab_pre_alloc_hook+0x38/0x180 [ 138.112612][ T6468] ? garp_init_applicant+0xd5/0x2c0 [ 138.117893][ T6468] __kmem_cache_alloc_node+0x48/0x1d0 [ 138.124265][ T6468] ? garp_init_applicant+0xd5/0x2c0 01:00:41 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x47ee0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:41 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 138.129574][ T6468] kmalloc_trace+0x2a/0xa0 [ 138.134083][ T6468] garp_init_applicant+0xd5/0x2c0 [ 138.139130][ T6468] vlan_gvrp_init_applicant+0x1c/0x20 [ 138.144558][ T6468] register_vlan_dev+0xf9/0x460 [ 138.149516][ T6468] vlan_newlink+0x317/0x350 [ 138.154111][ T6468] ? vlan_validate+0x420/0x420 [ 138.158914][ T6468] rtnl_newlink+0xe83/0x1600 [ 138.163526][ T6468] ? rtnl_newlink+0x5d/0x1600 [ 138.168435][ T6468] ? security_capable+0x5e/0x80 [ 138.173440][ T6468] ? ns_capable+0x7c/0xb0 [ 138.177881][ T6468] ? rtnl_setlink+0x300/0x300 [ 138.182742][ T6468] rtnetlink_rcv_msg+0x807/0x8c0 [ 138.188239][ T6468] ? slab_post_alloc_hook+0x8c/0x340 [ 138.194566][ T6468] ? kmem_cache_alloc+0x10f/0x220 [ 138.200407][ T6468] ? xas_load+0x37c/0x390 [ 138.205631][ T6468] ? skb_release_data+0x542/0x560 [ 138.210737][ T6468] ? kmem_cache_free+0x1db/0x3a0 [ 138.215746][ T6468] ? __kfree_skb+0x104/0x140 [ 138.220444][ T6468] ? nlmon_xmit+0x4b/0x60 [ 138.224833][ T6468] ? __kfree_skb+0x104/0x140 [ 138.229596][ T6468] ? consume_skb+0x57/0x180 [ 138.234136][ T6468] ? nlmon_xmit+0x4b/0x60 [ 138.238492][ T6468] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 138.243825][ T6468] ? ref_tracker_free+0x3a1/0x400 [ 138.249022][ T6468] ? __dev_queue_xmit+0xabb/0x1d10 [ 138.254360][ T6468] netlink_rcv_skb+0x126/0x220 [ 138.259149][ T6468] ? rtnetlink_bind+0x60/0x60 [ 138.264033][ T6468] rtnetlink_rcv+0x1c/0x20 [ 138.268477][ T6468] netlink_unicast+0x56f/0x640 [ 138.273317][ T6468] netlink_sendmsg+0x665/0x770 [ 138.278105][ T6468] ? netlink_getsockopt+0x3e0/0x3e0 [ 138.283648][ T6468] ____sys_sendmsg+0x37c/0x4d0 [ 138.288548][ T6468] __sys_sendmsg+0x1e9/0x270 [ 138.293218][ T6468] __x64_sys_sendmsg+0x46/0x50 [ 138.297985][ T6468] do_syscall_64+0x41/0xc0 [ 138.302507][ T6468] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 138.308499][ T6468] RIP: 0033:0x7fbb4510cae9 [ 138.312922][ T6468] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 138.332660][ T6468] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 138.341853][ T6468] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 138.349949][ T6468] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 138.358088][ T6468] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 138.366232][ T6468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.374183][ T6468] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 01:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 15) [ 138.382416][ T6468] [ 138.417777][ T6501] FAULT_INJECTION: forcing a failure. [ 138.417777][ T6501] name failslab, interval 1, probability 0, space 0, times 0 [ 138.421097][ T6499] loop1: detected capacity change from 0 to 2048 [ 138.431666][ T6501] CPU: 0 PID: 6501 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 138.431718][ T6501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 138.431728][ T6501] Call Trace: [ 138.431732][ T6501] [ 138.431737][ T6501] dump_stack_lvl+0xda/0x130 [ 138.469436][ T6501] dump_stack+0x15/0x20 [ 138.473768][ T6501] should_fail_ex+0x21f/0x230 [ 138.478447][ T6501] ? __hw_addr_add_ex+0x13d/0x350 [ 138.483496][ T6501] __should_failslab+0x92/0xa0 [ 138.488897][ T6501] should_failslab+0x9/0x20 [ 138.493523][ T6501] slab_pre_alloc_hook+0x38/0x180 [ 138.498568][ T6501] ? __hw_addr_add_ex+0x13d/0x350 [ 138.503737][ T6501] __kmem_cache_alloc_node+0x48/0x1d0 [ 138.509202][ T6501] ? __hw_addr_add_ex+0x13d/0x350 [ 138.514256][ T6501] kmalloc_trace+0x2a/0xa0 [ 138.518691][ T6501] __hw_addr_add_ex+0x13d/0x350 [ 138.523593][ T6501] dev_mc_add+0x63/0xa0 [ 138.527802][ T6501] garp_init_applicant+0xed/0x2c0 [ 138.532928][ T6501] vlan_gvrp_init_applicant+0x1c/0x20 [ 138.538358][ T6501] register_vlan_dev+0xf9/0x460 [ 138.543281][ T6501] vlan_newlink+0x317/0x350 [ 138.547777][ T6501] ? vlan_validate+0x420/0x420 [ 138.552552][ T6501] rtnl_newlink+0xe83/0x1600 [ 138.557231][ T6501] ? rtnl_newlink+0x5d/0x1600 [ 138.561948][ T6501] ? security_capable+0x5e/0x80 [ 138.566796][ T6501] ? ns_capable+0x7c/0xb0 [ 138.571120][ T6501] ? rtnl_setlink+0x300/0x300 [ 138.575869][ T6501] rtnetlink_rcv_msg+0x807/0x8c0 [ 138.581017][ T6501] ? slab_post_alloc_hook+0x8c/0x340 [ 138.586392][ T6501] ? kmem_cache_alloc+0x10f/0x220 [ 138.591431][ T6501] ? xas_load+0x37c/0x390 [ 138.595809][ T6501] ? skb_release_data+0x542/0x560 [ 138.600852][ T6501] ? kmem_cache_free+0x1db/0x3a0 [ 138.605858][ T6501] ? __kfree_skb+0x104/0x140 [ 138.610536][ T6501] ? nlmon_xmit+0x4b/0x60 [ 138.614866][ T6501] ? __kfree_skb+0x104/0x140 [ 138.619480][ T6501] ? consume_skb+0x57/0x180 [ 138.624069][ T6501] ? nlmon_xmit+0x4b/0x60 [ 138.628438][ T6501] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 138.633827][ T6501] ? ref_tracker_free+0x3a1/0x400 [ 138.638855][ T6501] ? __dev_queue_xmit+0xabb/0x1d10 [ 138.644010][ T6501] netlink_rcv_skb+0x126/0x220 [ 138.648776][ T6501] ? rtnetlink_bind+0x60/0x60 [ 138.653528][ T6501] rtnetlink_rcv+0x1c/0x20 [ 138.658023][ T6501] netlink_unicast+0x56f/0x640 [ 138.662895][ T6501] netlink_sendmsg+0x665/0x770 [ 138.667978][ T6501] ? netlink_getsockopt+0x3e0/0x3e0 [ 138.673287][ T6501] ____sys_sendmsg+0x37c/0x4d0 [ 138.678162][ T6501] __sys_sendmsg+0x1e9/0x270 [ 138.682768][ T6501] __x64_sys_sendmsg+0x46/0x50 [ 138.687813][ T6501] do_syscall_64+0x41/0xc0 [ 138.692338][ T6501] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 138.698367][ T6501] RIP: 0033:0x7fbb4510cae9 [ 138.702784][ T6501] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 138.722534][ T6501] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 138.730947][ T6501] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 138.739003][ T6501] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 138.746972][ T6501] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 138.755023][ T6501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:00:42 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x18) 01:00:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x7ffffff7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:42 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x0, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 16) [ 138.763186][ T6501] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 138.771219][ T6501] 01:00:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8dffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1008000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x97ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 138.868705][ T6516] loop1: detected capacity change from 0 to 2048 [ 138.889262][ T6520] FAULT_INJECTION: forcing a failure. [ 138.889262][ T6520] name failslab, interval 1, probability 0, space 0, times 0 [ 138.902010][ T6520] CPU: 0 PID: 6520 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 01:00:42 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x300) 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 138.912369][ T6520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 138.922610][ T6520] Call Trace: [ 138.926012][ T6520] [ 138.928947][ T6520] dump_stack_lvl+0xda/0x130 [ 138.933553][ T6520] dump_stack+0x15/0x20 [ 138.937723][ T6520] should_fail_ex+0x21f/0x230 [ 138.942413][ T6520] ? mrp_init_applicant+0x96/0x330 [ 138.947716][ T6520] __should_failslab+0x92/0xa0 [ 138.952550][ T6520] should_failslab+0x9/0x20 [ 138.957160][ T6520] slab_pre_alloc_hook+0x38/0x180 [ 138.962254][ T6520] ? mrp_init_applicant+0x96/0x330 [ 138.967386][ T6520] __kmem_cache_alloc_node+0x48/0x1d0 [ 138.972781][ T6520] ? mrp_init_applicant+0x96/0x330 [ 138.977954][ T6520] kmalloc_trace+0x2a/0xa0 [ 138.982415][ T6520] mrp_init_applicant+0x96/0x330 [ 138.987373][ T6520] vlan_mvrp_init_applicant+0x1c/0x20 [ 138.992757][ T6520] register_vlan_dev+0x116/0x460 [ 138.997790][ T6520] vlan_newlink+0x317/0x350 [ 139.002322][ T6520] ? vlan_validate+0x420/0x420 [ 139.007105][ T6520] rtnl_newlink+0xe83/0x1600 [ 139.011976][ T6520] ? rb_insert_color+0x263/0x290 [ 139.016981][ T6520] ? security_capable+0x5e/0x80 [ 139.021817][ T6520] ? ns_capable+0x7c/0xb0 [ 139.026138][ T6520] ? rtnl_setlink+0x300/0x300 [ 139.031194][ T6520] rtnetlink_rcv_msg+0x807/0x8c0 [ 139.036191][ T6520] ? slab_post_alloc_hook+0x8c/0x340 [ 139.041468][ T6520] ? kmem_cache_alloc+0x10f/0x220 [ 139.046511][ T6520] ? xas_load+0x37c/0x390 [ 139.050864][ T6520] ? skb_release_data+0x542/0x560 [ 139.055944][ T6520] ? kmem_cache_free+0x1db/0x3a0 [ 139.060926][ T6520] ? __kfree_skb+0x104/0x140 [ 139.065604][ T6520] ? nlmon_xmit+0x4b/0x60 [ 139.069919][ T6520] ? __kfree_skb+0x104/0x140 [ 139.074570][ T6520] ? consume_skb+0x57/0x180 [ 139.079181][ T6520] ? nlmon_xmit+0x4b/0x60 [ 139.083509][ T6520] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 139.088786][ T6520] ? ref_tracker_free+0x3a1/0x400 [ 139.093802][ T6520] ? __dev_queue_xmit+0xabb/0x1d10 [ 139.098902][ T6520] netlink_rcv_skb+0x126/0x220 [ 139.103698][ T6520] ? rtnetlink_bind+0x60/0x60 [ 139.108455][ T6520] rtnetlink_rcv+0x1c/0x20 [ 139.112893][ T6520] netlink_unicast+0x56f/0x640 [ 139.117676][ T6520] netlink_sendmsg+0x665/0x770 [ 139.122539][ T6520] ? netlink_getsockopt+0x3e0/0x3e0 [ 139.127742][ T6520] ____sys_sendmsg+0x37c/0x4d0 [ 139.132646][ T6520] __sys_sendmsg+0x1e9/0x270 [ 139.137229][ T6520] __x64_sys_sendmsg+0x46/0x50 [ 139.141982][ T6520] do_syscall_64+0x41/0xc0 [ 139.146395][ T6520] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.152343][ T6520] RIP: 0033:0x7fbb4510cae9 [ 139.156740][ T6520] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.176699][ T6520] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 139.185219][ T6520] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 139.193215][ T6520] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 139.201176][ T6520] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 139.209178][ T6520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:00:42 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x0, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb80b0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 17) 01:00:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3f00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xdc050000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 139.217223][ T6520] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 139.225196][ T6520] 01:00:42 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40), 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 139.270552][ T6539] FAULT_INJECTION: forcing a failure. [ 139.270552][ T6539] name failslab, interval 1, probability 0, space 0, times 0 [ 139.283305][ T6539] CPU: 0 PID: 6539 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 139.293653][ T6539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 139.303717][ T6539] Call Trace: [ 139.307091][ T6539] [ 139.310074][ T6539] dump_stack_lvl+0xda/0x130 [ 139.314692][ T6546] loop1: detected capacity change from 0 to 2048 [ 139.314775][ T6539] dump_stack+0x15/0x20 [ 139.325275][ T6539] should_fail_ex+0x21f/0x230 [ 139.329989][ T6539] ? __hw_addr_add_ex+0x13d/0x350 [ 139.335061][ T6539] __should_failslab+0x92/0xa0 [ 139.339887][ T6539] should_failslab+0x9/0x20 [ 139.344468][ T6539] slab_pre_alloc_hook+0x38/0x180 [ 139.349510][ T6539] ? __hw_addr_add_ex+0x13d/0x350 [ 139.354652][ T6539] __kmem_cache_alloc_node+0x48/0x1d0 [ 139.360036][ T6539] ? __hw_addr_add_ex+0x13d/0x350 [ 139.365111][ T6539] kmalloc_trace+0x2a/0xa0 [ 139.369638][ T6539] __hw_addr_add_ex+0x13d/0x350 [ 139.374497][ T6539] dev_mc_add+0x63/0xa0 [ 139.378683][ T6539] garp_init_applicant+0xed/0x2c0 [ 139.383801][ T6539] vlan_gvrp_init_applicant+0x1c/0x20 [ 139.389173][ T6539] register_vlan_dev+0xf9/0x460 [ 139.394085][ T6539] vlan_newlink+0x317/0x350 [ 139.398586][ T6539] ? vlan_validate+0x420/0x420 [ 139.403342][ T6539] rtnl_newlink+0xe83/0x1600 [ 139.408189][ T6539] ? rtnl_newlink+0x5d/0x1600 [ 139.412944][ T6539] ? security_capable+0x5e/0x80 [ 139.417846][ T6539] ? ns_capable+0x7c/0xb0 [ 139.422179][ T6539] ? rtnl_setlink+0x300/0x300 [ 139.426919][ T6539] rtnetlink_rcv_msg+0x807/0x8c0 [ 139.431938][ T6539] ? slab_post_alloc_hook+0x8c/0x340 [ 139.437446][ T6539] ? try_charge_memcg+0xb45/0xd20 [ 139.442487][ T6539] ? xas_load+0x37c/0x390 [ 139.446822][ T6539] ? skb_release_data+0x542/0x560 [ 139.451865][ T6539] ? kmem_cache_free+0x1db/0x3a0 [ 139.456815][ T6539] ? __kfree_skb+0x104/0x140 [ 139.461427][ T6539] ? nlmon_xmit+0x4b/0x60 [ 139.465797][ T6539] ? __kfree_skb+0x104/0x140 [ 139.470388][ T6539] ? consume_skb+0x57/0x180 [ 139.475117][ T6539] ? nlmon_xmit+0x4b/0x60 [ 139.479475][ T6539] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 139.484755][ T6539] ? ref_tracker_free+0x3a1/0x400 [ 139.489786][ T6539] ? __dev_queue_xmit+0xabb/0x1d10 [ 139.495081][ T6539] netlink_rcv_skb+0x126/0x220 [ 139.500117][ T6539] ? rtnetlink_bind+0x60/0x60 [ 139.504808][ T6539] rtnetlink_rcv+0x1c/0x20 [ 139.509299][ T6539] netlink_unicast+0x56f/0x640 [ 139.514208][ T6539] netlink_sendmsg+0x665/0x770 [ 139.518996][ T6539] ? netlink_getsockopt+0x3e0/0x3e0 [ 139.524386][ T6539] ____sys_sendmsg+0x37c/0x4d0 [ 139.529168][ T6539] __sys_sendmsg+0x1e9/0x270 [ 139.533942][ T6539] __x64_sys_sendmsg+0x46/0x50 [ 139.538719][ T6539] do_syscall_64+0x41/0xc0 [ 139.543304][ T6539] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.549360][ T6539] RIP: 0033:0x7fbb4510cae9 [ 139.553761][ T6539] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.573600][ T6539] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 139.582363][ T6539] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 139.591673][ T6539] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 139.599649][ T6539] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 139.607629][ T6539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:00:43 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x1800) 01:00:43 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40), 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 18) [ 139.615648][ T6539] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 139.623619][ T6539] [ 139.691161][ T6561] FAULT_INJECTION: forcing a failure. [ 139.691161][ T6561] name failslab, interval 1, probability 0, space 0, times 0 [ 139.701991][ T6564] loop1: detected capacity change from 0 to 2048 [ 139.703851][ T6561] CPU: 1 PID: 6561 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 139.720511][ T6561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 139.730647][ T6561] Call Trace: [ 139.733931][ T6561] [ 139.736850][ T6561] dump_stack_lvl+0xda/0x130 [ 139.741479][ T6561] dump_stack+0x15/0x20 [ 139.745699][ T6561] should_fail_ex+0x21f/0x230 [ 139.750370][ T6561] ? register_vlan_dev+0x1fa/0x460 [ 139.755576][ T6561] __should_failslab+0x92/0xa0 [ 139.760337][ T6561] should_failslab+0x9/0x20 [ 139.764882][ T6561] slab_pre_alloc_hook+0x38/0x180 [ 139.769908][ T6561] ? register_vlan_dev+0x1fa/0x460 [ 139.775083][ T6561] __kmem_cache_alloc_node+0x48/0x1d0 [ 139.780458][ T6561] ? register_vlan_dev+0x1fa/0x460 [ 139.785571][ T6561] kmalloc_trace+0x2a/0xa0 [ 139.790007][ T6561] register_vlan_dev+0x1fa/0x460 [ 139.795039][ T6561] vlan_newlink+0x317/0x350 [ 139.799546][ T6561] ? vlan_validate+0x420/0x420 [ 139.804482][ T6561] rtnl_newlink+0xe83/0x1600 [ 139.809112][ T6561] ? rtnl_newlink+0x5d/0x1600 [ 139.813982][ T6561] ? security_capable+0x5e/0x80 [ 139.818840][ T6561] ? ns_capable+0x7c/0xb0 [ 139.823269][ T6561] ? rtnl_setlink+0x300/0x300 [ 139.827961][ T6561] rtnetlink_rcv_msg+0x807/0x8c0 [ 139.832913][ T6561] ? __rcu_read_unlock+0x4d/0x70 [ 139.837884][ T6561] ? slab_post_alloc_hook+0x8c/0x340 [ 139.843622][ T6561] ? kmem_cache_alloc+0x10f/0x220 [ 139.848674][ T6561] ? xas_load+0x37c/0x390 [ 139.853045][ T6561] ? skb_release_data+0x542/0x560 [ 139.858094][ T6561] ? kmem_cache_free+0x1db/0x3a0 [ 139.863489][ T6561] ? __kfree_skb+0x104/0x140 [ 139.868135][ T6561] ? nlmon_xmit+0x4b/0x60 [ 139.872460][ T6561] ? __kfree_skb+0x104/0x140 [ 139.877066][ T6561] ? consume_skb+0x57/0x180 [ 139.881635][ T6561] ? nlmon_xmit+0x4b/0x60 [ 139.886114][ T6561] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 139.891409][ T6561] ? ref_tracker_free+0x3a1/0x400 [ 139.896503][ T6561] ? __dev_queue_xmit+0xabb/0x1d10 [ 139.901945][ T6561] netlink_rcv_skb+0x126/0x220 [ 139.906717][ T6561] ? rtnetlink_bind+0x60/0x60 [ 139.911584][ T6561] rtnetlink_rcv+0x1c/0x20 [ 139.916035][ T6561] netlink_unicast+0x56f/0x640 [ 139.921166][ T6561] netlink_sendmsg+0x665/0x770 [ 139.926011][ T6561] ? netlink_getsockopt+0x3e0/0x3e0 [ 139.931272][ T6561] ____sys_sendmsg+0x37c/0x4d0 [ 139.936054][ T6561] __sys_sendmsg+0x1e9/0x270 [ 139.940689][ T6561] __x64_sys_sendmsg+0x46/0x50 [ 139.945719][ T6561] do_syscall_64+0x41/0xc0 [ 139.950135][ T6561] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.956187][ T6561] RIP: 0033:0x7fbb4510cae9 [ 139.960602][ T6561] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.980264][ T6561] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:00:43 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x0, 0xff) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf5ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:43 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40), 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 19) [ 139.988935][ T6561] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 139.996981][ T6561] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 140.005029][ T6561] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 140.013178][ T6561] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.021191][ T6561] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 140.029227][ T6561] 01:00:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x47ee000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf7ffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:43 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:43 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x3f00) 01:00:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8dffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.099404][ T6575] FAULT_INJECTION: forcing a failure. [ 140.099404][ T6575] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 140.112780][ T6575] CPU: 0 PID: 6575 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 140.123251][ T6575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 140.133313][ T6575] Call Trace: [ 140.136596][ T6575] [ 140.139536][ T6575] dump_stack_lvl+0xda/0x130 [ 140.144149][ T6575] dump_stack+0x15/0x20 01:00:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfe800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.148318][ T6575] should_fail_ex+0x21f/0x230 [ 140.153193][ T6575] __should_fail_alloc_page+0xfd/0x110 [ 140.158791][ T6575] __alloc_pages+0x108/0x340 [ 140.163464][ T6575] alloc_pages+0x3e1/0x4e0 [ 140.166850][ T6583] loop1: detected capacity change from 0 to 2048 [ 140.167893][ T6575] get_zeroed_page+0x17/0x40 [ 140.178826][ T6575] dev_alloc_name_ns+0x2da/0x600 [ 140.183814][ T6575] ? mod_objcg_state+0x1ef/0x2c0 [ 140.188831][ T6575] dev_get_valid_name+0x120/0x1f0 [ 140.193884][ T6575] register_netdevice+0x144/0xcd0 01:00:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.198952][ T6575] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 140.204610][ T6575] register_vlan_dev+0x21e/0x460 [ 140.209646][ T6575] vlan_newlink+0x317/0x350 [ 140.214166][ T6575] ? vlan_validate+0x420/0x420 [ 140.219003][ T6575] rtnl_newlink+0xe83/0x1600 [ 140.223617][ T6575] ? rtnl_newlink+0x5d/0x1600 [ 140.228540][ T6575] ? security_capable+0x5e/0x80 [ 140.233406][ T6575] ? ns_capable+0x7c/0xb0 [ 140.237853][ T6575] ? rtnl_setlink+0x300/0x300 [ 140.242555][ T6575] rtnetlink_rcv_msg+0x807/0x8c0 [ 140.247685][ T6575] ? slab_post_alloc_hook+0x8c/0x340 [ 140.253071][ T6575] ? kmem_cache_alloc+0x10f/0x220 [ 140.258591][ T6575] ? xas_load+0x37c/0x390 [ 140.262930][ T6575] ? skb_release_data+0x542/0x560 [ 140.268019][ T6575] ? kmem_cache_free+0x1db/0x3a0 [ 140.273125][ T6575] ? __kfree_skb+0x104/0x140 [ 140.277785][ T6575] ? nlmon_xmit+0x4b/0x60 [ 140.282152][ T6575] ? __kfree_skb+0x104/0x140 [ 140.286768][ T6575] ? consume_skb+0x57/0x180 [ 140.291416][ T6575] ? nlmon_xmit+0x4b/0x60 [ 140.295904][ T6575] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 140.301198][ T6575] ? ref_tracker_free+0x3a1/0x400 [ 140.306222][ T6575] ? __dev_queue_xmit+0xabb/0x1d10 [ 140.311339][ T6575] netlink_rcv_skb+0x126/0x220 [ 140.316093][ T6575] ? rtnetlink_bind+0x60/0x60 [ 140.320801][ T6575] rtnetlink_rcv+0x1c/0x20 [ 140.325271][ T6575] netlink_unicast+0x56f/0x640 [ 140.330020][ T6575] netlink_sendmsg+0x665/0x770 [ 140.334838][ T6575] ? netlink_getsockopt+0x3e0/0x3e0 [ 140.340023][ T6575] ____sys_sendmsg+0x37c/0x4d0 [ 140.344789][ T6575] __sys_sendmsg+0x1e9/0x270 [ 140.349387][ T6575] __x64_sys_sendmsg+0x46/0x50 [ 140.354253][ T6575] do_syscall_64+0x41/0xc0 [ 140.358690][ T6575] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 140.364591][ T6575] RIP: 0033:0x7fbb4510cae9 [ 140.369174][ T6575] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 140.388762][ T6575] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.397185][ T6575] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 140.405189][ T6575] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 140.413261][ T6575] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 140.421432][ T6575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.429471][ T6575] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 140.437570][ T6575] 01:00:44 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:44 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x10040) 01:00:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x97ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 20) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa8aaaafffeaaaaaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff8d}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.458083][ T6575] syz-executor.2 (6575) used greatest stack depth: 10328 bytes left 01:00:44 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xaa00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xaaaaaafeffaaaaa8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.545223][ T6605] loop1: detected capacity change from 0 to 2048 [ 140.563441][ T6613] FAULT_INJECTION: forcing a failure. [ 140.563441][ T6613] name failslab, interval 1, probability 0, space 0, times 0 [ 140.576279][ T6613] CPU: 0 PID: 6613 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 140.587235][ T6613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 140.597373][ T6613] Call Trace: [ 140.600658][ T6613] [ 140.603598][ T6613] dump_stack_lvl+0xda/0x130 [ 140.608289][ T6613] dump_stack+0x15/0x20 [ 140.612538][ T6613] should_fail_ex+0x21f/0x230 [ 140.617292][ T6613] ? register_netdevice+0x179/0xcd0 [ 140.622499][ T6613] __should_failslab+0x92/0xa0 [ 140.627337][ T6613] should_failslab+0x9/0x20 [ 140.631909][ T6613] slab_pre_alloc_hook+0x38/0x180 [ 140.636943][ T6613] ? register_netdevice+0x179/0xcd0 [ 140.642149][ T6613] __kmem_cache_alloc_node+0x48/0x1d0 [ 140.647597][ T6613] ? register_netdevice+0x179/0xcd0 [ 140.652818][ T6613] kmalloc_trace+0x2a/0xa0 [ 140.657303][ T6613] register_netdevice+0x179/0xcd0 [ 140.662403][ T6613] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 140.668108][ T6613] register_vlan_dev+0x21e/0x460 [ 140.673101][ T6613] vlan_newlink+0x317/0x350 [ 140.677699][ T6613] ? vlan_validate+0x420/0x420 [ 140.682487][ T6613] rtnl_newlink+0xe83/0x1600 [ 140.687130][ T6613] ? rb_insert_color+0x6a/0x290 [ 140.692010][ T6613] ? security_capable+0x5e/0x80 [ 140.696907][ T6613] ? ns_capable+0x7c/0xb0 [ 140.701371][ T6613] ? rtnl_setlink+0x300/0x300 [ 140.706121][ T6613] rtnetlink_rcv_msg+0x807/0x8c0 [ 140.711058][ T6613] ? slab_post_alloc_hook+0x8c/0x340 [ 140.716382][ T6613] ? kmem_cache_alloc+0x10f/0x220 [ 140.721478][ T6613] ? xas_load+0x37c/0x390 [ 140.725811][ T6613] ? skb_release_data+0x542/0x560 [ 140.730972][ T6613] ? kmem_cache_free+0x1db/0x3a0 [ 140.735909][ T6613] ? __kfree_skb+0x104/0x140 [ 140.740500][ T6613] ? nlmon_xmit+0x4b/0x60 [ 140.744832][ T6613] ? __kfree_skb+0x104/0x140 [ 140.749471][ T6613] ? consume_skb+0x57/0x180 [ 140.753979][ T6613] ? nlmon_xmit+0x4b/0x60 [ 140.758695][ T6613] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 140.764072][ T6613] ? ref_tracker_free+0x3a1/0x400 [ 140.769171][ T6613] ? __dev_queue_xmit+0xabb/0x1d10 [ 140.774280][ T6613] netlink_rcv_skb+0x126/0x220 [ 140.779067][ T6613] ? rtnetlink_bind+0x60/0x60 [ 140.783834][ T6613] rtnetlink_rcv+0x1c/0x20 [ 140.788285][ T6613] netlink_unicast+0x56f/0x640 [ 140.793144][ T6613] netlink_sendmsg+0x665/0x770 [ 140.797921][ T6613] ? netlink_getsockopt+0x3e0/0x3e0 [ 140.803188][ T6613] ____sys_sendmsg+0x37c/0x4d0 [ 140.808019][ T6613] __sys_sendmsg+0x1e9/0x270 [ 140.812653][ T6613] __x64_sys_sendmsg+0x46/0x50 [ 140.817474][ T6613] do_syscall_64+0x41/0xc0 [ 140.822013][ T6613] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 140.828010][ T6613] RIP: 0033:0x7fbb4510cae9 [ 140.832512][ T6613] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 140.852146][ T6613] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.861154][ T6613] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 140.869141][ T6613] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 140.877150][ T6613] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 140.885480][ T6613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:00:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff97}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:44 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x80040) 01:00:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 21) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb80b000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfffffff5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.893492][ T6613] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 140.901458][ T6613] 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xdc05000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:44 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:44 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf5ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 140.971776][ T6637] __nla_validate_parse: 14 callbacks suppressed [ 140.971791][ T6637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.004865][ T6637] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.042440][ T6637] FAULT_INJECTION: forcing a failure. [ 141.042440][ T6637] name failslab, interval 1, probability 0, space 0, times 0 [ 141.055555][ T6637] CPU: 1 PID: 6637 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 141.065924][ T6637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 141.076187][ T6637] Call Trace: [ 141.079476][ T6637] [ 141.082409][ T6637] dump_stack_lvl+0xda/0x130 [ 141.087222][ T6637] dump_stack+0x15/0x20 [ 141.091387][ T6637] should_fail_ex+0x21f/0x230 [ 141.095464][ T6657] loop1: detected capacity change from 0 to 2048 [ 141.096147][ T6637] ? register_netdevice+0x179/0xcd0 [ 141.107691][ T6637] __should_failslab+0x92/0xa0 [ 141.112460][ T6637] should_failslab+0x9/0x20 [ 141.117053][ T6637] slab_pre_alloc_hook+0x38/0x180 [ 141.122081][ T6637] ? register_netdevice+0x179/0xcd0 [ 141.127284][ T6637] __kmem_cache_alloc_node+0x48/0x1d0 [ 141.132661][ T6637] ? register_netdevice+0x179/0xcd0 [ 141.137941][ T6637] kmalloc_trace+0x2a/0xa0 [ 141.142494][ T6637] register_netdevice+0x179/0xcd0 [ 141.147542][ T6637] ? __kmem_cache_alloc_node+0x121/0x1d0 [ 141.153182][ T6637] register_vlan_dev+0x21e/0x460 [ 141.158507][ T6637] vlan_newlink+0x317/0x350 [ 141.163001][ T6637] ? vlan_validate+0x420/0x420 [ 141.167772][ T6637] rtnl_newlink+0xe83/0x1600 [ 141.172624][ T6637] ? rb_insert_color+0x6a/0x290 [ 141.177471][ T6637] ? security_capable+0x5e/0x80 [ 141.182490][ T6637] ? ns_capable+0x7c/0xb0 [ 141.186826][ T6637] ? rtnl_setlink+0x300/0x300 [ 141.191685][ T6637] rtnetlink_rcv_msg+0x807/0x8c0 [ 141.196633][ T6637] ? __rcu_read_unlock+0x4d/0x70 [ 141.201601][ T6637] ? slab_post_alloc_hook+0x8c/0x340 [ 141.206894][ T6637] ? kmem_cache_alloc+0x10f/0x220 [ 141.211971][ T6637] ? xas_load+0x37c/0x390 [ 141.216455][ T6637] ? skb_release_data+0x542/0x560 [ 141.221488][ T6637] ? kmem_cache_free+0x1db/0x3a0 [ 141.226594][ T6637] ? __kfree_skb+0x104/0x140 [ 141.231204][ T6637] ? nlmon_xmit+0x4b/0x60 [ 141.235535][ T6637] ? __kfree_skb+0x104/0x140 [ 141.240220][ T6637] ? consume_skb+0x57/0x180 [ 141.244743][ T6637] ? nlmon_xmit+0x4b/0x60 [ 141.249269][ T6637] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 141.254559][ T6637] ? ref_tracker_free+0x3a1/0x400 [ 141.259596][ T6637] ? __dev_queue_xmit+0xabb/0x1d10 [ 141.264759][ T6637] netlink_rcv_skb+0x126/0x220 [ 141.269693][ T6637] ? rtnetlink_bind+0x60/0x60 [ 141.274401][ T6637] rtnetlink_rcv+0x1c/0x20 [ 141.279057][ T6637] netlink_unicast+0x56f/0x640 [ 141.283827][ T6637] netlink_sendmsg+0x665/0x770 [ 141.288938][ T6637] ? netlink_getsockopt+0x3e0/0x3e0 [ 141.294314][ T6637] ____sys_sendmsg+0x37c/0x4d0 [ 141.299104][ T6637] __sys_sendmsg+0x1e9/0x270 [ 141.304373][ T6637] __x64_sys_sendmsg+0x46/0x50 [ 141.309295][ T6637] do_syscall_64+0x41/0xc0 [ 141.313820][ T6637] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 141.319726][ T6637] RIP: 0033:0x7fbb4510cae9 [ 141.324241][ T6637] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 141.344050][ T6637] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.352787][ T6637] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 141.360888][ T6637] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 141.368896][ T6637] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 141.376914][ T6637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.385111][ T6637] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x10000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x1000000) 01:00:45 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf7ffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 22) [ 141.393125][ T6637] 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfe80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 141.459689][ T6670] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.468439][ T6666] loop1: detected capacity change from 0 to 2048 01:00:45 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x2000000) 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 141.509020][ T6670] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 141.555880][ T6670] FAULT_INJECTION: forcing a failure. [ 141.555880][ T6670] name failslab, interval 1, probability 0, space 0, times 0 [ 141.568575][ T6670] CPU: 0 PID: 6670 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 141.580113][ T6670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 141.590280][ T6670] Call Trace: [ 141.593611][ T6670] [ 141.596542][ T6670] dump_stack_lvl+0xda/0x130 [ 141.601150][ T6670] dump_stack+0x15/0x20 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x200000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 141.605340][ T6670] should_fail_ex+0x21f/0x230 [ 141.605828][ T6688] loop1: detected capacity change from 0 to 2048 [ 141.610011][ T6670] ? device_add+0x8c/0xab0 [ 141.620785][ T6670] __should_failslab+0x92/0xa0 [ 141.625560][ T6670] should_failslab+0x9/0x20 [ 141.630078][ T6670] slab_pre_alloc_hook+0x38/0x180 [ 141.635262][ T6670] ? device_add+0x8c/0xab0 [ 141.639684][ T6670] __kmem_cache_alloc_node+0x48/0x1d0 [ 141.645106][ T6670] ? device_add+0x8c/0xab0 [ 141.649539][ T6670] kmalloc_trace+0x2a/0xa0 [ 141.653976][ T6670] device_add+0x8c/0xab0 [ 141.658265][ T6670] netdev_register_kobject+0xfc/0x230 [ 141.663755][ T6670] register_netdevice+0x903/0xcd0 [ 141.668803][ T6670] register_vlan_dev+0x21e/0x460 [ 141.673836][ T6670] vlan_newlink+0x317/0x350 [ 141.678355][ T6670] ? vlan_validate+0x420/0x420 [ 141.683115][ T6670] rtnl_newlink+0xe83/0x1600 [ 141.687710][ T6670] ? rb_insert_color+0x6a/0x290 [ 141.692543][ T6670] ? security_capable+0x5e/0x80 [ 141.697425][ T6670] ? ns_capable+0x7c/0xb0 [ 141.701733][ T6670] ? rtnl_setlink+0x300/0x300 [ 141.706413][ T6670] rtnetlink_rcv_msg+0x807/0x8c0 [ 141.711338][ T6670] ? slab_post_alloc_hook+0x8c/0x340 [ 141.716872][ T6670] ? kmem_cache_alloc+0x10f/0x220 [ 141.721974][ T6670] ? xas_load+0x37c/0x390 [ 141.726341][ T6670] ? skb_release_data+0x542/0x560 [ 141.731623][ T6670] ? kmem_cache_free+0x1db/0x3a0 [ 141.736638][ T6670] ? __kfree_skb+0x104/0x140 [ 141.741215][ T6670] ? nlmon_xmit+0x4b/0x60 [ 141.745554][ T6670] ? __kfree_skb+0x104/0x140 [ 141.750182][ T6670] ? consume_skb+0x57/0x180 [ 141.754736][ T6670] ? nlmon_xmit+0x4b/0x60 [ 141.759059][ T6670] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 141.764598][ T6670] ? ref_tracker_free+0x3a1/0x400 [ 141.769621][ T6670] ? __dev_queue_xmit+0xabb/0x1d10 [ 141.774841][ T6670] netlink_rcv_skb+0x126/0x220 [ 141.779685][ T6670] ? rtnetlink_bind+0x60/0x60 [ 141.784351][ T6670] rtnetlink_rcv+0x1c/0x20 [ 141.788769][ T6670] netlink_unicast+0x56f/0x640 [ 141.793588][ T6670] netlink_sendmsg+0x665/0x770 [ 141.798354][ T6670] ? netlink_getsockopt+0x3e0/0x3e0 [ 141.803539][ T6670] ____sys_sendmsg+0x37c/0x4d0 [ 141.808322][ T6670] __sys_sendmsg+0x1e9/0x270 [ 141.812902][ T6670] __x64_sys_sendmsg+0x46/0x50 [ 141.817725][ T6670] do_syscall_64+0x41/0xc0 [ 141.822148][ T6670] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 141.828158][ T6670] RIP: 0033:0x7fbb4510cae9 [ 141.832570][ T6670] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 01:00:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 23) 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x300000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x3000000) 01:00:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 141.852180][ T6670] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 141.860665][ T6670] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 141.868623][ T6670] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 141.876614][ T6670] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 141.884577][ T6670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.892537][ T6670] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 141.900577][ T6670] 01:00:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:45 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 141.930256][ T6701] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.951726][ T6701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 141.972410][ T6703] loop1: detected capacity change from 0 to 2048 [ 141.977958][ T6701] FAULT_INJECTION: forcing a failure. [ 141.977958][ T6701] name failslab, interval 1, probability 0, space 0, times 0 [ 141.991556][ T6701] CPU: 0 PID: 6701 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 142.001890][ T6701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 142.011951][ T6701] Call Trace: [ 142.015309][ T6701] [ 142.018235][ T6701] dump_stack_lvl+0xda/0x130 [ 142.022870][ T6701] dump_stack+0x15/0x20 [ 142.027073][ T6701] should_fail_ex+0x21f/0x230 [ 142.031761][ T6701] ? kstrdup_const+0x3e/0x50 [ 142.036338][ T6701] __should_failslab+0x92/0xa0 [ 142.041310][ T6701] should_failslab+0x9/0x20 [ 142.045893][ T6701] slab_pre_alloc_hook+0x38/0x180 [ 142.051005][ T6701] ? kstrdup_const+0x3e/0x50 [ 142.055603][ T6701] __kmem_cache_alloc_node+0x48/0x1d0 [ 142.061032][ T6701] ? kstrdup_const+0x3e/0x50 [ 142.065702][ T6701] __kmalloc_node_track_caller+0x96/0x1a0 [ 142.071517][ T6701] kstrdup+0x3a/0x70 [ 142.075406][ T6701] kstrdup_const+0x3e/0x50 [ 142.079834][ T6701] __kernfs_new_node+0x41/0x380 [ 142.084748][ T6701] ? make_kgid+0x115/0x310 [ 142.089152][ T6701] ? xfd_validate_state+0x46/0xf0 [ 142.094198][ T6701] ? net_ns_get_ownership+0xae/0xd0 [ 142.099509][ T6701] ? net_namespace+0x20/0x20 [ 142.104163][ T6701] kernfs_create_dir_ns+0x62/0x150 [ 142.109263][ T6701] sysfs_create_dir_ns+0xd7/0x1d0 [ 142.114366][ T6701] kobject_add_internal+0x47b/0x780 [ 142.119580][ T6701] kobject_add+0xdc/0x150 [ 142.123919][ T6701] ? kobject_get+0x95/0xc0 [ 142.128366][ T6701] ? kobject_put+0xfd/0x170 [ 142.132882][ T6701] ? device_add+0x2f1/0xab0 [ 142.137389][ T6701] device_add+0x2ff/0xab0 [ 142.141710][ T6701] netdev_register_kobject+0xfc/0x230 [ 142.147245][ T6701] register_netdevice+0x903/0xcd0 [ 142.152332][ T6701] register_vlan_dev+0x21e/0x460 [ 142.157299][ T6701] vlan_newlink+0x317/0x350 [ 142.161785][ T6701] ? vlan_validate+0x420/0x420 [ 142.166601][ T6701] rtnl_newlink+0xe83/0x1600 [ 142.171217][ T6701] ? rb_insert_color+0x280/0x290 [ 142.176186][ T6701] ? __mutex_lock+0x54/0x8d0 [ 142.180763][ T6701] ? rtnl_setlink+0x300/0x300 [ 142.185506][ T6701] rtnetlink_rcv_msg+0x807/0x8c0 [ 142.190460][ T6701] ? slab_post_alloc_hook+0x8c/0x340 [ 142.195747][ T6701] ? kmem_cache_alloc+0x10f/0x220 [ 142.200851][ T6701] ? xas_load+0x37c/0x390 [ 142.205330][ T6701] ? skb_release_data+0x542/0x560 [ 142.210389][ T6701] ? kmem_cache_free+0x1db/0x3a0 [ 142.215376][ T6701] ? __kfree_skb+0x104/0x140 [ 142.219967][ T6701] ? nlmon_xmit+0x4b/0x60 [ 142.224293][ T6701] ? __kfree_skb+0x104/0x140 [ 142.228955][ T6701] ? consume_skb+0x57/0x180 [ 142.233512][ T6701] ? nlmon_xmit+0x4b/0x60 [ 142.237905][ T6701] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 142.243244][ T6701] ? ref_tracker_free+0x3a1/0x400 [ 142.248375][ T6701] ? __dev_queue_xmit+0xabb/0x1d10 [ 142.253606][ T6701] netlink_rcv_skb+0x126/0x220 [ 142.258360][ T6701] ? rtnetlink_bind+0x60/0x60 [ 142.263122][ T6701] rtnetlink_rcv+0x1c/0x20 [ 142.267527][ T6701] netlink_unicast+0x56f/0x640 [ 142.272396][ T6701] netlink_sendmsg+0x665/0x770 [ 142.277189][ T6701] ? netlink_getsockopt+0x3e0/0x3e0 [ 142.282469][ T6701] ____sys_sendmsg+0x37c/0x4d0 [ 142.287235][ T6701] __sys_sendmsg+0x1e9/0x270 [ 142.291832][ T6701] __x64_sys_sendmsg+0x46/0x50 [ 142.296591][ T6701] do_syscall_64+0x41/0xc0 [ 142.300997][ T6701] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 142.306885][ T6701] RIP: 0033:0x7fbb4510cae9 [ 142.311291][ T6701] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 01:00:46 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x500000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x4000000) [ 142.330949][ T6701] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 142.339436][ T6701] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 142.347395][ T6701] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 142.355526][ T6701] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 142.363551][ T6701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.371555][ T6701] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 142.379534][ T6701] 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x600000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 24) 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x700000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 142.382918][ T6701] kobject: kobject_add_internal failed for vlan8 (error: -12 parent: net) [ 142.415492][ T6701] syz-executor.2 (6701) used greatest stack depth: 9768 bytes left 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x800000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 142.473194][ T6722] loop1: detected capacity change from 0 to 2048 [ 142.487333][ T6733] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 142.508256][ T6733] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 142.542433][ T6733] FAULT_INJECTION: forcing a failure. [ 142.542433][ T6733] name failslab, interval 1, probability 0, space 0, times 0 [ 142.555373][ T6733] CPU: 1 PID: 6733 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 142.566013][ T6733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 142.576077][ T6733] Call Trace: [ 142.579624][ T6733] [ 142.582601][ T6733] dump_stack_lvl+0xda/0x130 [ 142.587228][ T6733] dump_stack+0x15/0x20 [ 142.591407][ T6733] should_fail_ex+0x21f/0x230 [ 142.596073][ T6733] __should_failslab+0x92/0xa0 [ 142.600850][ T6733] should_failslab+0x9/0x20 [ 142.605507][ T6733] slab_pre_alloc_hook+0x38/0x180 [ 142.610607][ T6733] kmem_cache_alloc+0x52/0x220 [ 142.615374][ T6733] ? __kernfs_new_node+0x6a/0x380 [ 142.620402][ T6733] __kernfs_new_node+0x6a/0x380 [ 142.625302][ T6733] ? make_kgid+0x115/0x310 [ 142.629785][ T6733] ? net_ns_get_ownership+0xae/0xd0 [ 142.635050][ T6733] ? net_namespace+0x20/0x20 [ 142.639628][ T6733] kernfs_create_dir_ns+0x62/0x150 [ 142.644741][ T6733] sysfs_create_dir_ns+0xd7/0x1d0 [ 142.649758][ T6733] kobject_add_internal+0x47b/0x780 [ 142.654941][ T6733] kobject_add+0xdc/0x150 [ 142.659298][ T6733] ? kobject_get+0x95/0xc0 [ 142.663771][ T6733] ? kobject_put+0xfd/0x170 [ 142.668255][ T6733] ? device_add+0x2f1/0xab0 [ 142.672745][ T6733] device_add+0x2ff/0xab0 [ 142.677067][ T6733] netdev_register_kobject+0xfc/0x230 [ 142.682430][ T6733] register_netdevice+0x903/0xcd0 [ 142.687468][ T6733] register_vlan_dev+0x21e/0x460 [ 142.692653][ T6733] vlan_newlink+0x317/0x350 [ 142.697144][ T6733] ? vlan_validate+0x420/0x420 [ 142.701891][ T6733] rtnl_newlink+0xe83/0x1600 [ 142.706715][ T6733] ? rtnl_newlink+0x5d/0x1600 [ 142.711436][ T6733] ? security_capable+0x5e/0x80 [ 142.716407][ T6733] ? ns_capable+0x7c/0xb0 [ 142.720742][ T6733] ? rtnl_setlink+0x300/0x300 [ 142.725423][ T6733] rtnetlink_rcv_msg+0x807/0x8c0 [ 142.730431][ T6733] ? __rcu_read_unlock+0x4d/0x70 [ 142.735418][ T6733] ? slab_post_alloc_hook+0x8c/0x340 [ 142.740695][ T6733] ? kmem_cache_alloc+0x10f/0x220 [ 142.745742][ T6733] ? xas_load+0x37c/0x390 [ 142.750225][ T6733] ? skb_release_data+0x542/0x560 [ 142.755236][ T6733] ? kmem_cache_free+0x1db/0x3a0 [ 142.760164][ T6733] ? __kfree_skb+0x104/0x140 [ 142.764758][ T6733] ? nlmon_xmit+0x4b/0x60 [ 142.769075][ T6733] ? __kfree_skb+0x104/0x140 [ 142.773658][ T6733] ? consume_skb+0x57/0x180 [ 142.778183][ T6733] ? nlmon_xmit+0x4b/0x60 [ 142.782564][ T6733] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 142.787839][ T6733] ? ref_tracker_free+0x3a1/0x400 [ 142.792940][ T6733] ? __dev_queue_xmit+0xabb/0x1d10 [ 142.798036][ T6733] netlink_rcv_skb+0x126/0x220 [ 142.802806][ T6733] ? rtnetlink_bind+0x60/0x60 [ 142.807499][ T6733] rtnetlink_rcv+0x1c/0x20 [ 142.811969][ T6733] netlink_unicast+0x56f/0x640 [ 142.816785][ T6733] netlink_sendmsg+0x665/0x770 [ 142.821589][ T6733] ? netlink_getsockopt+0x3e0/0x3e0 [ 142.826846][ T6733] ____sys_sendmsg+0x37c/0x4d0 [ 142.831698][ T6733] __sys_sendmsg+0x1e9/0x270 [ 142.836376][ T6733] __x64_sys_sendmsg+0x46/0x50 [ 142.841142][ T6733] do_syscall_64+0x41/0xc0 [ 142.845560][ T6733] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 142.851504][ T6733] RIP: 0033:0x7fbb4510cae9 [ 142.855937][ T6733] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 142.875958][ T6733] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 142.884451][ T6733] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 142.892432][ T6733] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 142.900407][ T6733] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 142.908460][ T6733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.916486][ T6733] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 142.924469][ T6733] [ 142.927806][ T6733] kobject: kobject_add_internal failed for vlan8 (error: -12 parent: net) 01:00:46 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r4 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:46 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x18000000) 01:00:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x900000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 25) 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 143.250267][ T6743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 143.272374][ T6743] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 143.285335][ T6745] loop1: detected capacity change from 0 to 2048 [ 143.299289][ T6743] FAULT_INJECTION: forcing a failure. [ 143.299289][ T6743] name failslab, interval 1, probability 0, space 0, times 0 [ 143.311988][ T6743] CPU: 1 PID: 6743 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 143.322454][ T6743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 143.332918][ T6743] Call Trace: [ 143.336206][ T6743] [ 143.339150][ T6743] dump_stack_lvl+0xda/0x130 [ 143.343813][ T6743] dump_stack+0x15/0x20 01:00:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x9}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 143.347998][ T6743] should_fail_ex+0x21f/0x230 [ 143.352694][ T6743] __should_failslab+0x92/0xa0 [ 143.357571][ T6743] should_failslab+0x9/0x20 [ 143.362146][ T6743] slab_pre_alloc_hook+0x38/0x180 [ 143.367201][ T6743] kmem_cache_alloc+0x52/0x220 [ 143.372035][ T6743] ? __kernfs_new_node+0x6a/0x380 [ 143.377150][ T6743] __kernfs_new_node+0x6a/0x380 [ 143.382065][ T6743] ? kernfs_add_one+0x330/0x390 [ 143.386998][ T6743] kernfs_new_node+0x5f/0xd0 [ 143.391612][ T6743] __kernfs_create_file+0x49/0x180 [ 143.396823][ T6743] ? dev_attr_show+0x90/0x90 [ 143.401443][ T6743] sysfs_add_file_mode_ns+0x136/0x1b0 [ 143.406896][ T6743] sysfs_create_file_ns+0xd0/0x110 [ 143.412047][ T6743] device_add+0x418/0xab0 [ 143.416412][ T6743] netdev_register_kobject+0xfc/0x230 [ 143.421812][ T6743] register_netdevice+0x903/0xcd0 [ 143.426894][ T6743] register_vlan_dev+0x21e/0x460 [ 143.431837][ T6743] vlan_newlink+0x317/0x350 [ 143.436332][ T6743] ? vlan_validate+0x420/0x420 [ 143.441145][ T6743] rtnl_newlink+0xe83/0x1600 [ 143.445734][ T6743] ? rb_insert_color+0x6a/0x290 [ 143.450594][ T6743] ? security_capable+0x5e/0x80 [ 143.455456][ T6743] ? ns_capable+0x7c/0xb0 [ 143.459800][ T6743] ? rtnl_setlink+0x300/0x300 [ 143.464485][ T6743] rtnetlink_rcv_msg+0x807/0x8c0 [ 143.469464][ T6743] ? slab_post_alloc_hook+0x8c/0x340 [ 143.474773][ T6743] ? try_charge_memcg+0xb45/0xd20 [ 143.479888][ T6743] ? xas_load+0x37c/0x390 [ 143.484202][ T6743] ? skb_release_data+0x542/0x560 [ 143.489214][ T6743] ? kmem_cache_free+0x1db/0x3a0 [ 143.494144][ T6743] ? __kfree_skb+0x104/0x140 [ 143.498725][ T6743] ? nlmon_xmit+0x4b/0x60 [ 143.503046][ T6743] ? __kfree_skb+0x104/0x140 [ 143.507624][ T6743] ? consume_skb+0x57/0x180 [ 143.512248][ T6743] ? nlmon_xmit+0x4b/0x60 [ 143.516579][ T6743] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 143.521855][ T6743] ? ref_tracker_free+0x3a1/0x400 [ 143.526878][ T6743] ? __dev_queue_xmit+0xabb/0x1d10 [ 143.531977][ T6743] netlink_rcv_skb+0x126/0x220 [ 143.536735][ T6743] ? rtnetlink_bind+0x60/0x60 [ 143.541502][ T6743] rtnetlink_rcv+0x1c/0x20 [ 143.545955][ T6743] netlink_unicast+0x56f/0x640 [ 143.550744][ T6743] netlink_sendmsg+0x665/0x770 [ 143.555594][ T6743] ? netlink_getsockopt+0x3e0/0x3e0 [ 143.560868][ T6743] ____sys_sendmsg+0x37c/0x4d0 [ 143.565745][ T6743] __sys_sendmsg+0x1e9/0x270 [ 143.570349][ T6743] __x64_sys_sendmsg+0x46/0x50 [ 143.575143][ T6743] do_syscall_64+0x41/0xc0 [ 143.579544][ T6743] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 143.585498][ T6743] RIP: 0033:0x7fbb4510cae9 [ 143.590344][ T6743] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 143.609957][ T6743] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 143.618397][ T6743] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 143.626360][ T6743] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 143.634412][ T6743] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 143.642456][ T6743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.650494][ T6743] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 143.658555][ T6743] 01:00:47 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 01:00:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x3f000000) 01:00:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1008000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 26) 01:00:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 144.139983][ T6770] FAULT_INJECTION: forcing a failure. [ 144.139983][ T6770] name failslab, interval 1, probability 0, space 0, times 0 [ 144.152693][ T6770] CPU: 1 PID: 6770 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 144.163146][ T6770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 144.172675][ T6771] loop1: detected capacity change from 0 to 2048 [ 144.173235][ T6770] Call Trace: [ 144.173242][ T6770] [ 144.186011][ T6770] dump_stack_lvl+0xda/0x130 [ 144.190691][ T6770] dump_stack+0x15/0x20 [ 144.194875][ T6770] should_fail_ex+0x21f/0x230 [ 144.199558][ T6770] __should_failslab+0x92/0xa0 [ 144.204367][ T6770] should_failslab+0x9/0x20 [ 144.208908][ T6770] slab_pre_alloc_hook+0x38/0x180 [ 144.213940][ T6770] kmem_cache_alloc+0x52/0x220 [ 144.218709][ T6770] ? __kernfs_new_node+0x6a/0x380 [ 144.223746][ T6770] __kernfs_new_node+0x6a/0x380 [ 144.228669][ T6770] ? make_kgid+0x115/0x310 [ 144.233154][ T6770] ? net_ns_get_ownership+0xae/0xd0 [ 144.238354][ T6770] ? net_namespace+0x20/0x20 [ 144.242980][ T6770] kernfs_create_dir_ns+0x62/0x150 [ 144.248087][ T6770] sysfs_create_dir_ns+0xd7/0x1d0 [ 144.253131][ T6770] kobject_add_internal+0x47b/0x780 [ 144.258407][ T6770] kobject_add+0xdc/0x150 [ 144.262801][ T6770] ? kobject_get+0x95/0xc0 [ 144.267220][ T6770] ? kobject_put+0xfd/0x170 [ 144.271724][ T6770] ? device_add+0x2f1/0xab0 [ 144.276223][ T6770] device_add+0x2ff/0xab0 [ 144.280599][ T6770] netdev_register_kobject+0xfc/0x230 [ 144.285979][ T6770] register_netdevice+0x903/0xcd0 [ 144.291044][ T6770] register_vlan_dev+0x21e/0x460 [ 144.295986][ T6770] vlan_newlink+0x317/0x350 [ 144.300480][ T6770] ? vlan_validate+0x420/0x420 [ 144.305234][ T6770] rtnl_newlink+0xe83/0x1600 [ 144.309866][ T6770] ? rtnl_newlink+0x5d/0x1600 [ 144.314544][ T6770] ? security_capable+0x5e/0x80 [ 144.319392][ T6770] ? ns_capable+0x7c/0xb0 [ 144.323725][ T6770] ? rtnl_setlink+0x300/0x300 [ 144.328402][ T6770] rtnetlink_rcv_msg+0x807/0x8c0 [ 144.333350][ T6770] ? slab_post_alloc_hook+0x8c/0x340 [ 144.338653][ T6770] ? kmem_cache_alloc+0x10f/0x220 [ 144.343675][ T6770] ? xas_load+0x37c/0x390 [ 144.348001][ T6770] ? skb_release_data+0x542/0x560 [ 144.353024][ T6770] ? kmem_cache_free+0x1db/0x3a0 [ 144.357968][ T6770] ? __kfree_skb+0x104/0x140 [ 144.362560][ T6770] ? nlmon_xmit+0x4b/0x60 [ 144.366948][ T6770] ? __kfree_skb+0x104/0x140 [ 144.371618][ T6770] ? consume_skb+0x57/0x180 [ 144.376121][ T6770] ? nlmon_xmit+0x4b/0x60 [ 144.380521][ T6770] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 144.385880][ T6770] ? ref_tracker_free+0x3a1/0x400 [ 144.390940][ T6770] ? __dev_queue_xmit+0xabb/0x1d10 [ 144.396066][ T6770] netlink_rcv_skb+0x126/0x220 [ 144.400978][ T6770] ? rtnetlink_bind+0x60/0x60 [ 144.405749][ T6770] rtnetlink_rcv+0x1c/0x20 [ 144.410181][ T6770] netlink_unicast+0x56f/0x640 [ 144.414982][ T6770] netlink_sendmsg+0x665/0x770 [ 144.419834][ T6770] ? netlink_getsockopt+0x3e0/0x3e0 [ 144.425059][ T6770] ____sys_sendmsg+0x37c/0x4d0 [ 144.429847][ T6770] __sys_sendmsg+0x1e9/0x270 [ 144.434531][ T6770] __x64_sys_sendmsg+0x46/0x50 [ 144.439478][ T6770] do_syscall_64+0x41/0xc0 [ 144.443928][ T6770] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.449844][ T6770] RIP: 0033:0x7fbb4510cae9 [ 144.454325][ T6770] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 144.473946][ T6770] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.482381][ T6770] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 01:00:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x3f00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 27) 01:00:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 144.490374][ T6770] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 144.498343][ T6770] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 144.506341][ T6770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.514313][ T6770] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 144.522376][ T6770] [ 144.525520][ T6770] kobject: kobject_add_internal failed for vlan8 (error: -12 parent: net) [ 144.594908][ T6787] FAULT_INJECTION: forcing a failure. [ 144.594908][ T6787] name failslab, interval 1, probability 0, space 0, times 0 [ 144.607621][ T6787] CPU: 0 PID: 6787 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 144.617953][ T6787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 144.628062][ T6787] Call Trace: [ 144.631656][ T6787] [ 144.634647][ T6787] dump_stack_lvl+0xda/0x130 [ 144.639311][ T6787] dump_stack+0x15/0x20 [ 144.643567][ T6787] should_fail_ex+0x21f/0x230 [ 144.648261][ T6787] __should_failslab+0x92/0xa0 [ 144.653008][ T6787] should_failslab+0x9/0x20 [ 144.657558][ T6787] slab_pre_alloc_hook+0x38/0x180 [ 144.662579][ T6787] kmem_cache_alloc+0x52/0x220 [ 144.667450][ T6787] ? __kernfs_new_node+0x6a/0x380 [ 144.672491][ T6787] __kernfs_new_node+0x6a/0x380 [ 144.677326][ T6787] ? kernfs_add_one+0x330/0x390 [ 144.682213][ T6787] kernfs_new_node+0x5f/0xd0 [ 144.686877][ T6787] kernfs_create_link+0x6c/0x120 [ 144.691898][ T6787] sysfs_do_create_link_sd+0x6b/0xf0 [ 144.697431][ T6787] sysfs_create_link+0x51/0x70 [ 144.702219][ T6787] device_add+0x4c3/0xab0 [ 144.706538][ T6787] netdev_register_kobject+0xfc/0x230 [ 144.711920][ T6787] register_netdevice+0x903/0xcd0 [ 144.717084][ T6787] register_vlan_dev+0x21e/0x460 [ 144.722084][ T6787] vlan_newlink+0x317/0x350 [ 144.726715][ T6787] ? vlan_validate+0x420/0x420 [ 144.731466][ T6787] rtnl_newlink+0xe83/0x1600 [ 144.736088][ T6787] ? rtnl_newlink+0x5d/0x1600 [ 144.740765][ T6787] ? security_capable+0x5e/0x80 [ 144.745697][ T6787] ? ns_capable+0x7c/0xb0 [ 144.750026][ T6787] ? rtnl_setlink+0x300/0x300 [ 144.754695][ T6787] rtnetlink_rcv_msg+0x807/0x8c0 [ 144.759708][ T6787] ? slab_post_alloc_hook+0x8c/0x340 [ 144.765344][ T6787] ? kmem_cache_alloc+0x10f/0x220 [ 144.770391][ T6787] ? xas_load+0x37c/0x390 [ 144.774709][ T6787] ? skb_release_data+0x542/0x560 [ 144.779906][ T6787] ? kmem_cache_free+0x1db/0x3a0 [ 144.784901][ T6787] ? __kfree_skb+0x104/0x140 [ 144.789476][ T6787] ? nlmon_xmit+0x4b/0x60 [ 144.793837][ T6787] ? __kfree_skb+0x104/0x140 [ 144.798464][ T6787] ? consume_skb+0x57/0x180 [ 144.802952][ T6787] ? nlmon_xmit+0x4b/0x60 [ 144.807382][ T6787] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 144.812652][ T6787] ? ref_tracker_free+0x3a1/0x400 [ 144.817722][ T6787] ? __dev_queue_xmit+0xabb/0x1d10 [ 144.822875][ T6787] netlink_rcv_skb+0x126/0x220 [ 144.827645][ T6787] ? rtnetlink_bind+0x60/0x60 [ 144.832391][ T6787] rtnetlink_rcv+0x1c/0x20 [ 144.836836][ T6787] netlink_unicast+0x56f/0x640 [ 144.841660][ T6787] netlink_sendmsg+0x665/0x770 [ 144.846425][ T6787] ? netlink_getsockopt+0x3e0/0x3e0 [ 144.851674][ T6787] ____sys_sendmsg+0x37c/0x4d0 [ 144.856440][ T6787] __sys_sendmsg+0x1e9/0x270 [ 144.861106][ T6787] __x64_sys_sendmsg+0x46/0x50 [ 144.865942][ T6787] do_syscall_64+0x41/0xc0 [ 144.870364][ T6787] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.876272][ T6787] RIP: 0033:0x7fbb4510cae9 [ 144.880669][ T6787] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 144.900261][ T6787] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.908654][ T6787] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 144.916700][ T6787] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 144.924653][ T6787] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 144.932607][ T6787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:00:48 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 01:00:48 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x4000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:48 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x40000100) 01:00:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x30}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 28) [ 144.940694][ T6787] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 144.948658][ T6787] 01:00:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x47ee000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 144.984861][ T6795] loop1: detected capacity change from 0 to 2048 [ 145.005087][ T6802] FAULT_INJECTION: forcing a failure. [ 145.005087][ T6802] name failslab, interval 1, probability 0, space 0, times 0 [ 145.017803][ T6802] CPU: 0 PID: 6802 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 01:00:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x8dffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:48 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x97ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 145.028242][ T6802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 145.038302][ T6802] Call Trace: [ 145.041583][ T6802] [ 145.044589][ T6802] dump_stack_lvl+0xda/0x130 [ 145.049196][ T6802] dump_stack+0x15/0x20 [ 145.053384][ T6802] should_fail_ex+0x21f/0x230 [ 145.058088][ T6802] ? kstrdup_const+0x3e/0x50 [ 145.062836][ T6802] __should_failslab+0x92/0xa0 [ 145.067705][ T6802] should_failslab+0x9/0x20 [ 145.072226][ T6802] slab_pre_alloc_hook+0x38/0x180 [ 145.077278][ T6802] ? kstrdup_const+0x3e/0x50 [ 145.081943][ T6802] __kmem_cache_alloc_node+0x48/0x1d0 [ 145.087338][ T6802] ? kernfs_xattr_get+0x67/0x80 [ 145.092234][ T6802] ? kstrdup_const+0x3e/0x50 [ 145.096886][ T6802] __kmalloc_node_track_caller+0x96/0x1a0 [ 145.102612][ T6802] kstrdup+0x3a/0x70 [ 145.106617][ T6802] kstrdup_const+0x3e/0x50 [ 145.111030][ T6802] __kernfs_new_node+0x41/0x380 [ 145.115927][ T6802] ? rb_insert_color+0x6a/0x290 [ 145.120769][ T6802] ? up_write+0x30/0xe0 [ 145.124926][ T6802] ? kernfs_activate+0x252/0x270 [ 145.129862][ T6802] kernfs_new_node+0x5f/0xd0 [ 145.134449][ T6802] kernfs_create_link+0x6c/0x120 [ 145.139454][ T6802] sysfs_do_create_link_sd+0x6b/0xf0 [ 145.144738][ T6802] sysfs_create_link+0x51/0x70 [ 145.149549][ T6802] device_add+0x615/0xab0 [ 145.153901][ T6802] netdev_register_kobject+0xfc/0x230 [ 145.159286][ T6802] register_netdevice+0x903/0xcd0 [ 145.164458][ T6802] register_vlan_dev+0x21e/0x460 [ 145.169420][ T6802] vlan_newlink+0x317/0x350 [ 145.173917][ T6802] ? vlan_validate+0x420/0x420 [ 145.178713][ T6802] rtnl_newlink+0xe83/0x1600 [ 145.183513][ T6802] ? rtnl_newlink+0x5d/0x1600 [ 145.188193][ T6802] ? security_capable+0x5e/0x80 [ 145.193038][ T6802] ? ns_capable+0x7c/0xb0 [ 145.197434][ T6802] ? rtnl_setlink+0x300/0x300 [ 145.202179][ T6802] rtnetlink_rcv_msg+0x807/0x8c0 [ 145.207197][ T6802] ? slab_post_alloc_hook+0x8c/0x340 [ 145.212493][ T6802] ? kmem_cache_alloc+0x10f/0x220 [ 145.217527][ T6802] ? xas_load+0x37c/0x390 [ 145.221923][ T6802] ? skb_release_data+0x542/0x560 [ 145.226957][ T6802] ? kmem_cache_free+0x1db/0x3a0 [ 145.231894][ T6802] ? __kfree_skb+0x104/0x140 [ 145.236537][ T6802] ? nlmon_xmit+0x4b/0x60 [ 145.240888][ T6802] ? __kfree_skb+0x104/0x140 [ 145.245476][ T6802] ? consume_skb+0x57/0x180 [ 145.250049][ T6802] ? nlmon_xmit+0x4b/0x60 [ 145.254427][ T6802] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 145.259757][ T6802] ? ref_tracker_free+0x3a1/0x400 [ 145.264797][ T6802] ? __dev_queue_xmit+0xabb/0x1d10 [ 145.269913][ T6802] netlink_rcv_skb+0x126/0x220 [ 145.274745][ T6802] ? rtnetlink_bind+0x60/0x60 [ 145.279492][ T6802] rtnetlink_rcv+0x1c/0x20 [ 145.283954][ T6802] netlink_unicast+0x56f/0x640 [ 145.288793][ T6802] netlink_sendmsg+0x665/0x770 [ 145.293642][ T6802] ? netlink_getsockopt+0x3e0/0x3e0 [ 145.298894][ T6802] ____sys_sendmsg+0x37c/0x4d0 [ 145.303667][ T6802] __sys_sendmsg+0x1e9/0x270 [ 145.308304][ T6802] __x64_sys_sendmsg+0x46/0x50 [ 145.313179][ T6802] do_syscall_64+0x41/0xc0 [ 145.317594][ T6802] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 145.323527][ T6802] RIP: 0033:0x7fbb4510cae9 [ 145.327933][ T6802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 145.347649][ T6802] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 145.356054][ T6802] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 145.364015][ T6802] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 145.371992][ T6802] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 01:00:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xa8aaaafffeaaaaaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 145.379954][ T6802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.387917][ T6802] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 145.395946][ T6802] 01:00:49 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 01:00:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 29) 01:00:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x500}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:49 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x0, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xaa00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:49 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x40000800) 01:00:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xaaaaaafeffaaaaa8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 145.862774][ T6826] FAULT_INJECTION: forcing a failure. [ 145.862774][ T6826] name failslab, interval 1, probability 0, space 0, times 0 [ 145.875540][ T6826] CPU: 1 PID: 6826 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 145.879758][ T6825] loop1: detected capacity change from 0 to 2048 [ 145.885947][ T6826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 145.885961][ T6826] Call Trace: [ 145.885966][ T6826] [ 145.885972][ T6826] dump_stack_lvl+0xda/0x130 [ 145.913297][ T6826] dump_stack+0x15/0x20 [ 145.917499][ T6826] should_fail_ex+0x21f/0x230 [ 145.922236][ T6826] __should_failslab+0x92/0xa0 [ 145.926997][ T6826] should_failslab+0x9/0x20 [ 145.931581][ T6826] slab_pre_alloc_hook+0x38/0x180 [ 145.936644][ T6826] kmem_cache_alloc+0x52/0x220 [ 145.941432][ T6826] ? __kernfs_new_node+0x6a/0x380 [ 145.946545][ T6826] __kernfs_new_node+0x6a/0x380 [ 145.951397][ T6826] ? __radix_tree_replace+0x1c1/0x1f0 [ 145.956894][ T6826] ? mutex_lock+0xd/0x30 [ 145.961140][ T6826] kernfs_new_node+0x5f/0xd0 [ 145.965805][ T6826] __kernfs_create_file+0x49/0x180 [ 145.970938][ T6826] ? dev_attr_show+0x90/0x90 [ 145.975529][ T6826] sysfs_add_file_mode_ns+0x136/0x1b0 [ 145.981008][ T6826] internal_create_group+0x2e4/0x800 [ 145.986391][ T6826] sysfs_create_groups+0x3c/0xe0 [ 145.991414][ T6826] device_add_attrs+0x69/0x400 [ 145.996220][ T6826] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 146.001856][ T6826] device_add+0x4e9/0xab0 [ 146.006282][ T6826] netdev_register_kobject+0xfc/0x230 [ 146.011700][ T6826] register_netdevice+0x903/0xcd0 [ 146.016792][ T6826] register_vlan_dev+0x21e/0x460 [ 146.021761][ T6826] vlan_newlink+0x317/0x350 [ 146.026256][ T6826] ? vlan_validate+0x420/0x420 [ 146.031082][ T6826] rtnl_newlink+0xe83/0x1600 [ 146.035704][ T6826] ? rb_insert_color+0x6a/0x290 [ 146.040613][ T6826] ? security_capable+0x5e/0x80 [ 146.045523][ T6826] ? ns_capable+0x7c/0xb0 [ 146.049854][ T6826] ? rtnl_setlink+0x300/0x300 [ 146.054545][ T6826] rtnetlink_rcv_msg+0x807/0x8c0 [ 146.059506][ T6826] ? slab_post_alloc_hook+0x8c/0x340 [ 146.064922][ T6826] ? kmem_cache_alloc+0x10f/0x220 [ 146.069957][ T6826] ? xas_load+0x37c/0x390 [ 146.074423][ T6826] ? skb_release_data+0x542/0x560 [ 146.079449][ T6826] ? kmem_cache_free+0x1db/0x3a0 [ 146.084440][ T6826] ? __kfree_skb+0x104/0x140 [ 146.089117][ T6826] ? nlmon_xmit+0x4b/0x60 [ 146.093453][ T6826] ? __kfree_skb+0x104/0x140 [ 146.098070][ T6826] ? consume_skb+0x57/0x180 [ 146.102653][ T6826] ? nlmon_xmit+0x4b/0x60 [ 146.107030][ T6826] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 146.112313][ T6826] ? ref_tracker_free+0x3a1/0x400 [ 146.117350][ T6826] ? __dev_queue_xmit+0xabb/0x1d10 [ 146.122654][ T6826] netlink_rcv_skb+0x126/0x220 [ 146.127424][ T6826] ? rtnetlink_bind+0x60/0x60 [ 146.132215][ T6826] rtnetlink_rcv+0x1c/0x20 [ 146.136633][ T6826] netlink_unicast+0x56f/0x640 [ 146.141508][ T6826] netlink_sendmsg+0x665/0x770 [ 146.146275][ T6826] ? netlink_getsockopt+0x3e0/0x3e0 [ 146.151514][ T6826] ____sys_sendmsg+0x37c/0x4d0 [ 146.156329][ T6826] __sys_sendmsg+0x1e9/0x270 [ 146.160937][ T6826] __x64_sys_sendmsg+0x46/0x50 [ 146.165703][ T6826] do_syscall_64+0x41/0xc0 [ 146.170119][ T6826] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 146.176978][ T6826] RIP: 0033:0x7fbb4510cae9 [ 146.181410][ T6826] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 146.201014][ T6826] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:00:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x5dc}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x600}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:49 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xe5ffffff) 01:00:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xb80b000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 146.209580][ T6826] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 146.217604][ T6826] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 146.225694][ T6826] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 146.233832][ T6826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.241793][ T6826] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 146.249762][ T6826] 01:00:49 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x700}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 146.324337][ T6826] syz-executor.2 (6826) used greatest stack depth: 9736 bytes left [ 146.336370][ T6839] loop1: detected capacity change from 0 to 2048 01:00:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 30) 01:00:50 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) 01:00:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xdc05000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:50 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x0, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x810}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:50 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xf6ffffff) 01:00:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x900}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:50 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf5ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 147.111962][ T6852] __nla_validate_parse: 8 callbacks suppressed [ 147.111980][ T6852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.142435][ T6853] loop1: detected capacity change from 0 to 2048 01:00:50 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x0, 0x3a) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 147.162648][ T6864] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.214588][ T6852] FAULT_INJECTION: forcing a failure. [ 147.214588][ T6852] name failslab, interval 1, probability 0, space 0, times 0 [ 147.227309][ T6852] CPU: 0 PID: 6852 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 147.238488][ T6852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 147.248762][ T6852] Call Trace: [ 147.252102][ T6852] [ 147.255041][ T6852] dump_stack_lvl+0xda/0x130 [ 147.259617][ T6852] dump_stack+0x15/0x20 [ 147.264050][ T6852] should_fail_ex+0x21f/0x230 [ 147.268726][ T6852] __should_failslab+0x92/0xa0 [ 147.273475][ T6852] should_failslab+0x9/0x20 [ 147.278060][ T6852] slab_pre_alloc_hook+0x38/0x180 [ 147.283542][ T6852] kmem_cache_alloc+0x52/0x220 [ 147.288499][ T6852] ? __kernfs_new_node+0x6a/0x380 [ 147.293524][ T6852] __kernfs_new_node+0x6a/0x380 [ 147.298383][ T6852] ? rb_insert_color+0x6a/0x290 [ 147.303323][ T6852] ? up_write+0x30/0xe0 [ 147.307628][ T6852] ? kernfs_activate+0x252/0x270 [ 147.312552][ T6852] kernfs_new_node+0x5f/0xd0 [ 147.317143][ T6852] kernfs_create_link+0x6c/0x120 [ 147.322689][ T6852] sysfs_do_create_link_sd+0x6b/0xf0 [ 147.328068][ T6852] sysfs_create_link+0x51/0x70 [ 147.332870][ T6852] device_add+0x615/0xab0 [ 147.337201][ T6852] netdev_register_kobject+0xfc/0x230 [ 147.342627][ T6852] register_netdevice+0x903/0xcd0 [ 147.347650][ T6852] register_vlan_dev+0x21e/0x460 [ 147.352663][ T6852] vlan_newlink+0x317/0x350 [ 147.357531][ T6852] ? vlan_validate+0x420/0x420 [ 147.362347][ T6852] rtnl_newlink+0xe83/0x1600 [ 147.367108][ T6852] ? rtnl_newlink+0x5d/0x1600 [ 147.371789][ T6852] ? security_capable+0x5e/0x80 [ 147.376688][ T6852] ? ns_capable+0x7c/0xb0 [ 147.381709][ T6852] ? rtnl_setlink+0x300/0x300 [ 147.386393][ T6852] rtnetlink_rcv_msg+0x807/0x8c0 [ 147.391326][ T6852] ? slab_post_alloc_hook+0x8c/0x340 [ 147.396827][ T6852] ? kmem_cache_alloc+0x10f/0x220 [ 147.401842][ T6852] ? xas_load+0x37c/0x390 [ 147.406169][ T6852] ? skb_release_data+0x542/0x560 [ 147.411317][ T6852] ? kmem_cache_free+0x1db/0x3a0 [ 147.416248][ T6852] ? __kfree_skb+0x104/0x140 [ 147.420847][ T6852] ? nlmon_xmit+0x4b/0x60 [ 147.425202][ T6852] ? __kfree_skb+0x104/0x140 [ 147.429836][ T6852] ? consume_skb+0x57/0x180 [ 147.434469][ T6852] ? nlmon_xmit+0x4b/0x60 [ 147.438853][ T6852] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 147.444177][ T6852] ? ref_tracker_free+0x3a1/0x400 [ 147.449198][ T6852] ? __dev_queue_xmit+0xabb/0x1d10 [ 147.454334][ T6852] netlink_rcv_skb+0x126/0x220 [ 147.459149][ T6852] ? rtnetlink_bind+0x60/0x60 [ 147.463819][ T6852] rtnetlink_rcv+0x1c/0x20 [ 147.468291][ T6852] netlink_unicast+0x56f/0x640 [ 147.473065][ T6852] netlink_sendmsg+0x665/0x770 [ 147.477896][ T6852] ? netlink_getsockopt+0x3e0/0x3e0 [ 147.483107][ T6852] ____sys_sendmsg+0x37c/0x4d0 [ 147.487863][ T6852] __sys_sendmsg+0x1e9/0x270 [ 147.492507][ T6852] __x64_sys_sendmsg+0x46/0x50 [ 147.497313][ T6852] do_syscall_64+0x41/0xc0 [ 147.501719][ T6852] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 147.507641][ T6852] RIP: 0033:0x7fbb4510cae9 [ 147.512154][ T6852] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 147.532017][ T6852] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 147.540589][ T6852] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 147.548838][ T6852] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 147.556905][ T6852] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 01:00:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 31) [ 147.566261][ T6852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.574279][ T6852] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 147.582255][ T6852] [ 147.608892][ T6879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.618835][ T6879] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 147.632353][ T6879] FAULT_INJECTION: forcing a failure. [ 147.632353][ T6879] name failslab, interval 1, probability 0, space 0, times 0 [ 147.645100][ T6879] CPU: 1 PID: 6879 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 147.656307][ T6879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 147.666366][ T6879] Call Trace: [ 147.669631][ T6879] [ 147.672559][ T6879] dump_stack_lvl+0xda/0x130 [ 147.677175][ T6879] dump_stack+0x15/0x20 [ 147.681326][ T6879] should_fail_ex+0x21f/0x230 [ 147.686020][ T6879] __should_failslab+0x92/0xa0 [ 147.690773][ T6879] should_failslab+0x9/0x20 [ 147.695363][ T6879] slab_pre_alloc_hook+0x38/0x180 [ 147.700424][ T6879] kmem_cache_alloc+0x52/0x220 [ 147.705176][ T6879] ? __kernfs_new_node+0x6a/0x380 [ 147.710228][ T6879] __kernfs_new_node+0x6a/0x380 [ 147.715159][ T6879] ? __radix_tree_replace+0x1c1/0x1f0 [ 147.720582][ T6879] ? mutex_lock+0xd/0x30 [ 147.724811][ T6879] kernfs_new_node+0x5f/0xd0 [ 147.729386][ T6879] __kernfs_create_file+0x49/0x180 [ 147.734552][ T6879] ? dev_attr_show+0x90/0x90 [ 147.739150][ T6879] sysfs_add_file_mode_ns+0x136/0x1b0 [ 147.744611][ T6879] internal_create_group+0x2e4/0x800 [ 147.749944][ T6879] sysfs_create_groups+0x3c/0xe0 [ 147.754989][ T6879] device_add_attrs+0x69/0x400 [ 147.759789][ T6879] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 147.765309][ T6879] device_add+0x4e9/0xab0 [ 147.769737][ T6879] netdev_register_kobject+0xfc/0x230 [ 147.775172][ T6879] register_netdevice+0x903/0xcd0 [ 147.780300][ T6879] register_vlan_dev+0x21e/0x460 [ 147.785232][ T6879] vlan_newlink+0x317/0x350 [ 147.789766][ T6879] ? vlan_validate+0x420/0x420 [ 147.794604][ T6879] rtnl_newlink+0xe83/0x1600 [ 147.799194][ T6879] ? rtnl_newlink+0x5d/0x1600 [ 147.803880][ T6879] ? security_capable+0x5e/0x80 [ 147.808712][ T6879] ? ns_capable+0x7c/0xb0 [ 147.813158][ T6879] ? rtnl_setlink+0x300/0x300 [ 147.817821][ T6879] rtnetlink_rcv_msg+0x807/0x8c0 [ 147.822790][ T6879] ? __rcu_read_unlock+0x4d/0x70 [ 147.827781][ T6879] ? slab_post_alloc_hook+0x8c/0x340 [ 147.833078][ T6879] ? kmem_cache_alloc+0x10f/0x220 [ 147.838096][ T6879] ? xas_load+0x37c/0x390 [ 147.842458][ T6879] ? skb_release_data+0x542/0x560 [ 147.847545][ T6879] ? kmem_cache_free+0x1db/0x3a0 [ 147.852513][ T6879] ? __kfree_skb+0x104/0x140 [ 147.857247][ T6879] ? nlmon_xmit+0x4b/0x60 [ 147.861633][ T6879] ? __kfree_skb+0x104/0x140 [ 147.866293][ T6879] ? consume_skb+0x57/0x180 [ 147.870802][ T6879] ? nlmon_xmit+0x4b/0x60 [ 147.875157][ T6879] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 147.880499][ T6879] ? ref_tracker_free+0x3a1/0x400 [ 147.885512][ T6879] ? __dev_queue_xmit+0xabb/0x1d10 [ 147.890618][ T6879] netlink_rcv_skb+0x126/0x220 [ 147.895471][ T6879] ? rtnetlink_bind+0x60/0x60 [ 147.900204][ T6879] rtnetlink_rcv+0x1c/0x20 [ 147.904648][ T6879] netlink_unicast+0x56f/0x640 [ 147.909538][ T6879] netlink_sendmsg+0x665/0x770 [ 147.914303][ T6879] ? netlink_getsockopt+0x3e0/0x3e0 [ 147.919545][ T6879] ____sys_sendmsg+0x37c/0x4d0 [ 147.924349][ T6879] __sys_sendmsg+0x1e9/0x270 [ 147.929001][ T6879] __x64_sys_sendmsg+0x46/0x50 [ 147.933762][ T6879] do_syscall_64+0x41/0xc0 [ 147.938169][ T6879] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 147.944152][ T6879] RIP: 0033:0x7fbb4510cae9 01:00:51 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) 01:00:51 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xffffffe5) 01:00:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xf7ffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xbb8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:51 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x0) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1008}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 147.948627][ T6879] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 147.968224][ T6879] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 147.976699][ T6879] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 147.984806][ T6879] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 147.992792][ T6879] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 148.000820][ T6879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:00:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 32) 01:00:51 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xfe80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 148.008918][ T6879] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 148.016907][ T6879] 01:00:51 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x0) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:51 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xfffffff6) 01:00:51 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x0) socket$inet(0x2, 0x3, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 148.055996][ T6885] loop1: detected capacity change from 0 to 2048 [ 148.113272][ T6905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 148.124789][ T6903] loop1: detected capacity change from 0 to 2048 [ 148.132838][ T6905] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 148.156868][ T6905] FAULT_INJECTION: forcing a failure. [ 148.156868][ T6905] name failslab, interval 1, probability 0, space 0, times 0 [ 148.169663][ T6905] CPU: 1 PID: 6905 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 148.180048][ T6905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 148.190180][ T6905] Call Trace: [ 148.193443][ T6905] [ 148.196365][ T6905] dump_stack_lvl+0xda/0x130 [ 148.200952][ T6905] dump_stack+0x15/0x20 [ 148.205456][ T6905] should_fail_ex+0x21f/0x230 [ 148.210124][ T6905] __should_failslab+0x92/0xa0 [ 148.214893][ T6905] should_failslab+0x9/0x20 [ 148.219518][ T6905] slab_pre_alloc_hook+0x38/0x180 [ 148.224565][ T6905] kmem_cache_alloc+0x52/0x220 [ 148.229358][ T6905] ? __kernfs_new_node+0x6a/0x380 [ 148.234388][ T6905] __kernfs_new_node+0x6a/0x380 [ 148.239390][ T6905] ? rb_insert_color+0x280/0x290 [ 148.244399][ T6905] ? up_write+0x30/0xe0 [ 148.249848][ T6905] ? kernfs_activate+0x252/0x270 [ 148.254898][ T6905] kernfs_new_node+0x5f/0xd0 [ 148.259492][ T6905] __kernfs_create_file+0x49/0x180 [ 148.264685][ T6905] ? dev_attr_show+0x90/0x90 [ 148.269297][ T6905] sysfs_add_file_mode_ns+0x136/0x1b0 [ 148.274791][ T6905] internal_create_group+0x2e4/0x800 [ 148.280065][ T6905] sysfs_create_groups+0x3c/0xe0 [ 148.285001][ T6905] device_add_attrs+0x69/0x400 [ 148.289766][ T6905] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 148.295245][ T6905] device_add+0x4e9/0xab0 [ 148.299632][ T6905] netdev_register_kobject+0xfc/0x230 [ 148.305171][ T6905] register_netdevice+0x903/0xcd0 [ 148.310241][ T6905] register_vlan_dev+0x21e/0x460 [ 148.315762][ T6905] vlan_newlink+0x317/0x350 [ 148.320251][ T6905] ? vlan_validate+0x420/0x420 [ 148.324994][ T6905] rtnl_newlink+0xe83/0x1600 [ 148.329572][ T6905] ? rb_insert_color+0x6a/0x290 [ 148.334414][ T6905] ? security_capable+0x5e/0x80 [ 148.339249][ T6905] ? ns_capable+0x7c/0xb0 [ 148.343655][ T6905] ? rtnl_setlink+0x300/0x300 [ 148.348392][ T6905] rtnetlink_rcv_msg+0x807/0x8c0 [ 148.353336][ T6905] ? slab_post_alloc_hook+0x8c/0x340 [ 148.358614][ T6905] ? kmem_cache_alloc+0x10f/0x220 [ 148.363875][ T6905] ? xas_load+0x37c/0x390 [ 148.368197][ T6905] ? skb_release_data+0x542/0x560 [ 148.373236][ T6905] ? kmem_cache_free+0x1db/0x3a0 [ 148.378241][ T6905] ? __kfree_skb+0x104/0x140 [ 148.382828][ T6905] ? nlmon_xmit+0x4b/0x60 [ 148.387205][ T6905] ? __kfree_skb+0x104/0x140 [ 148.392116][ T6905] ? consume_skb+0x57/0x180 [ 148.396683][ T6905] ? nlmon_xmit+0x4b/0x60 [ 148.401054][ T6905] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 148.406342][ T6905] ? ref_tracker_free+0x3a1/0x400 [ 148.411440][ T6905] ? __dev_queue_xmit+0xabb/0x1d10 [ 148.416629][ T6905] netlink_rcv_skb+0x126/0x220 [ 148.422627][ T6905] ? rtnetlink_bind+0x60/0x60 [ 148.427386][ T6905] rtnetlink_rcv+0x1c/0x20 [ 148.431883][ T6905] netlink_unicast+0x56f/0x640 [ 148.436774][ T6905] netlink_sendmsg+0x665/0x770 [ 148.441618][ T6905] ? netlink_getsockopt+0x3e0/0x3e0 [ 148.446809][ T6905] ____sys_sendmsg+0x37c/0x4d0 [ 148.451619][ T6905] __sys_sendmsg+0x1e9/0x270 [ 148.456420][ T6905] __x64_sys_sendmsg+0x46/0x50 [ 148.461459][ T6905] do_syscall_64+0x41/0xc0 [ 148.465993][ T6905] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 148.472096][ T6905] RIP: 0033:0x7fbb4510cae9 [ 148.476499][ T6905] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 148.496403][ T6905] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 148.504960][ T6905] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 148.512998][ T6905] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 148.522598][ T6905] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 148.530552][ T6905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.539036][ T6905] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 148.546992][ T6905] 01:00:52 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) 01:00:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:52 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x1000000000000) 01:00:52 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x0, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 33) 01:00:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3f00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:52 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x100000000000000) 01:00:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x47ee}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:52 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 148.874834][ T6918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 148.886473][ T6914] loop1: detected capacity change from 0 to 2048 [ 148.902247][ T6918] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 148.954130][ T6931] loop1: detected capacity change from 0 to 2048 [ 148.965513][ T6932] FAULT_INJECTION: forcing a failure. [ 148.965513][ T6932] name failslab, interval 1, probability 0, space 0, times 0 [ 148.978532][ T6932] CPU: 1 PID: 6932 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 148.988870][ T6932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 148.999110][ T6932] Call Trace: [ 149.002379][ T6932] [ 149.005378][ T6932] dump_stack_lvl+0xda/0x130 [ 149.010042][ T6932] dump_stack+0x15/0x20 [ 149.014233][ T6932] should_fail_ex+0x21f/0x230 [ 149.018905][ T6932] __should_failslab+0x92/0xa0 [ 149.023756][ T6932] should_failslab+0x9/0x20 [ 149.028314][ T6932] slab_pre_alloc_hook+0x38/0x180 [ 149.033459][ T6932] kmem_cache_alloc+0x52/0x220 [ 149.038225][ T6932] ? __kernfs_new_node+0x6a/0x380 [ 149.043391][ T6932] __kernfs_new_node+0x6a/0x380 [ 149.048234][ T6932] ? rb_insert_color+0x263/0x290 [ 149.053163][ T6932] ? up_write+0x30/0xe0 [ 149.057355][ T6932] ? kernfs_activate+0x252/0x270 [ 149.062478][ T6932] kernfs_new_node+0x5f/0xd0 [ 149.067093][ T6932] __kernfs_create_file+0x49/0x180 [ 149.072261][ T6932] ? dev_attr_show+0x90/0x90 [ 149.076849][ T6932] sysfs_add_file_mode_ns+0x136/0x1b0 [ 149.082225][ T6932] internal_create_group+0x2e4/0x800 [ 149.087820][ T6932] sysfs_create_groups+0x3c/0xe0 [ 149.092755][ T6932] device_add_attrs+0x69/0x400 [ 149.097517][ T6932] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 149.102992][ T6932] device_add+0x4e9/0xab0 [ 149.107310][ T6932] netdev_register_kobject+0xfc/0x230 [ 149.112679][ T6932] register_netdevice+0x903/0xcd0 [ 149.117716][ T6932] register_vlan_dev+0x21e/0x460 [ 149.122763][ T6932] vlan_newlink+0x317/0x350 [ 149.127262][ T6932] ? vlan_validate+0x420/0x420 [ 149.132056][ T6932] rtnl_newlink+0xe83/0x1600 [ 149.136659][ T6932] ? cgroup_rstat_updated+0x8c/0x1c0 [ 149.142095][ T6932] ? __list_del_entry_valid+0x5f/0xe0 [ 149.147484][ T6932] ? _raw_spin_unlock+0x26/0x40 [ 149.152336][ T6932] ? __mutex_lock+0x21c/0x8d0 [ 149.157008][ T6932] ? rtnl_setlink+0x300/0x300 [ 149.161736][ T6932] rtnetlink_rcv_msg+0x807/0x8c0 [ 149.166681][ T6932] ? slab_post_alloc_hook+0x8c/0x340 [ 149.172068][ T6932] ? kmem_cache_alloc+0x10f/0x220 [ 149.177102][ T6932] ? xas_load+0x37c/0x390 [ 149.181440][ T6932] ? skb_release_data+0x542/0x560 [ 149.186515][ T6932] ? kmem_cache_free+0x1db/0x3a0 [ 149.191503][ T6932] ? __kfree_skb+0x104/0x140 [ 149.196164][ T6932] ? nlmon_xmit+0x4b/0x60 [ 149.200639][ T6932] ? __kfree_skb+0x104/0x140 [ 149.205316][ T6932] ? consume_skb+0x57/0x180 [ 149.209903][ T6932] ? nlmon_xmit+0x4b/0x60 [ 149.214237][ T6932] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 149.219592][ T6932] ? __local_bh_enable_ip+0x64/0x70 [ 149.224853][ T6932] ? ref_tracker_free+0x3a1/0x400 [ 149.229992][ T6932] ? __dev_queue_xmit+0xabb/0x1d10 [ 149.235117][ T6932] netlink_rcv_skb+0x126/0x220 [ 149.239909][ T6932] ? rtnetlink_bind+0x60/0x60 [ 149.244601][ T6932] rtnetlink_rcv+0x1c/0x20 [ 149.249038][ T6932] netlink_unicast+0x56f/0x640 [ 149.253943][ T6932] netlink_sendmsg+0x665/0x770 [ 149.258811][ T6932] ? netlink_getsockopt+0x3e0/0x3e0 [ 149.264029][ T6932] ____sys_sendmsg+0x37c/0x4d0 [ 149.268802][ T6932] __sys_sendmsg+0x1e9/0x270 [ 149.273417][ T6932] __x64_sys_sendmsg+0x46/0x50 [ 149.278257][ T6932] do_syscall_64+0x41/0xc0 [ 149.282685][ T6932] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 149.288598][ T6932] RIP: 0033:0x7fbb4510cae9 [ 149.293271][ T6932] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.312944][ T6932] RSP: 002b:00007fbb4446e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.321421][ T6932] RAX: ffffffffffffffda RBX: 00007fbb4522c050 RCX: 00007fbb4510cae9 [ 149.329450][ T6932] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 149.337423][ T6932] RBP: 00007fbb4446e120 R08: 0000000000000000 R09: 0000000000000000 [ 149.345532][ T6932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.353515][ T6932] R13: 000000000000006e R14: 00007fbb4522c050 R15: 00007fff290bdd88 [ 149.361480][ T6932] 01:00:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 34) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x80fe}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x0, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x200000000000000) 01:00:53 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb80b}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xdc05}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 149.715218][ T6946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 149.732605][ T6946] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xee47}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfe80}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 149.760748][ T6946] FAULT_INJECTION: forcing a failure. [ 149.760748][ T6946] name failslab, interval 1, probability 0, space 0, times 0 [ 149.773960][ T6946] CPU: 1 PID: 6946 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 149.784336][ T6946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 149.794466][ T6946] Call Trace: [ 149.797812][ T6946] [ 149.800746][ T6946] dump_stack_lvl+0xda/0x130 [ 149.805446][ T6946] dump_stack+0x15/0x20 [ 149.809613][ T6946] should_fail_ex+0x21f/0x230 [ 149.814405][ T6946] __should_failslab+0x92/0xa0 [ 149.819266][ T6946] should_failslab+0x9/0x20 [ 149.823818][ T6946] slab_pre_alloc_hook+0x38/0x180 [ 149.828960][ T6946] kmem_cache_alloc+0x52/0x220 [ 149.833765][ T6946] ? __kernfs_new_node+0x6a/0x380 [ 149.838878][ T6946] __kernfs_new_node+0x6a/0x380 [ 149.843758][ T6946] ? rb_insert_color+0x6a/0x290 [ 149.848701][ T6946] ? up_write+0x30/0xe0 [ 149.852493][ T6965] loop1: detected capacity change from 0 to 2048 [ 149.852925][ T6946] ? kernfs_activate+0x252/0x270 [ 149.852952][ T6946] kernfs_new_node+0x5f/0xd0 [ 149.869014][ T6946] __kernfs_create_file+0x49/0x180 [ 149.874130][ T6946] ? dev_attr_show+0x90/0x90 [ 149.878864][ T6946] sysfs_add_file_mode_ns+0x136/0x1b0 [ 149.884331][ T6946] internal_create_group+0x2e4/0x800 [ 149.889716][ T6946] sysfs_create_groups+0x3c/0xe0 [ 149.894677][ T6946] device_add_attrs+0x69/0x400 [ 149.899600][ T6946] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 149.905057][ T6946] device_add+0x4e9/0xab0 [ 149.909412][ T6946] netdev_register_kobject+0xfc/0x230 [ 149.914888][ T6946] register_netdevice+0x903/0xcd0 [ 149.920271][ T6946] register_vlan_dev+0x21e/0x460 [ 149.925223][ T6946] vlan_newlink+0x317/0x350 [ 149.929888][ T6946] ? vlan_validate+0x420/0x420 [ 149.934949][ T6946] rtnl_newlink+0xe83/0x1600 [ 149.939885][ T6946] ? rtnl_newlink+0x5d/0x1600 [ 149.944566][ T6946] ? security_capable+0x5e/0x80 [ 149.949413][ T6946] ? ns_capable+0x7c/0xb0 [ 149.953910][ T6946] ? rtnl_setlink+0x300/0x300 [ 149.958875][ T6946] rtnetlink_rcv_msg+0x807/0x8c0 [ 149.963828][ T6946] ? __rcu_read_unlock+0x4d/0x70 [ 149.968757][ T6946] ? slab_post_alloc_hook+0x8c/0x340 [ 149.974068][ T6946] ? kmem_cache_alloc+0x10f/0x220 [ 149.979097][ T6946] ? xas_load+0x37c/0x390 [ 149.983444][ T6946] ? skb_release_data+0x542/0x560 [ 149.988469][ T6946] ? kmem_cache_free+0x1db/0x3a0 [ 149.993407][ T6946] ? __kfree_skb+0x104/0x140 [ 149.997995][ T6946] ? nlmon_xmit+0x4b/0x60 [ 150.002320][ T6946] ? __kfree_skb+0x104/0x140 [ 150.006911][ T6946] ? consume_skb+0x57/0x180 [ 150.011479][ T6946] ? nlmon_xmit+0x4b/0x60 [ 150.015910][ T6946] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 150.021264][ T6946] ? ref_tracker_free+0x3a1/0x400 [ 150.026293][ T6946] ? __dev_queue_xmit+0xabb/0x1d10 [ 150.031398][ T6946] netlink_rcv_skb+0x126/0x220 [ 150.036197][ T6946] ? rtnetlink_bind+0x60/0x60 [ 150.041011][ T6946] rtnetlink_rcv+0x1c/0x20 [ 150.045425][ T6946] netlink_unicast+0x56f/0x640 [ 150.050235][ T6946] netlink_sendmsg+0x665/0x770 [ 150.055004][ T6946] ? netlink_getsockopt+0x3e0/0x3e0 [ 150.060637][ T6946] ____sys_sendmsg+0x37c/0x4d0 [ 150.065485][ T6946] __sys_sendmsg+0x1e9/0x270 [ 150.070179][ T6946] __x64_sys_sendmsg+0x46/0x50 [ 150.074941][ T6946] do_syscall_64+0x41/0xc0 [ 150.079362][ T6946] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 150.085328][ T6946] RIP: 0033:0x7fbb4510cae9 [ 150.089796][ T6946] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 01:00:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 35) 01:00:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 150.109613][ T6946] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 150.118023][ T6946] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 150.126067][ T6946] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 150.134034][ T6946] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 150.142107][ T6946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.150146][ T6946] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 150.158115][ T6946] 01:00:53 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x0, 0x1) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, 0x0) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:53 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x300000000000000) 01:00:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x100000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 150.264259][ T6982] FAULT_INJECTION: forcing a failure. [ 150.264259][ T6982] name failslab, interval 1, probability 0, space 0, times 0 [ 150.277408][ T6982] CPU: 1 PID: 6982 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 150.287746][ T6982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 150.294686][ T6984] loop1: detected capacity change from 0 to 2048 [ 150.297797][ T6982] Call Trace: [ 150.297806][ T6982] [ 150.297812][ T6982] dump_stack_lvl+0xda/0x130 [ 150.314925][ T6982] dump_stack+0x15/0x20 [ 150.319180][ T6982] should_fail_ex+0x21f/0x230 [ 150.323943][ T6982] __should_failslab+0x92/0xa0 [ 150.328719][ T6982] should_failslab+0x9/0x20 [ 150.333222][ T6982] slab_pre_alloc_hook+0x38/0x180 [ 150.338284][ T6982] kmem_cache_alloc+0x52/0x220 [ 150.343094][ T6982] ? __kernfs_new_node+0x6a/0x380 [ 150.348115][ T6982] __kernfs_new_node+0x6a/0x380 [ 150.353106][ T6982] ? rb_insert_color+0x6a/0x290 [ 150.357957][ T6982] ? up_write+0x30/0xe0 [ 150.362186][ T6982] ? kernfs_activate+0x252/0x270 [ 150.367215][ T6982] kernfs_new_node+0x5f/0xd0 [ 150.371898][ T6982] __kernfs_create_file+0x49/0x180 [ 150.377009][ T6982] ? dev_attr_show+0x90/0x90 [ 150.381657][ T6982] sysfs_add_file_mode_ns+0x136/0x1b0 [ 150.387039][ T6982] internal_create_group+0x2e4/0x800 [ 150.392392][ T6982] sysfs_create_groups+0x3c/0xe0 [ 150.397337][ T6982] device_add_attrs+0x69/0x400 [ 150.402113][ T6982] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 150.407606][ T6982] device_add+0x4e9/0xab0 [ 150.411960][ T6982] netdev_register_kobject+0xfc/0x230 [ 150.417500][ T6982] register_netdevice+0x903/0xcd0 [ 150.422538][ T6982] register_vlan_dev+0x21e/0x460 [ 150.427478][ T6982] vlan_newlink+0x317/0x350 [ 150.431972][ T6982] ? vlan_validate+0x420/0x420 [ 150.436743][ T6982] rtnl_newlink+0xe83/0x1600 [ 150.441353][ T6982] ? rtnl_newlink+0x5d/0x1600 [ 150.446178][ T6982] ? security_capable+0x5e/0x80 [ 150.451072][ T6982] ? ns_capable+0x7c/0xb0 [ 150.455401][ T6982] ? rtnl_setlink+0x300/0x300 [ 150.460090][ T6982] rtnetlink_rcv_msg+0x807/0x8c0 [ 150.465038][ T6982] ? security_inode_alloc+0x32/0xd0 [ 150.470261][ T6982] ? slab_post_alloc_hook+0x8c/0x340 [ 150.475551][ T6982] ? try_charge_memcg+0xb45/0xd20 [ 150.480598][ T6982] ? xas_load+0x37c/0x390 [ 150.484949][ T6982] ? skb_release_data+0x542/0x560 [ 150.490265][ T6982] ? kmem_cache_free+0x1db/0x3a0 [ 150.495204][ T6982] ? __kfree_skb+0x104/0x140 [ 150.499811][ T6982] ? nlmon_xmit+0x4b/0x60 [ 150.504137][ T6982] ? __kfree_skb+0x104/0x140 [ 150.508819][ T6982] ? consume_skb+0x57/0x180 [ 150.513325][ T6982] ? nlmon_xmit+0x4b/0x60 [ 150.517671][ T6982] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 150.523005][ T6982] ? ref_tracker_free+0x3a1/0x400 [ 150.528034][ T6982] ? __dev_queue_xmit+0xabb/0x1d10 [ 150.533267][ T6982] netlink_rcv_skb+0x126/0x220 [ 150.538054][ T6982] ? rtnetlink_bind+0x60/0x60 [ 150.542813][ T6982] rtnetlink_rcv+0x1c/0x20 [ 150.547322][ T6982] netlink_unicast+0x56f/0x640 [ 150.552166][ T6982] netlink_sendmsg+0x665/0x770 [ 150.557011][ T6982] ? netlink_getsockopt+0x3e0/0x3e0 [ 150.562276][ T6982] ____sys_sendmsg+0x37c/0x4d0 [ 150.567139][ T6982] __sys_sendmsg+0x1e9/0x270 [ 150.571800][ T6982] __x64_sys_sendmsg+0x46/0x50 [ 150.576642][ T6982] do_syscall_64+0x41/0xc0 [ 150.581063][ T6982] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 150.587089][ T6982] RIP: 0033:0x7fbb4510cae9 [ 150.591497][ T6982] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 01:00:54 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) (fail_nth: 1) [ 150.611114][ T6982] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 150.619605][ T6982] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 150.627575][ T6982] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 150.635552][ T6982] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 150.643571][ T6982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.651558][ T6982] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 150.659537][ T6982] 01:00:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 36) 01:00:54 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:54 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x400000000000000) 01:00:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x9}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 150.773229][ T7001] FAULT_INJECTION: forcing a failure. [ 150.773229][ T7001] name failslab, interval 1, probability 0, space 0, times 0 [ 150.774150][ T7011] FAULT_INJECTION: forcing a failure. [ 150.774150][ T7011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.785881][ T7001] CPU: 1 PID: 7001 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 150.810256][ T7001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 150.820592][ T7001] Call Trace: [ 150.823874][ T7001] [ 150.826908][ T7001] dump_stack_lvl+0xda/0x130 [ 150.831513][ T7001] dump_stack+0x15/0x20 [ 150.835766][ T7001] should_fail_ex+0x21f/0x230 [ 150.840552][ T7001] __should_failslab+0x92/0xa0 [ 150.845317][ T7001] should_failslab+0x9/0x20 [ 150.849879][ T7001] slab_pre_alloc_hook+0x38/0x180 [ 150.854912][ T7001] kmem_cache_alloc+0x52/0x220 [ 150.859714][ T7001] ? __kernfs_new_node+0x6a/0x380 [ 150.864737][ T7001] __kernfs_new_node+0x6a/0x380 [ 150.869636][ T7001] ? rb_insert_color+0x6a/0x290 [ 150.874476][ T7001] ? up_write+0x30/0xe0 [ 150.878632][ T7001] ? kernfs_activate+0x252/0x270 [ 150.883615][ T7001] kernfs_new_node+0x5f/0xd0 [ 150.888302][ T7001] __kernfs_create_file+0x49/0x180 [ 150.893462][ T7001] ? dev_attr_show+0x90/0x90 [ 150.898081][ T7001] sysfs_add_file_mode_ns+0x136/0x1b0 [ 150.903511][ T7001] internal_create_group+0x2e4/0x800 [ 150.909236][ T7001] sysfs_create_groups+0x3c/0xe0 [ 150.914233][ T7001] device_add_attrs+0x69/0x400 [ 150.919051][ T7001] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 150.924509][ T7001] device_add+0x4e9/0xab0 [ 150.928830][ T7001] netdev_register_kobject+0xfc/0x230 [ 150.934290][ T7001] register_netdevice+0x903/0xcd0 [ 150.939389][ T7001] register_vlan_dev+0x21e/0x460 [ 150.944332][ T7001] vlan_newlink+0x317/0x350 [ 150.949333][ T7001] ? vlan_validate+0x420/0x420 [ 150.954193][ T7001] rtnl_newlink+0xe83/0x1600 [ 150.958787][ T7001] ? rtnl_newlink+0x5d/0x1600 [ 150.963596][ T7001] ? security_capable+0x5e/0x80 [ 150.968440][ T7001] ? ns_capable+0x7c/0xb0 [ 150.972765][ T7001] ? rtnl_setlink+0x300/0x300 [ 150.977447][ T7001] rtnetlink_rcv_msg+0x807/0x8c0 [ 150.982388][ T7001] ? slab_post_alloc_hook+0x8c/0x340 [ 150.987772][ T7001] ? kmem_cache_alloc+0x10f/0x220 [ 150.993065][ T7001] ? xas_load+0x37c/0x390 [ 150.997416][ T7001] ? skb_release_data+0x542/0x560 [ 151.002526][ T7001] ? kmem_cache_free+0x1db/0x3a0 [ 151.007471][ T7001] ? __kfree_skb+0x104/0x140 [ 151.012062][ T7001] ? nlmon_xmit+0x4b/0x60 [ 151.016402][ T7001] ? __kfree_skb+0x104/0x140 [ 151.021039][ T7001] ? consume_skb+0x57/0x180 [ 151.025541][ T7001] ? nlmon_xmit+0x4b/0x60 [ 151.029863][ T7001] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 151.035174][ T7001] ? ref_tracker_free+0x3a1/0x400 [ 151.040412][ T7001] ? __dev_queue_xmit+0xabb/0x1d10 [ 151.045521][ T7001] netlink_rcv_skb+0x126/0x220 [ 151.050362][ T7001] ? rtnetlink_bind+0x60/0x60 [ 151.055100][ T7001] rtnetlink_rcv+0x1c/0x20 [ 151.059517][ T7001] netlink_unicast+0x56f/0x640 [ 151.064342][ T7001] netlink_sendmsg+0x665/0x770 [ 151.069142][ T7001] ? netlink_getsockopt+0x3e0/0x3e0 [ 151.074351][ T7001] ____sys_sendmsg+0x37c/0x4d0 [ 151.079197][ T7001] __sys_sendmsg+0x1e9/0x270 [ 151.083869][ T7001] __x64_sys_sendmsg+0x46/0x50 [ 151.088634][ T7001] do_syscall_64+0x41/0xc0 [ 151.093116][ T7001] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 151.099035][ T7001] RIP: 0033:0x7fbb4510cae9 [ 151.103438][ T7001] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.123125][ T7001] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 151.131533][ T7001] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 151.139496][ T7001] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 151.147461][ T7001] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 151.155463][ T7001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.163509][ T7001] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 151.171981][ T7001] [ 151.174998][ T7011] CPU: 0 PID: 7011 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 151.175270][ T7002] loop1: detected capacity change from 0 to 2048 [ 151.185328][ T7011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 151.185345][ T7011] Call Trace: [ 151.185350][ T7011] [ 151.185356][ T7011] dump_stack_lvl+0xda/0x130 [ 151.212842][ T7011] dump_stack+0x15/0x20 [ 151.217125][ T7011] should_fail_ex+0x21f/0x230 [ 151.221818][ T7011] should_fail+0xb/0x10 [ 151.225990][ T7011] should_fail_usercopy+0x1a/0x20 [ 151.231026][ T7011] _copy_from_user+0x1e/0xd0 [ 151.235689][ T7011] move_addr_to_kernel+0x82/0x110 [ 151.240780][ T7011] __sys_sendto+0x188/0x310 [ 151.245316][ T7011] __x64_sys_sendto+0x78/0x90 [ 151.250031][ T7011] do_syscall_64+0x41/0xc0 [ 151.254521][ T7011] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 151.260461][ T7011] RIP: 0033:0x7fc0ed0e2ae9 [ 151.264867][ T7011] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.284479][ T7011] RSP: 002b:00007fc0ec4440c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 151.293069][ T7011] RAX: ffffffffffffffda RBX: 00007fc0ed202050 RCX: 00007fc0ed0e2ae9 [ 151.301344][ T7011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 151.309500][ T7011] RBP: 00007fc0ec444120 R08: 0000000020000300 R09: 000000000000006e [ 151.317541][ T7011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 01:00:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 37) 01:00:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x2000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 151.325600][ T7011] R13: 000000000000006e R14: 00007fc0ed202050 R15: 00007ffe0a4fa248 [ 151.333570][ T7011] [ 151.380087][ T7018] FAULT_INJECTION: forcing a failure. [ 151.380087][ T7018] name failslab, interval 1, probability 0, space 0, times 0 [ 151.392820][ T7018] CPU: 1 PID: 7018 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 151.403161][ T7018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 151.413238][ T7018] Call Trace: [ 151.416515][ T7018] [ 151.419448][ T7018] dump_stack_lvl+0xda/0x130 [ 151.424033][ T7018] dump_stack+0x15/0x20 [ 151.428234][ T7018] should_fail_ex+0x21f/0x230 [ 151.432927][ T7018] __should_failslab+0x92/0xa0 [ 151.437821][ T7018] should_failslab+0x9/0x20 [ 151.442396][ T7018] slab_pre_alloc_hook+0x38/0x180 [ 151.447556][ T7018] kmem_cache_alloc+0x52/0x220 [ 151.452389][ T7018] ? __kernfs_new_node+0x6a/0x380 [ 151.457448][ T7018] __kernfs_new_node+0x6a/0x380 [ 151.462336][ T7018] ? rb_insert_color+0x263/0x290 [ 151.467296][ T7018] ? up_write+0x30/0xe0 [ 151.471516][ T7018] ? kernfs_activate+0x252/0x270 [ 151.476524][ T7018] kernfs_new_node+0x5f/0xd0 [ 151.481137][ T7018] __kernfs_create_file+0x49/0x180 [ 151.486318][ T7018] ? dev_attr_show+0x90/0x90 [ 151.491037][ T7018] sysfs_add_file_mode_ns+0x136/0x1b0 [ 151.496570][ T7018] internal_create_group+0x2e4/0x800 [ 151.501879][ T7018] sysfs_create_groups+0x3c/0xe0 [ 151.506817][ T7018] device_add_attrs+0x69/0x400 [ 151.511683][ T7018] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 151.517158][ T7018] device_add+0x4e9/0xab0 [ 151.521544][ T7018] netdev_register_kobject+0xfc/0x230 [ 151.526980][ T7018] register_netdevice+0x903/0xcd0 [ 151.531992][ T7018] register_vlan_dev+0x21e/0x460 [ 151.537002][ T7018] vlan_newlink+0x317/0x350 [ 151.541628][ T7018] ? vlan_validate+0x420/0x420 [ 151.546382][ T7018] rtnl_newlink+0xe83/0x1600 [ 151.551016][ T7018] ? rtnl_newlink+0x5d/0x1600 [ 151.555793][ T7018] ? security_capable+0x5e/0x80 [ 151.560664][ T7018] ? ns_capable+0x7c/0xb0 [ 151.565091][ T7018] ? rtnl_setlink+0x300/0x300 [ 151.569794][ T7018] rtnetlink_rcv_msg+0x807/0x8c0 [ 151.574797][ T7018] ? security_inode_alloc+0x32/0xd0 01:00:55 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) (fail_nth: 2) 01:00:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:55 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x1800000000000000) 01:00:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x5000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 151.580007][ T7018] ? slab_post_alloc_hook+0x8c/0x340 [ 151.585340][ T7018] ? kmem_cache_alloc+0x10f/0x220 [ 151.590421][ T7018] ? xas_load+0x37c/0x390 [ 151.594781][ T7018] ? skb_release_data+0x542/0x560 [ 151.599905][ T7018] ? kmem_cache_free+0x1db/0x3a0 [ 151.604862][ T7018] ? __kfree_skb+0x104/0x140 [ 151.609507][ T7018] ? nlmon_xmit+0x4b/0x60 [ 151.614132][ T7018] ? __kfree_skb+0x104/0x140 [ 151.618765][ T7018] ? consume_skb+0x57/0x180 [ 151.623309][ T7018] ? nlmon_xmit+0x4b/0x60 [ 151.627652][ T7018] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 151.632949][ T7018] ? ref_tracker_free+0x3a1/0x400 [ 151.638093][ T7018] ? __dev_queue_xmit+0xabb/0x1d10 [ 151.643222][ T7018] netlink_rcv_skb+0x126/0x220 [ 151.648078][ T7018] ? rtnetlink_bind+0x60/0x60 [ 151.652831][ T7018] rtnetlink_rcv+0x1c/0x20 [ 151.656930][ T7037] FAULT_INJECTION: forcing a failure. [ 151.656930][ T7037] name failslab, interval 1, probability 0, space 0, times 0 [ 151.657328][ T7018] netlink_unicast+0x56f/0x640 [ 151.674664][ T7018] netlink_sendmsg+0x665/0x770 [ 151.679463][ T7018] ? netlink_getsockopt+0x3e0/0x3e0 [ 151.684679][ T7018] ____sys_sendmsg+0x37c/0x4d0 [ 151.689516][ T7018] __sys_sendmsg+0x1e9/0x270 [ 151.694119][ T7018] __x64_sys_sendmsg+0x46/0x50 [ 151.698935][ T7018] do_syscall_64+0x41/0xc0 [ 151.703405][ T7018] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 151.709315][ T7018] RIP: 0033:0x7fbb4510cae9 [ 151.713720][ T7018] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.733809][ T7018] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 151.742408][ T7018] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 151.750378][ T7018] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 151.758338][ T7018] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 151.766396][ T7018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.774372][ T7018] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 151.782361][ T7018] [ 151.785369][ T7037] CPU: 0 PID: 7037 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 151.795805][ T7037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 151.805914][ T7037] Call Trace: [ 151.809194][ T7037] [ 151.812195][ T7037] dump_stack_lvl+0xda/0x130 [ 151.816884][ T7037] dump_stack+0x15/0x20 [ 151.821121][ T7037] should_fail_ex+0x21f/0x230 [ 151.825808][ T7037] __should_failslab+0x92/0xa0 [ 151.830583][ T7037] should_failslab+0x9/0x20 [ 151.835134][ T7037] slab_pre_alloc_hook+0x38/0x180 [ 151.840063][ T7043] FAULT_INJECTION: forcing a failure. [ 151.840063][ T7043] name failslab, interval 1, probability 0, space 0, times 0 [ 151.840166][ T7037] kmem_cache_alloc_node+0x54/0x240 [ 151.858025][ T7037] ? __alloc_skb+0x109/0x2e0 [ 151.862709][ T7037] __alloc_skb+0x109/0x2e0 [ 151.867128][ T7037] ? __rcu_read_unlock+0x4d/0x70 [ 151.872138][ T7037] alloc_skb_with_frags+0x80/0x3e0 [ 151.877247][ T7037] ? prep_new_page+0x5a/0x190 [ 151.881953][ T7037] ? get_page_from_freelist+0x136a/0x13c0 [ 151.887791][ T7037] sock_alloc_send_pskb+0x434/0x4e0 [ 151.893209][ T7037] unix_dgram_sendmsg+0x439/0x1150 [ 151.898417][ T7037] __sys_sendto+0x257/0x310 [ 151.902989][ T7037] __x64_sys_sendto+0x78/0x90 [ 151.907730][ T7037] do_syscall_64+0x41/0xc0 [ 151.912145][ T7037] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 151.918105][ T7037] RIP: 0033:0x7fc0ed0e2ae9 [ 151.922507][ T7037] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 151.943173][ T7037] RSP: 002b:00007fc0ec4440c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 151.951745][ T7037] RAX: ffffffffffffffda RBX: 00007fc0ed202050 RCX: 00007fc0ed0e2ae9 [ 151.960851][ T7037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 151.968829][ T7037] RBP: 00007fc0ec444120 R08: 0000000020000300 R09: 000000000000006e 01:00:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 38) 01:00:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x6000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x30}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 151.976841][ T7037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.984821][ T7037] R13: 000000000000006e R14: 00007fc0ed202050 R15: 00007ffe0a4fa248 [ 151.992986][ T7037] [ 151.996140][ T7043] CPU: 1 PID: 7043 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 152.006822][ T7043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 152.016873][ T7043] Call Trace: [ 152.020141][ T7043] [ 152.023205][ T7043] dump_stack_lvl+0xda/0x130 [ 152.027837][ T7043] dump_stack+0x15/0x20 [ 152.032206][ T7043] should_fail_ex+0x21f/0x230 [ 152.036904][ T7043] __should_failslab+0x92/0xa0 [ 152.041798][ T7043] should_failslab+0x9/0x20 [ 152.046605][ T7043] slab_pre_alloc_hook+0x38/0x180 [ 152.052094][ T7043] kmem_cache_alloc+0x52/0x220 [ 152.056984][ T7043] ? __kernfs_new_node+0x6a/0x380 [ 152.062052][ T7043] __kernfs_new_node+0x6a/0x380 [ 152.066918][ T7043] ? rb_insert_color+0x6a/0x290 [ 152.072449][ T7043] ? up_write+0x30/0xe0 [ 152.076717][ T7043] ? kernfs_activate+0x252/0x270 [ 152.081657][ T7043] kernfs_new_node+0x5f/0xd0 [ 152.086424][ T7043] __kernfs_create_file+0x49/0x180 [ 152.091598][ T7043] ? dev_attr_show+0x90/0x90 [ 152.096275][ T7043] sysfs_add_file_mode_ns+0x136/0x1b0 [ 152.101721][ T7043] internal_create_group+0x2e4/0x800 [ 152.107010][ T7043] sysfs_create_groups+0x3c/0xe0 [ 152.112079][ T7043] device_add_attrs+0x69/0x400 [ 152.116935][ T7043] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 152.122407][ T7043] device_add+0x4e9/0xab0 [ 152.126735][ T7043] netdev_register_kobject+0xfc/0x230 [ 152.132221][ T7043] register_netdevice+0x903/0xcd0 [ 152.137440][ T7043] register_vlan_dev+0x21e/0x460 [ 152.142389][ T7043] vlan_newlink+0x317/0x350 [ 152.146896][ T7043] ? vlan_validate+0x420/0x420 [ 152.152174][ T7043] rtnl_newlink+0xe83/0x1600 [ 152.157010][ T7043] ? rtnl_newlink+0x5d/0x1600 [ 152.161916][ T7043] ? security_capable+0x5e/0x80 [ 152.166760][ T7043] ? ns_capable+0x7c/0xb0 [ 152.171127][ T7043] ? rtnl_setlink+0x300/0x300 [ 152.175802][ T7043] rtnetlink_rcv_msg+0x807/0x8c0 [ 152.180738][ T7043] ? slab_post_alloc_hook+0x8c/0x340 [ 152.186069][ T7043] ? kmem_cache_alloc+0x10f/0x220 [ 152.191092][ T7043] ? xas_load+0x37c/0x390 [ 152.195419][ T7043] ? skb_release_data+0x542/0x560 [ 152.200536][ T7043] ? kmem_cache_free+0x1db/0x3a0 [ 152.205547][ T7043] ? __kfree_skb+0x104/0x140 [ 152.210157][ T7043] ? nlmon_xmit+0x4b/0x60 [ 152.214545][ T7043] ? __kfree_skb+0x104/0x140 [ 152.219130][ T7043] ? consume_skb+0x57/0x180 [ 152.223629][ T7043] ? nlmon_xmit+0x4b/0x60 [ 152.227953][ T7043] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 152.233492][ T7043] ? ref_tracker_free+0x3a1/0x400 [ 152.238525][ T7043] ? __dev_queue_xmit+0xabb/0x1d10 [ 152.243637][ T7043] netlink_rcv_skb+0x126/0x220 [ 152.248486][ T7043] ? rtnetlink_bind+0x60/0x60 [ 152.253288][ T7043] rtnetlink_rcv+0x1c/0x20 [ 152.257741][ T7043] netlink_unicast+0x56f/0x640 [ 152.262511][ T7043] netlink_sendmsg+0x665/0x770 [ 152.267353][ T7043] ? netlink_getsockopt+0x3e0/0x3e0 [ 152.272657][ T7043] ____sys_sendmsg+0x37c/0x4d0 [ 152.277425][ T7043] __sys_sendmsg+0x1e9/0x270 [ 152.282107][ T7043] __x64_sys_sendmsg+0x46/0x50 [ 152.286869][ T7043] do_syscall_64+0x41/0xc0 [ 152.291311][ T7043] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 152.297607][ T7043] RIP: 0033:0x7fbb4510cae9 [ 152.302206][ T7043] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 152.321996][ T7043] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 152.330558][ T7043] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 152.338574][ T7043] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 152.346656][ T7043] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 152.354825][ T7043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.362813][ T7043] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 152.370880][ T7043] 01:00:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) (fail_nth: 3) 01:00:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x7000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0), 0xc) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 39) 01:00:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x3f00000000000000) 01:00:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 152.423977][ T7050] loop1: detected capacity change from 0 to 2048 [ 152.453211][ T7055] __nla_validate_parse: 8 callbacks suppressed [ 152.453223][ T7055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 01:00:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x9000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x500}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 152.500148][ T7055] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 152.530058][ T7067] loop1: detected capacity change from 0 to 2048 [ 152.541909][ T7055] FAULT_INJECTION: forcing a failure. 01:00:56 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x4000010000000000) 01:00:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x5dc}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 152.541909][ T7055] name failslab, interval 1, probability 0, space 0, times 0 [ 152.554763][ T7055] CPU: 1 PID: 7055 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 152.565115][ T7055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 152.575384][ T7055] Call Trace: [ 152.578663][ T7055] [ 152.581599][ T7055] dump_stack_lvl+0xda/0x130 [ 152.586214][ T7055] dump_stack+0x15/0x20 [ 152.590399][ T7055] should_fail_ex+0x21f/0x230 [ 152.595084][ T7055] __should_failslab+0x92/0xa0 [ 152.599856][ T7055] should_failslab+0x9/0x20 [ 152.604636][ T7055] slab_pre_alloc_hook+0x38/0x180 [ 152.609712][ T7055] kmem_cache_alloc+0x52/0x220 [ 152.614489][ T7055] ? __kernfs_new_node+0x6a/0x380 [ 152.619791][ T7055] __kernfs_new_node+0x6a/0x380 [ 152.624681][ T7055] ? rb_insert_color+0x263/0x290 [ 152.629659][ T7055] ? up_write+0x30/0xe0 [ 152.634131][ T7055] ? kernfs_activate+0x252/0x270 [ 152.639085][ T7055] kernfs_new_node+0x5f/0xd0 [ 152.644036][ T7055] __kernfs_create_file+0x49/0x180 [ 152.649254][ T7055] ? dev_attr_show+0x90/0x90 [ 152.653867][ T7055] sysfs_add_file_mode_ns+0x136/0x1b0 [ 152.659699][ T7055] internal_create_group+0x2e4/0x800 [ 152.665003][ T7055] sysfs_create_groups+0x3c/0xe0 [ 152.669966][ T7055] device_add_attrs+0x69/0x400 [ 152.674948][ T7055] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 152.680487][ T7055] device_add+0x4e9/0xab0 [ 152.685091][ T7055] netdev_register_kobject+0xfc/0x230 [ 152.690488][ T7055] register_netdevice+0x903/0xcd0 [ 152.695504][ T7055] register_vlan_dev+0x21e/0x460 [ 152.700515][ T7055] vlan_newlink+0x317/0x350 [ 152.705146][ T7055] ? vlan_validate+0x420/0x420 [ 152.709927][ T7055] rtnl_newlink+0xe83/0x1600 [ 152.714616][ T7055] ? rtnl_newlink+0x5d/0x1600 [ 152.719855][ T7055] ? security_capable+0x5e/0x80 [ 152.725050][ T7055] ? ns_capable+0x7c/0xb0 [ 152.729394][ T7055] ? rtnl_setlink+0x300/0x300 [ 152.734171][ T7055] rtnetlink_rcv_msg+0x807/0x8c0 [ 152.739343][ T7055] ? slab_post_alloc_hook+0x8c/0x340 [ 152.744711][ T7055] ? kmem_cache_alloc+0x10f/0x220 [ 152.749722][ T7055] ? xas_load+0x37c/0x390 [ 152.754039][ T7055] ? skb_release_data+0x542/0x560 [ 152.759052][ T7055] ? kmem_cache_free+0x1db/0x3a0 [ 152.764068][ T7055] ? __kfree_skb+0x104/0x140 [ 152.768726][ T7055] ? nlmon_xmit+0x4b/0x60 [ 152.773068][ T7055] ? __kfree_skb+0x104/0x140 [ 152.777683][ T7055] ? consume_skb+0x57/0x180 [ 152.782174][ T7055] ? nlmon_xmit+0x4b/0x60 [ 152.786554][ T7055] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 152.792038][ T7055] ? ref_tracker_free+0x3a1/0x400 [ 152.797061][ T7055] ? __dev_queue_xmit+0xabb/0x1d10 [ 152.802340][ T7055] netlink_rcv_skb+0x126/0x220 [ 152.807401][ T7055] ? rtnetlink_bind+0x60/0x60 [ 152.812227][ T7055] rtnetlink_rcv+0x1c/0x20 [ 152.816759][ T7055] netlink_unicast+0x56f/0x640 [ 152.821628][ T7055] netlink_sendmsg+0x665/0x770 [ 152.826504][ T7055] ? netlink_getsockopt+0x3e0/0x3e0 [ 152.832012][ T7055] ____sys_sendmsg+0x37c/0x4d0 [ 152.836821][ T7055] __sys_sendmsg+0x1e9/0x270 [ 152.841891][ T7055] __x64_sys_sendmsg+0x46/0x50 [ 152.846738][ T7055] do_syscall_64+0x41/0xc0 [ 152.851144][ T7055] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 152.857145][ T7055] RIP: 0033:0x7fbb4510cae9 [ 152.862246][ T7055] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 152.882314][ T7055] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 152.890736][ T7055] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 152.898843][ T7055] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 152.907086][ T7055] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 152.915176][ T7055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.923152][ T7055] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 152.931110][ T7055] [ 152.971640][ T7083] loop1: detected capacity change from 0 to 2048 01:00:56 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) (fail_nth: 4) 01:00:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x600}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 40) 01:00:56 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) r5 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:56 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x4000080000000000) 01:00:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x700}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xe5ffffff00000000) [ 153.342301][ T7091] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 153.347169][ T7093] loop1: detected capacity change from 0 to 2048 01:00:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10080000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x810}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 153.392748][ T7102] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 153.436379][ T7106] loop1: detected capacity change from 0 to 2048 [ 153.449139][ T7091] FAULT_INJECTION: forcing a failure. [ 153.449139][ T7091] name failslab, interval 1, probability 0, space 0, times 0 [ 153.463099][ T7091] CPU: 1 PID: 7091 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 153.473524][ T7091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 153.483710][ T7091] Call Trace: [ 153.486996][ T7091] [ 153.489916][ T7091] dump_stack_lvl+0xda/0x130 [ 153.494768][ T7091] dump_stack+0x15/0x20 [ 153.499110][ T7091] should_fail_ex+0x21f/0x230 [ 153.503813][ T7091] __should_failslab+0x92/0xa0 [ 153.508783][ T7091] should_failslab+0x9/0x20 [ 153.513376][ T7091] slab_pre_alloc_hook+0x38/0x180 [ 153.518493][ T7091] kmem_cache_alloc+0x52/0x220 [ 153.523256][ T7091] ? __kernfs_new_node+0x6a/0x380 [ 153.528454][ T7091] __kernfs_new_node+0x6a/0x380 [ 153.533463][ T7091] ? rb_insert_color+0x263/0x290 [ 153.538390][ T7091] ? up_write+0x30/0xe0 [ 153.543148][ T7091] ? kernfs_activate+0x252/0x270 [ 153.548143][ T7091] kernfs_new_node+0x5f/0xd0 [ 153.552748][ T7091] __kernfs_create_file+0x49/0x180 [ 153.557964][ T7091] ? dev_attr_show+0x90/0x90 [ 153.562647][ T7091] sysfs_add_file_mode_ns+0x136/0x1b0 [ 153.568047][ T7091] internal_create_group+0x2e4/0x800 [ 153.574377][ T7091] sysfs_create_groups+0x3c/0xe0 [ 153.579432][ T7091] device_add_attrs+0x69/0x400 [ 153.584196][ T7091] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 153.589786][ T7091] device_add+0x4e9/0xab0 [ 153.594202][ T7091] netdev_register_kobject+0xfc/0x230 [ 153.599626][ T7091] register_netdevice+0x903/0xcd0 [ 153.604672][ T7091] register_vlan_dev+0x21e/0x460 [ 153.609669][ T7091] vlan_newlink+0x317/0x350 [ 153.614176][ T7091] ? vlan_validate+0x420/0x420 [ 153.618932][ T7091] rtnl_newlink+0xe83/0x1600 [ 153.623589][ T7091] ? rtnl_newlink+0x5d/0x1600 [ 153.628715][ T7091] ? security_capable+0x5e/0x80 [ 153.633581][ T7091] ? ns_capable+0x7c/0xb0 [ 153.637939][ T7091] ? rtnl_setlink+0x300/0x300 [ 153.642636][ T7091] rtnetlink_rcv_msg+0x807/0x8c0 [ 153.647604][ T7091] ? slab_post_alloc_hook+0x8c/0x340 [ 153.653247][ T7091] ? kmem_cache_alloc+0x10f/0x220 [ 153.658272][ T7091] ? xas_load+0x37c/0x390 [ 153.662686][ T7091] ? skb_release_data+0x542/0x560 [ 153.667728][ T7091] ? kmem_cache_free+0x1db/0x3a0 [ 153.672680][ T7091] ? __kfree_skb+0x104/0x140 [ 153.677322][ T7091] ? nlmon_xmit+0x4b/0x60 [ 153.681675][ T7091] ? __kfree_skb+0x104/0x140 [ 153.686276][ T7091] ? consume_skb+0x57/0x180 [ 153.690956][ T7091] ? nlmon_xmit+0x4b/0x60 [ 153.695311][ T7091] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 153.700880][ T7091] ? ref_tracker_free+0x3a1/0x400 [ 153.705971][ T7091] ? __dev_queue_xmit+0xabb/0x1d10 [ 153.711247][ T7091] netlink_rcv_skb+0x126/0x220 [ 153.716099][ T7091] ? rtnetlink_bind+0x60/0x60 [ 153.720932][ T7091] rtnetlink_rcv+0x1c/0x20 [ 153.725476][ T7091] netlink_unicast+0x56f/0x640 [ 153.730778][ T7091] netlink_sendmsg+0x665/0x770 [ 153.735689][ T7091] ? netlink_getsockopt+0x3e0/0x3e0 [ 153.740905][ T7091] ____sys_sendmsg+0x37c/0x4d0 [ 153.745696][ T7091] __sys_sendmsg+0x1e9/0x270 [ 153.750452][ T7091] __x64_sys_sendmsg+0x46/0x50 [ 153.755340][ T7091] do_syscall_64+0x41/0xc0 [ 153.759833][ T7091] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 153.767085][ T7091] RIP: 0033:0x7fbb4510cae9 [ 153.771869][ T7091] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 153.793387][ T7091] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 153.801922][ T7091] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 153.809995][ T7091] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 153.817976][ T7091] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 153.826132][ T7091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.834141][ T7091] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 153.842208][ T7091] 01:00:57 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) (fail_nth: 5) 01:00:57 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) r5 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x900}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x30000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 41) 01:00:57 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xf6ffffff00000000) 01:00:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3f000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x40000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:57 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0xffffffff00000000) [ 154.239927][ T7121] loop1: detected capacity change from 0 to 2048 [ 154.245299][ T7130] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.282201][ T7130] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.293071][ T7137] FAULT_INJECTION: forcing a failure. [ 154.293071][ T7137] name failslab, interval 1, probability 0, space 0, times 0 [ 154.306002][ T7137] CPU: 1 PID: 7137 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 154.316393][ T7137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 01:00:58 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES8, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 154.325542][ T7140] loop1: detected capacity change from 0 to 2048 [ 154.326540][ T7137] Call Trace: [ 154.326547][ T7137] [ 154.326554][ T7137] dump_stack_lvl+0xda/0x130 [ 154.343903][ T7137] dump_stack+0x15/0x20 [ 154.348321][ T7137] should_fail_ex+0x21f/0x230 [ 154.353093][ T7137] __should_failslab+0x92/0xa0 [ 154.357867][ T7137] should_failslab+0x9/0x20 [ 154.362405][ T7137] slab_pre_alloc_hook+0x38/0x180 [ 154.367738][ T7137] kmem_cache_alloc_lru+0x4e/0x220 [ 154.372880][ T7137] ? __d_alloc+0x3d/0x380 [ 154.377297][ T7137] ? should_fail_ex+0x2d/0x230 [ 154.379264][ T7130] FAULT_INJECTION: forcing a failure. [ 154.379264][ T7130] name failslab, interval 1, probability 0, space 0, times 0 [ 154.382068][ T7137] __d_alloc+0x3d/0x380 [ 154.398867][ T7137] d_alloc_parallel+0x54/0xc90 [ 154.403778][ T7137] ? selinux_inode_permission+0x335/0x410 [ 154.409580][ T7137] ? lockref_get_not_dead+0x12b/0x1d0 [ 154.415223][ T7137] ? down_read+0x16f/0x4a0 [ 154.419712][ T7137] __lookup_slow+0x8d/0x230 [ 154.424252][ T7137] lookup_slow+0x3c/0x60 [ 154.428676][ T7137] walk_component+0x1ec/0x230 [ 154.433531][ T7137] ? path_lookupat+0xfd/0x2a0 [ 154.438233][ T7137] path_lookupat+0x10a/0x2a0 [ 154.442826][ T7137] filename_lookup+0x126/0x300 [ 154.447637][ T7137] kern_path+0x39/0x100 [ 154.451793][ T7137] unix_find_other+0x88/0x550 [ 154.456477][ T7137] unix_dgram_sendmsg+0x851/0x1150 [ 154.461691][ T7137] __sys_sendto+0x257/0x310 [ 154.466209][ T7137] __x64_sys_sendto+0x78/0x90 [ 154.470900][ T7137] do_syscall_64+0x41/0xc0 [ 154.475328][ T7137] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 154.481562][ T7137] RIP: 0033:0x7fc0ed0e2ae9 [ 154.485975][ T7137] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 154.505634][ T7137] RSP: 002b:00007fc0ec4440c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 154.514034][ T7137] RAX: ffffffffffffffda RBX: 00007fc0ed202050 RCX: 00007fc0ed0e2ae9 [ 154.522158][ T7137] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 01:00:58 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) (fail_nth: 6) [ 154.530119][ T7137] RBP: 00007fc0ec444120 R08: 0000000020000300 R09: 000000000000006e [ 154.538081][ T7137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.546059][ T7137] R13: 000000000000006e R14: 00007fc0ed202050 R15: 00007ffe0a4fa248 [ 154.554081][ T7137] [ 154.557103][ T7130] CPU: 0 PID: 7130 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 154.567504][ T7130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 154.577566][ T7130] Call Trace: [ 154.580851][ T7130] [ 154.583790][ T7130] dump_stack_lvl+0xda/0x130 [ 154.588408][ T7130] dump_stack+0x15/0x20 [ 154.592600][ T7130] should_fail_ex+0x21f/0x230 [ 154.597271][ T7130] __should_failslab+0x92/0xa0 [ 154.602030][ T7130] should_failslab+0x9/0x20 [ 154.606590][ T7130] slab_pre_alloc_hook+0x38/0x180 [ 154.611622][ T7130] kmem_cache_alloc+0x52/0x220 [ 154.616391][ T7130] ? __kernfs_new_node+0x6a/0x380 [ 154.621432][ T7130] __kernfs_new_node+0x6a/0x380 [ 154.626278][ T7130] ? rb_insert_color+0x263/0x290 [ 154.631231][ T7130] ? up_write+0x30/0xe0 [ 154.632000][ T7143] FAULT_INJECTION: forcing a failure. [ 154.632000][ T7143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.635464][ T7130] ? kernfs_activate+0x252/0x270 [ 154.635491][ T7130] kernfs_new_node+0x5f/0xd0 [ 154.635543][ T7130] __kernfs_create_file+0x49/0x180 [ 154.663234][ T7130] ? dev_attr_show+0x90/0x90 [ 154.667829][ T7130] sysfs_add_file_mode_ns+0x136/0x1b0 [ 154.673208][ T7130] internal_create_group+0x2e4/0x800 [ 154.678542][ T7130] sysfs_create_groups+0x3c/0xe0 [ 154.683543][ T7130] device_add_attrs+0x69/0x400 [ 154.688300][ T7130] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 154.693760][ T7130] device_add+0x4e9/0xab0 [ 154.698191][ T7130] netdev_register_kobject+0xfc/0x230 [ 154.703587][ T7130] register_netdevice+0x903/0xcd0 [ 154.708641][ T7130] register_vlan_dev+0x21e/0x460 [ 154.713713][ T7130] vlan_newlink+0x317/0x350 [ 154.718299][ T7130] ? vlan_validate+0x420/0x420 [ 154.723054][ T7130] rtnl_newlink+0xe83/0x1600 [ 154.727655][ T7130] ? rb_insert_color+0x6a/0x290 [ 154.732678][ T7130] ? security_capable+0x5e/0x80 [ 154.737536][ T7130] ? ns_capable+0x7c/0xb0 [ 154.741868][ T7130] ? rtnl_setlink+0x300/0x300 [ 154.746575][ T7130] rtnetlink_rcv_msg+0x807/0x8c0 [ 154.751604][ T7130] ? slab_post_alloc_hook+0x8c/0x340 [ 154.756923][ T7130] ? try_charge_memcg+0xb45/0xd20 [ 154.761995][ T7130] ? xas_load+0x37c/0x390 [ 154.766334][ T7130] ? skb_release_data+0x542/0x560 [ 154.771410][ T7130] ? kmem_cache_free+0x1db/0x3a0 [ 154.776354][ T7130] ? __kfree_skb+0x104/0x140 [ 154.780943][ T7130] ? nlmon_xmit+0x4b/0x60 [ 154.785271][ T7130] ? __kfree_skb+0x104/0x140 [ 154.789936][ T7130] ? consume_skb+0x57/0x180 [ 154.794535][ T7130] ? nlmon_xmit+0x4b/0x60 [ 154.798886][ T7130] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 154.804177][ T7130] ? ref_tracker_free+0x3a1/0x400 [ 154.809305][ T7130] ? __dev_queue_xmit+0xabb/0x1d10 [ 154.814761][ T7130] netlink_rcv_skb+0x126/0x220 [ 154.819535][ T7130] ? rtnetlink_bind+0x60/0x60 [ 154.824323][ T7130] rtnetlink_rcv+0x1c/0x20 [ 154.828907][ T7130] netlink_unicast+0x56f/0x640 [ 154.833706][ T7130] netlink_sendmsg+0x665/0x770 [ 154.838533][ T7130] ? netlink_getsockopt+0x3e0/0x3e0 [ 154.843729][ T7130] ____sys_sendmsg+0x37c/0x4d0 [ 154.848533][ T7130] __sys_sendmsg+0x1e9/0x270 [ 154.853240][ T7130] __x64_sys_sendmsg+0x46/0x50 [ 154.858020][ T7130] do_syscall_64+0x41/0xc0 [ 154.862525][ T7130] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 154.868630][ T7130] RIP: 0033:0x7fbb4510cae9 [ 154.873125][ T7130] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 154.893098][ T7130] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 154.901706][ T7130] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 154.909909][ T7130] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 154.918122][ T7130] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 154.926124][ T7130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.934188][ T7130] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 154.942334][ T7130] [ 154.945341][ T7143] CPU: 1 PID: 7143 Comm: syz-executor.3 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 154.955805][ T7143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 154.966093][ T7143] Call Trace: [ 154.969637][ T7143] [ 154.972588][ T7143] dump_stack_lvl+0xda/0x130 [ 154.977196][ T7143] dump_stack+0x15/0x20 [ 154.981452][ T7143] should_fail_ex+0x21f/0x230 [ 154.982119][ T7148] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.986140][ T7143] should_fail+0xb/0x10 [ 154.986162][ T7143] should_fail_usercopy+0x1a/0x20 [ 154.998672][ T7148] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 154.999798][ T7143] _copy_to_user+0x1e/0x90 [ 155.012113][ T7148] FAULT_INJECTION: forcing a failure. [ 155.012113][ T7148] name failslab, interval 1, probability 0, space 0, times 0 [ 155.014203][ T7143] simple_read_from_buffer+0xa0/0x110 [ 155.014249][ T7143] proc_fail_nth_read+0xfc/0x140 [ 155.042111][ T7143] ? proc_fault_inject_write+0x210/0x210 [ 155.047828][ T7143] vfs_read+0x19f/0x5c0 [ 155.052264][ T7143] ? __fget_files+0x1c4/0x200 [ 155.057339][ T7143] ? mutex_lock+0xd/0x30 [ 155.061705][ T7143] ksys_read+0xeb/0x1a0 [ 155.065866][ T7143] __x64_sys_read+0x42/0x50 [ 155.070401][ T7143] do_syscall_64+0x41/0xc0 [ 155.075012][ T7143] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 155.081019][ T7143] RIP: 0033:0x7fc0ed0e178c [ 155.085423][ T7143] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 155.105467][ T7143] RSP: 002b:00007fc0ec4440c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 155.114185][ T7143] RAX: ffffffffffffffda RBX: 00007fc0ed202050 RCX: 00007fc0ed0e178c [ 155.123279][ T7143] RDX: 000000000000000f RSI: 00007fc0ec444130 RDI: 0000000000000005 01:00:58 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0xa, 0x3, 0x3a) r5 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x47ee0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xbb8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 42) [ 155.131447][ T7143] RBP: 00007fc0ec444120 R08: 0000000000000000 R09: 000000000000006e [ 155.139535][ T7143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.148203][ T7143] R13: 000000000000006e R14: 00007fc0ed202050 R15: 00007ffe0a4fa248 [ 155.156183][ T7143] [ 155.159210][ T7148] CPU: 0 PID: 7148 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 155.169566][ T7148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 155.179722][ T7148] Call Trace: [ 155.183104][ T7148] 01:00:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1008}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:58 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x7ffffff7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 155.186310][ T7148] dump_stack_lvl+0xda/0x130 [ 155.190950][ T7148] dump_stack+0x15/0x20 [ 155.195124][ T7148] should_fail_ex+0x21f/0x230 [ 155.200075][ T7148] __should_failslab+0x92/0xa0 [ 155.204948][ T7148] should_failslab+0x9/0x20 [ 155.209516][ T7148] slab_pre_alloc_hook+0x38/0x180 [ 155.214692][ T7148] kmem_cache_alloc+0x52/0x220 [ 155.219545][ T7148] ? __kernfs_new_node+0x6a/0x380 [ 155.225388][ T7148] __kernfs_new_node+0x6a/0x380 [ 155.230337][ T7148] ? rb_insert_color+0x263/0x290 01:00:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8dffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:58 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x97ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 155.235384][ T7148] ? up_write+0x30/0xe0 [ 155.239645][ T7148] ? kernfs_activate+0x252/0x270 [ 155.244864][ T7148] kernfs_new_node+0x5f/0xd0 [ 155.249508][ T7148] __kernfs_create_file+0x49/0x180 [ 155.254898][ T7148] ? dev_attr_show+0x90/0x90 [ 155.260281][ T7148] sysfs_add_file_mode_ns+0x136/0x1b0 [ 155.268390][ T7148] internal_create_group+0x2e4/0x800 [ 155.274099][ T7148] sysfs_create_groups+0x3c/0xe0 [ 155.279085][ T7148] device_add_attrs+0x69/0x400 [ 155.283865][ T7148] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 155.289396][ T7148] device_add+0x4e9/0xab0 [ 155.293749][ T7148] netdev_register_kobject+0xfc/0x230 [ 155.299257][ T7148] register_netdevice+0x903/0xcd0 [ 155.304348][ T7148] register_vlan_dev+0x21e/0x460 [ 155.309319][ T7148] vlan_newlink+0x317/0x350 [ 155.313903][ T7148] ? vlan_validate+0x420/0x420 [ 155.318905][ T7148] rtnl_newlink+0xe83/0x1600 [ 155.323611][ T7148] ? rtnl_newlink+0x5d/0x1600 [ 155.328397][ T7148] ? security_capable+0x5e/0x80 [ 155.333276][ T7148] ? ns_capable+0x7c/0xb0 [ 155.337617][ T7148] ? rtnl_setlink+0x300/0x300 [ 155.342319][ T7148] rtnetlink_rcv_msg+0x807/0x8c0 [ 155.349060][ T7148] ? slab_post_alloc_hook+0x8c/0x340 [ 155.354478][ T7148] ? kmem_cache_alloc+0x10f/0x220 [ 155.359827][ T7148] ? xas_load+0x37c/0x390 [ 155.364194][ T7148] ? skb_release_data+0x542/0x560 [ 155.369316][ T7148] ? kmem_cache_free+0x1db/0x3a0 [ 155.374300][ T7148] ? __kfree_skb+0x104/0x140 [ 155.379022][ T7148] ? nlmon_xmit+0x4b/0x60 [ 155.383379][ T7148] ? __kfree_skb+0x104/0x140 [ 155.387954][ T7148] ? consume_skb+0x57/0x180 [ 155.392441][ T7148] ? nlmon_xmit+0x4b/0x60 [ 155.396908][ T7148] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 155.402233][ T7148] ? ref_tracker_free+0x3a1/0x400 [ 155.407392][ T7148] ? __dev_queue_xmit+0xabb/0x1d10 [ 155.412485][ T7148] netlink_rcv_skb+0x126/0x220 [ 155.417241][ T7148] ? rtnetlink_bind+0x60/0x60 [ 155.422191][ T7148] rtnetlink_rcv+0x1c/0x20 [ 155.426601][ T7148] netlink_unicast+0x56f/0x640 [ 155.431461][ T7148] netlink_sendmsg+0x665/0x770 [ 155.436262][ T7148] ? netlink_getsockopt+0x3e0/0x3e0 [ 155.442237][ T7148] ____sys_sendmsg+0x37c/0x4d0 [ 155.447043][ T7148] __sys_sendmsg+0x1e9/0x270 [ 155.451826][ T7148] __x64_sys_sendmsg+0x46/0x50 [ 155.456745][ T7148] do_syscall_64+0x41/0xc0 [ 155.461155][ T7148] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 155.467301][ T7148] RIP: 0033:0x7fbb4510cae9 [ 155.471791][ T7148] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 155.491847][ T7148] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 155.500501][ T7148] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 155.508546][ T7148] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 155.516575][ T7148] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 155.524562][ T7148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 155.532974][ T7148] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 155.541036][ T7148] [ 155.566856][ T7174] loop1: detected capacity change from 0 to 2048 [ 155.570170][ T7148] syz-executor.2 (7148) used greatest stack depth: 9728 bytes left [ 155.574424][ T7174] FAT-fs (loop1): Unrecognized mount option "ÿ" or missing value 01:00:59 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x2, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb80b0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 1: getuid() (async) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES8, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 43) 01:00:59 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0xa, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3f00}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xdc050000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 155.651154][ T7177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 155.669908][ T7177] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 155.685063][ T7177] FAULT_INJECTION: forcing a failure. [ 155.685063][ T7177] name failslab, interval 1, probability 0, space 0, times 0 01:00:59 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x4, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 155.697877][ T7177] CPU: 0 PID: 7177 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 155.708244][ T7177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 155.718506][ T7177] Call Trace: [ 155.721789][ T7177] [ 155.724991][ T7177] dump_stack_lvl+0xda/0x130 [ 155.729602][ T7177] dump_stack+0x15/0x20 [ 155.733857][ T7177] should_fail_ex+0x21f/0x230 [ 155.738114][ T7189] loop1: detected capacity change from 0 to 2048 [ 155.738531][ T7177] __should_failslab+0x92/0xa0 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 155.746480][ T7189] FAT-fs (loop1): Unrecognized mount option "ÿ" or missing value [ 155.750104][ T7177] should_failslab+0x9/0x20 [ 155.762410][ T7177] slab_pre_alloc_hook+0x38/0x180 [ 155.767520][ T7177] kmem_cache_alloc+0x52/0x220 [ 155.772314][ T7177] ? __kernfs_new_node+0x6a/0x380 [ 155.777454][ T7177] __kernfs_new_node+0x6a/0x380 [ 155.782319][ T7177] ? rb_insert_color+0x263/0x290 [ 155.787445][ T7177] ? up_write+0x30/0xe0 [ 155.791667][ T7177] ? kernfs_activate+0x252/0x270 [ 155.796958][ T7177] kernfs_new_node+0x5f/0xd0 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x47ee}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x11, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 155.801628][ T7177] __kernfs_create_file+0x49/0x180 [ 155.806757][ T7177] ? dev_attr_show+0x90/0x90 [ 155.811436][ T7177] sysfs_add_file_mode_ns+0x136/0x1b0 [ 155.816836][ T7177] internal_create_group+0x2e4/0x800 [ 155.822156][ T7177] sysfs_create_groups+0x3c/0xe0 [ 155.827392][ T7177] device_add_attrs+0x69/0x400 [ 155.832191][ T7177] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 155.837676][ T7177] device_add+0x4e9/0xab0 [ 155.842060][ T7177] netdev_register_kobject+0xfc/0x230 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x80fe}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 155.847675][ T7177] register_netdevice+0x903/0xcd0 [ 155.852816][ T7177] register_vlan_dev+0x21e/0x460 [ 155.857779][ T7177] vlan_newlink+0x317/0x350 [ 155.862313][ T7177] ? vlan_validate+0x420/0x420 [ 155.867178][ T7177] rtnl_newlink+0xe83/0x1600 [ 155.871879][ T7177] ? rtnl_newlink+0x5d/0x1600 [ 155.876665][ T7177] ? security_capable+0x5e/0x80 [ 155.881743][ T7177] ? ns_capable+0x7c/0xb0 [ 155.886084][ T7177] ? rtnl_setlink+0x300/0x300 [ 155.890800][ T7177] rtnetlink_rcv_msg+0x807/0x8c0 [ 155.895803][ T7177] ? slab_post_alloc_hook+0x8c/0x340 [ 155.901136][ T7177] ? kmem_cache_alloc+0x10f/0x220 [ 155.906178][ T7177] ? xas_load+0x37c/0x390 [ 155.910632][ T7177] ? skb_release_data+0x542/0x560 [ 155.915683][ T7177] ? kmem_cache_free+0x1db/0x3a0 [ 155.920630][ T7177] ? __kfree_skb+0x104/0x140 [ 155.925279][ T7177] ? nlmon_xmit+0x4b/0x60 [ 155.929685][ T7177] ? __kfree_skb+0x104/0x140 [ 155.934335][ T7177] ? consume_skb+0x57/0x180 [ 155.938830][ T7177] ? nlmon_xmit+0x4b/0x60 [ 155.943157][ T7177] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 155.948477][ T7177] ? ref_tracker_free+0x3a1/0x400 [ 155.953499][ T7177] ? __dev_queue_xmit+0xabb/0x1d10 [ 155.958613][ T7177] netlink_rcv_skb+0x126/0x220 [ 155.963394][ T7177] ? rtnetlink_bind+0x60/0x60 [ 155.968109][ T7177] rtnetlink_rcv+0x1c/0x20 [ 155.972713][ T7177] netlink_unicast+0x56f/0x640 [ 155.977493][ T7177] netlink_sendmsg+0x665/0x770 [ 155.982292][ T7177] ? netlink_getsockopt+0x3e0/0x3e0 [ 155.987482][ T7177] ____sys_sendmsg+0x37c/0x4d0 [ 155.992320][ T7177] __sys_sendmsg+0x1e9/0x270 [ 155.996965][ T7177] __x64_sys_sendmsg+0x46/0x50 [ 156.001801][ T7177] do_syscall_64+0x41/0xc0 [ 156.006221][ T7177] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 156.012115][ T7177] RIP: 0033:0x7fbb4510cae9 [ 156.016598][ T7177] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.036236][ T7177] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.044663][ T7177] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 01:00:59 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES8, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 32) 01:00:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xf5ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb80b}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0xc0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:59 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:00:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 44) [ 156.052964][ T7177] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 156.060929][ T7177] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 156.068888][ T7177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.076858][ T7177] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 156.084839][ T7177] 01:00:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xf7ffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xdc05}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 156.162927][ T7225] loop1: detected capacity change from 0 to 2048 [ 156.175140][ T7225] FAT-fs (loop1): Unrecognized mount option "ÿ" or missing value [ 156.187077][ T7224] FAULT_INJECTION: forcing a failure. [ 156.187077][ T7224] name failslab, interval 1, probability 0, space 0, times 0 [ 156.199883][ T7224] CPU: 1 PID: 7224 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xee47}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfe800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:00:59 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0xf1d, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:00:59 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfe80}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 156.210281][ T7224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 156.220481][ T7224] Call Trace: [ 156.223893][ T7224] [ 156.226850][ T7224] dump_stack_lvl+0xda/0x130 [ 156.231663][ T7224] dump_stack+0x15/0x20 [ 156.235840][ T7224] should_fail_ex+0x21f/0x230 [ 156.240559][ T7224] __should_failslab+0x92/0xa0 [ 156.245376][ T7224] should_failslab+0x9/0x20 [ 156.249991][ T7224] slab_pre_alloc_hook+0x38/0x180 [ 156.255040][ T7224] kmem_cache_alloc+0x52/0x220 [ 156.259892][ T7224] ? __kernfs_new_node+0x6a/0x380 [ 156.264937][ T7224] __kernfs_new_node+0x6a/0x380 [ 156.269885][ T7224] ? rb_insert_color+0x263/0x290 [ 156.274834][ T7224] ? up_write+0x30/0xe0 [ 156.279035][ T7224] ? kernfs_activate+0x252/0x270 [ 156.284023][ T7224] kernfs_new_node+0x5f/0xd0 [ 156.288692][ T7224] __kernfs_create_file+0x49/0x180 [ 156.293835][ T7224] ? dev_attr_show+0x90/0x90 [ 156.298522][ T7224] sysfs_add_file_mode_ns+0x136/0x1b0 [ 156.303925][ T7224] internal_create_group+0x2e4/0x800 [ 156.309417][ T7224] sysfs_create_groups+0x3c/0xe0 [ 156.314456][ T7224] device_add_attrs+0x69/0x400 [ 156.319338][ T7224] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 156.324870][ T7224] device_add+0x4e9/0xab0 [ 156.329191][ T7224] netdev_register_kobject+0xfc/0x230 [ 156.334646][ T7224] register_netdevice+0x903/0xcd0 [ 156.339709][ T7224] register_vlan_dev+0x21e/0x460 [ 156.344726][ T7224] vlan_newlink+0x317/0x350 [ 156.349353][ T7224] ? vlan_validate+0x420/0x420 [ 156.354179][ T7224] rtnl_newlink+0xe83/0x1600 [ 156.358776][ T7224] ? rtnl_newlink+0x5d/0x1600 [ 156.363596][ T7224] ? security_capable+0x5e/0x80 [ 156.368461][ T7224] ? ns_capable+0x7c/0xb0 [ 156.372840][ T7224] ? rtnl_setlink+0x300/0x300 [ 156.378133][ T7224] rtnetlink_rcv_msg+0x807/0x8c0 [ 156.383056][ T7224] ? __rcu_read_unlock+0x4d/0x70 [ 156.387973][ T7224] ? slab_post_alloc_hook+0x8c/0x340 [ 156.393251][ T7224] ? kmem_cache_alloc+0x10f/0x220 [ 156.398259][ T7224] ? xas_load+0x37c/0x390 [ 156.402587][ T7224] ? skb_release_data+0x542/0x560 [ 156.407673][ T7224] ? kmem_cache_free+0x1db/0x3a0 [ 156.413028][ T7224] ? __kfree_skb+0x104/0x140 [ 156.417767][ T7224] ? nlmon_xmit+0x4b/0x60 [ 156.422177][ T7224] ? __kfree_skb+0x104/0x140 [ 156.426858][ T7224] ? consume_skb+0x57/0x180 [ 156.433353][ T7224] ? nlmon_xmit+0x4b/0x60 [ 156.437978][ T7224] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 156.443314][ T7224] ? ref_tracker_free+0x3a1/0x400 [ 156.448828][ T7224] ? __dev_queue_xmit+0xabb/0x1d10 [ 156.453994][ T7224] netlink_rcv_skb+0x126/0x220 [ 156.458913][ T7224] ? rtnetlink_bind+0x60/0x60 [ 156.463586][ T7224] rtnetlink_rcv+0x1c/0x20 [ 156.468015][ T7224] netlink_unicast+0x56f/0x640 [ 156.473123][ T7224] netlink_sendmsg+0x665/0x770 [ 156.478249][ T7224] ? netlink_getsockopt+0x3e0/0x3e0 [ 156.483572][ T7224] ____sys_sendmsg+0x37c/0x4d0 [ 156.488397][ T7224] __sys_sendmsg+0x1e9/0x270 [ 156.492980][ T7224] __x64_sys_sendmsg+0x46/0x50 [ 156.497812][ T7224] do_syscall_64+0x41/0xc0 [ 156.502217][ T7224] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 156.508501][ T7224] RIP: 0033:0x7fbb4510cae9 [ 156.512916][ T7224] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.532824][ T7224] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.541243][ T7224] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 156.549215][ T7224] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 01:01:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1e, 0xd, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x8, 0x4, 0x8, 0xfffffffffffffff4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func, @cb_func={0x18, 0x1, 0x4, 0x0, 0x8}, @jmp={0x5, 0x1, 0x4, 0x3, 0x4, 0x0, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x1b3, 0x1000, &(0x7f0000000fc0)=""/4096, 0x41100, 0x8, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xd, 0x8, 0x7}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff]}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00'}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x60}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xb) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x856dce437995f705, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="f40700002c000100000000000080130000000000", @ANYRES32=r6, @ANYBLOB="00000000000000000c144500080001"], 0x7f4}}, 0x0) r7 = signalfd(r2, &(0x7f0000000700)={[0x7]}, 0x8) r8 = syz_open_dev$vcsa(&(0x7f0000000940), 0x2, 0x200000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x6, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ldst={0x3, 0x2, 0x0, 0x1, 0xaf82db00f7aec514, 0x50, 0xfffffffffffffff0}, @exit]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0xc6, &(0x7f0000000800)=""/198, 0x41000, 0x5, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000740)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x8, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r8]}, 0x80) r9 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000d40)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x60, 0x2, {{0x2, [], 0x0, [0x4, 0x2], [0x0, 0x4]}, [@TCA_MQPRIO_MODE={0x6, 0x4}]}}}]}, 0x90}}, 0x0) r11 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r11, @ANYRESDEC, @ANYRESHEX=r11], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) getuid() 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x1100, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:00 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x0, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 45) [ 156.557174][ T7224] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 156.565329][ T7224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.573291][ T7224] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 156.581320][ T7224] 01:01:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x40000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x100000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x1d0f, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 156.653869][ T7255] FAULT_INJECTION: forcing a failure. [ 156.653869][ T7255] name failslab, interval 1, probability 0, space 0, times 0 [ 156.666562][ T7255] CPU: 1 PID: 7255 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 156.676991][ T7255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 156.687303][ T7255] Call Trace: [ 156.690593][ T7255] [ 156.693608][ T7255] dump_stack_lvl+0xda/0x130 [ 156.698284][ T7255] dump_stack+0x15/0x20 [ 156.702461][ T7255] should_fail_ex+0x21f/0x230 [ 156.707210][ T7255] __should_failslab+0x92/0xa0 [ 156.712049][ T7255] should_failslab+0x9/0x20 [ 156.716583][ T7255] slab_pre_alloc_hook+0x38/0x180 [ 156.721625][ T7255] kmem_cache_alloc+0x52/0x220 [ 156.726413][ T7255] ? __kernfs_new_node+0x6a/0x380 [ 156.726632][ T26] audit: type=1400 audit(1692320460.334:217): avc: denied { ioctl } for pid=7253 comm="syz-executor.1" path="socket:[32459]" dev="sockfs" ino=32459 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 156.731445][ T7255] __kernfs_new_node+0x6a/0x380 [ 156.761536][ T7255] ? rb_insert_color+0x263/0x290 [ 156.766575][ T7255] ? up_write+0x30/0xe0 [ 156.770749][ T7255] ? kernfs_activate+0x252/0x270 [ 156.775763][ T7255] kernfs_new_node+0x5f/0xd0 [ 156.777819][ T7271] loop1: detected capacity change from 0 to 2048 [ 156.780356][ T7255] __kernfs_create_file+0x49/0x180 [ 156.780384][ T7255] ? dev_attr_show+0x90/0x90 [ 156.796633][ T7255] sysfs_add_file_mode_ns+0x136/0x1b0 [ 156.802010][ T7255] internal_create_group+0x2e4/0x800 [ 156.807417][ T7255] sysfs_create_groups+0x3c/0xe0 [ 156.812387][ T7255] device_add_attrs+0x69/0x400 [ 156.817223][ T7255] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 156.822825][ T7255] device_add+0x4e9/0xab0 [ 156.827575][ T7255] netdev_register_kobject+0xfc/0x230 [ 156.833123][ T7255] register_netdevice+0x903/0xcd0 [ 156.838214][ T7255] register_vlan_dev+0x21e/0x460 [ 156.843671][ T7255] vlan_newlink+0x317/0x350 [ 156.848165][ T7255] ? vlan_validate+0x420/0x420 [ 156.853196][ T7255] rtnl_newlink+0xe83/0x1600 [ 156.857820][ T7255] ? rb_insert_color+0x6a/0x290 [ 156.862713][ T7255] ? security_capable+0x5e/0x80 [ 156.867618][ T7255] ? ns_capable+0x7c/0xb0 [ 156.871946][ T7255] ? rtnl_setlink+0x300/0x300 [ 156.876627][ T7255] rtnetlink_rcv_msg+0x807/0x8c0 [ 156.881615][ T7255] ? slab_post_alloc_hook+0x8c/0x340 [ 156.887028][ T7255] ? try_charge_memcg+0xb45/0xd20 [ 156.892080][ T7255] ? xas_load+0x37c/0x390 [ 156.896424][ T7255] ? skb_release_data+0x542/0x560 [ 156.901509][ T7255] ? kmem_cache_free+0x1db/0x3a0 [ 156.906450][ T7255] ? __kfree_skb+0x104/0x140 [ 156.911065][ T7255] ? nlmon_xmit+0x4b/0x60 [ 156.915500][ T7255] ? __kfree_skb+0x104/0x140 [ 156.920148][ T7255] ? consume_skb+0x57/0x180 [ 156.924652][ T7255] ? nlmon_xmit+0x4b/0x60 [ 156.929057][ T7255] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 156.934422][ T7255] ? ref_tracker_free+0x3a1/0x400 [ 156.939453][ T7255] ? __dev_queue_xmit+0xabb/0x1d10 [ 156.944560][ T7255] netlink_rcv_skb+0x126/0x220 [ 156.949470][ T7255] ? rtnetlink_bind+0x60/0x60 [ 156.954149][ T7255] rtnetlink_rcv+0x1c/0x20 [ 156.958676][ T7255] netlink_unicast+0x56f/0x640 [ 156.963442][ T7255] netlink_sendmsg+0x665/0x770 [ 156.968207][ T7255] ? netlink_getsockopt+0x3e0/0x3e0 [ 156.973486][ T7255] ____sys_sendmsg+0x37c/0x4d0 [ 156.978290][ T7255] __sys_sendmsg+0x1e9/0x270 [ 156.982923][ T7255] __x64_sys_sendmsg+0x46/0x50 [ 156.987691][ T7255] do_syscall_64+0x41/0xc0 [ 156.993514][ T7255] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 157.000612][ T7255] RIP: 0033:0x7fbb4510cae9 [ 157.005113][ T7255] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 157.024732][ T7255] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 157.033138][ T7255] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 157.041183][ T7255] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff8d}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x3e80, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) [ 157.049263][ T7255] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 157.057705][ T7255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 157.065673][ T7255] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 157.073655][ T7255] 01:01:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1e, 0xd, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x8, 0x4, 0x8, 0xfffffffffffffff4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func, @cb_func={0x18, 0x1, 0x4, 0x0, 0x8}, @jmp={0x5, 0x1, 0x4, 0x3, 0x4, 0x0, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x1b3, 0x1000, &(0x7f0000000fc0)=""/4096, 0x41100, 0x8, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xd, 0x8, 0x7}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff]}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00'}, 0x10) (async) r3 = socket(0x11, 0x800000003, 0x0) (async) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x60}}, 0x0) (async) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xb) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x856dce437995f705, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="f40700002c000100000000000080130000000000", @ANYRES32=r6, @ANYBLOB="00000000000000000c144500080001"], 0x7f4}}, 0x0) (async) r7 = signalfd(r2, &(0x7f0000000700)={[0x7]}, 0x8) r8 = syz_open_dev$vcsa(&(0x7f0000000940), 0x2, 0x200000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x6, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ldst={0x3, 0x2, 0x0, 0x1, 0xaf82db00f7aec514, 0x50, 0xfffffffffffffff0}, @exit]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0xc6, &(0x7f0000000800)=""/198, 0x41000, 0x5, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000740)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x8, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r8]}, 0x80) (async) r9 = socket(0x10, 0x3, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000d40)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x60, 0x2, {{0x2, [], 0x0, [0x4, 0x2], [0x0, 0x4]}, [@TCA_MQPRIO_MODE={0x6, 0x4}]}}}]}, 0x90}}, 0x0) (async) r11 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r11, @ANYRESDEC, @ANYRESHEX=r11], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) getuid() 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff97}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 46) 01:01:00 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x0, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfffffff5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 157.174561][ T7289] FAULT_INJECTION: forcing a failure. [ 157.174561][ T7289] name failslab, interval 1, probability 0, space 0, times 0 [ 157.188215][ T7289] CPU: 0 PID: 7289 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 157.198555][ T7289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 157.208700][ T7289] Call Trace: [ 157.212024][ T7289] [ 157.214984][ T7289] dump_stack_lvl+0xda/0x130 [ 157.219696][ T7289] dump_stack+0x15/0x20 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x3ec0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:00 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 157.223862][ T7289] should_fail_ex+0x21f/0x230 [ 157.228645][ T7289] __should_failslab+0x92/0xa0 [ 157.233456][ T7289] should_failslab+0x9/0x20 [ 157.238057][ T7289] slab_pre_alloc_hook+0x38/0x180 [ 157.243113][ T7289] kmem_cache_alloc+0x52/0x220 [ 157.248034][ T7289] ? __kernfs_new_node+0x6a/0x380 [ 157.253279][ T7289] __kernfs_new_node+0x6a/0x380 [ 157.258174][ T7289] ? rb_insert_color+0x263/0x290 [ 157.263118][ T7289] ? up_write+0x30/0xe0 [ 157.267297][ T7289] ? kernfs_activate+0x252/0x270 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 157.272519][ T7289] kernfs_new_node+0x5f/0xd0 [ 157.277354][ T7289] __kernfs_create_file+0x49/0x180 [ 157.282567][ T7289] ? dev_attr_show+0x90/0x90 [ 157.287361][ T7289] sysfs_add_file_mode_ns+0x136/0x1b0 [ 157.292754][ T7289] internal_create_group+0x2e4/0x800 [ 157.298060][ T7289] sysfs_create_groups+0x3c/0xe0 [ 157.303018][ T7289] device_add_attrs+0x69/0x400 [ 157.308226][ T7289] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 157.313811][ T7289] device_add+0x4e9/0xab0 [ 157.318221][ T7289] netdev_register_kobject+0xfc/0x230 [ 157.323876][ T7289] register_netdevice+0x903/0xcd0 [ 157.328927][ T7289] register_vlan_dev+0x21e/0x460 [ 157.333963][ T7289] vlan_newlink+0x317/0x350 [ 157.338826][ T7289] ? vlan_validate+0x420/0x420 [ 157.343606][ T7289] rtnl_newlink+0xe83/0x1600 [ 157.348301][ T7289] ? rb_insert_color+0x6a/0x290 [ 157.353309][ T7289] ? security_capable+0x5e/0x80 [ 157.358376][ T7289] ? ns_capable+0x7c/0xb0 [ 157.362770][ T7289] ? rtnl_setlink+0x300/0x300 [ 157.367570][ T7289] rtnetlink_rcv_msg+0x807/0x8c0 [ 157.373453][ T7289] ? slab_post_alloc_hook+0x8c/0x340 [ 157.379019][ T7289] ? kmem_cache_alloc+0x10f/0x220 [ 157.384077][ T7289] ? xas_load+0x37c/0x390 [ 157.388398][ T7289] ? skb_release_data+0x542/0x560 [ 157.393445][ T7289] ? kmem_cache_free+0x1db/0x3a0 [ 157.398509][ T7289] ? __kfree_skb+0x104/0x140 [ 157.403091][ T7289] ? nlmon_xmit+0x4b/0x60 [ 157.407536][ T7289] ? __kfree_skb+0x104/0x140 [ 157.412115][ T7289] ? consume_skb+0x57/0x180 [ 157.416678][ T7289] ? nlmon_xmit+0x4b/0x60 [ 157.421000][ T7289] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 157.426272][ T7289] ? ref_tracker_free+0x3a1/0x400 [ 157.431289][ T7289] ? __dev_queue_xmit+0xabb/0x1d10 [ 157.436398][ T7289] netlink_rcv_skb+0x126/0x220 [ 157.441284][ T7289] ? rtnetlink_bind+0x60/0x60 [ 157.445954][ T7289] rtnetlink_rcv+0x1c/0x20 [ 157.450438][ T7289] netlink_unicast+0x56f/0x640 [ 157.455271][ T7289] netlink_sendmsg+0x665/0x770 [ 157.460049][ T7289] ? netlink_getsockopt+0x3e0/0x3e0 [ 157.465233][ T7289] ____sys_sendmsg+0x37c/0x4d0 [ 157.470009][ T7289] __sys_sendmsg+0x1e9/0x270 [ 157.474665][ T7289] __x64_sys_sendmsg+0x46/0x50 [ 157.479419][ T7289] do_syscall_64+0x41/0xc0 [ 157.483893][ T7289] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 157.489887][ T7289] RIP: 0033:0x7fbb4510cae9 [ 157.494288][ T7289] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 157.513939][ T7289] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 157.522347][ T7289] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 157.530368][ T7289] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 157.538418][ T7289] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 157.546496][ T7289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 157.554488][ T7289] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 157.562453][ T7289] [ 157.566268][ T7295] __nla_validate_parse: 7 callbacks suppressed 01:01:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1e, 0xd, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x8, 0x4, 0x8, 0xfffffffffffffff4}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func, @cb_func={0x18, 0x1, 0x4, 0x0, 0x8}, @jmp={0x5, 0x1, 0x4, 0x3, 0x4, 0x0, 0xfffffffffffffff0}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit], &(0x7f0000000000)='syzkaller\x00', 0x1b3, 0x1000, &(0x7f0000000fc0)=""/4096, 0x41100, 0x8, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xd, 0x8, 0x7}, 0x10, r1, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[0xffffffffffffffff]}, 0x80) (async, rerun: 32) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00'}, 0x10) (async, rerun: 32) r3 = socket(0x11, 0x800000003, 0x0) (async) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x60}}, 0x0) getsockname$packet(r5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xb) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x856dce437995f705, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="f40700002c000100000000000080130000000000", @ANYRES32=r6, @ANYBLOB="00000000000000000c144500080001"], 0x7f4}}, 0x0) r7 = signalfd(r2, &(0x7f0000000700)={[0x7]}, 0x8) (async, rerun: 32) r8 = syz_open_dev$vcsa(&(0x7f0000000940), 0x2, 0x200000) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x6, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ldst={0x3, 0x2, 0x0, 0x1, 0xaf82db00f7aec514, 0x50, 0xfffffffffffffff0}, @exit]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0xc6, &(0x7f0000000800)=""/198, 0x41000, 0x5, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000740)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0x8, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r8]}, 0x80) (async) r9 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000d40)=@newqdisc={0x90, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x60, 0x2, {{0x2, [], 0x0, [0x4, 0x2], [0x0, 0x4]}, [@TCA_MQPRIO_MODE={0x6, 0x4}]}}}]}, 0x90}}, 0x0) r11 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r11, @ANYRESDEC, @ANYRESHEX=r11], 0x1, 0x522, &(0x7f0000000a80)="$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") (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) getuid() 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x2000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x803e, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:01 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x0, 0x3a) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 47) [ 157.566277][ T7295] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0xc000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 157.621237][ T7328] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 157.640567][ T7328] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 01:01:01 executing program 1: getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[], 0x1, 0x53b, &(0x7f0000000780)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) [ 157.691555][ T7328] FAULT_INJECTION: forcing a failure. [ 157.691555][ T7328] name failslab, interval 1, probability 0, space 0, times 0 [ 157.704271][ T7328] CPU: 0 PID: 7328 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 157.714604][ T7328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 157.724764][ T7328] Call Trace: [ 157.728046][ T7328] [ 157.730979][ T7328] dump_stack_lvl+0xda/0x130 [ 157.735639][ T7328] dump_stack+0x15/0x20 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x5000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x200000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x6000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x7000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 157.739804][ T7328] should_fail_ex+0x21f/0x230 [ 157.744489][ T7328] __should_failslab+0x92/0xa0 [ 157.749291][ T7328] should_failslab+0x9/0x20 [ 157.753875][ T7328] slab_pre_alloc_hook+0x38/0x180 [ 157.759027][ T7328] kmem_cache_alloc+0x52/0x220 [ 157.763805][ T7328] ? __kernfs_new_node+0x6a/0x380 [ 157.768868][ T7328] __kernfs_new_node+0x6a/0x380 [ 157.773784][ T7328] ? rb_insert_color+0x263/0x290 [ 157.779230][ T7328] ? up_write+0x30/0xe0 [ 157.783588][ T7328] ? kernfs_activate+0x252/0x270 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 157.788541][ T7328] kernfs_new_node+0x5f/0xd0 [ 157.793141][ T7328] __kernfs_create_file+0x49/0x180 [ 157.798340][ T7328] ? dev_attr_show+0x90/0x90 [ 157.802950][ T7328] sysfs_add_file_mode_ns+0x136/0x1b0 [ 157.808340][ T7328] internal_create_group+0x2e4/0x800 [ 157.813800][ T7328] sysfs_create_groups+0x3c/0xe0 [ 157.818765][ T7328] device_add_attrs+0x69/0x400 [ 157.823598][ T7328] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 157.829230][ T7328] device_add+0x4e9/0xab0 [ 157.833576][ T7328] netdev_register_kobject+0xfc/0x230 [ 157.839052][ T7328] register_netdevice+0x903/0xcd0 [ 157.844125][ T7328] register_vlan_dev+0x21e/0x460 [ 157.849143][ T7328] vlan_newlink+0x317/0x350 [ 157.853780][ T7328] ? vlan_validate+0x420/0x420 [ 157.858709][ T7328] rtnl_newlink+0xe83/0x1600 [ 157.863319][ T7328] ? rtnl_newlink+0x5d/0x1600 [ 157.868152][ T7328] ? __schedule+0x63b/0x8c0 [ 157.869855][ T7360] loop1: detected capacity change from 0 to 2048 [ 157.872828][ T7328] ? security_capable+0x5e/0x80 [ 157.872857][ T7328] ? rtnl_setlink+0x300/0x300 [ 157.889298][ T7328] rtnetlink_rcv_msg+0x807/0x8c0 [ 157.894316][ T7328] ? __rcu_read_unlock+0x4d/0x70 [ 157.899522][ T7328] ? slab_post_alloc_hook+0x8c/0x340 [ 157.904828][ T7328] ? kmem_cache_alloc+0x10f/0x220 [ 157.910099][ T7328] ? xas_load+0x37c/0x390 [ 157.914484][ T7328] ? skb_release_data+0x542/0x560 [ 157.919599][ T7328] ? kmem_cache_free+0x1db/0x3a0 [ 157.924584][ T7328] ? __kfree_skb+0x104/0x140 [ 157.929198][ T7328] ? nlmon_xmit+0x4b/0x60 [ 157.933699][ T7328] ? __kfree_skb+0x104/0x140 [ 157.938384][ T7328] ? consume_skb+0x57/0x180 [ 157.942948][ T7328] ? nlmon_xmit+0x4b/0x60 [ 157.947356][ T7328] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 157.952798][ T7328] ? ref_tracker_free+0x3a1/0x400 [ 157.957825][ T7328] ? __dev_queue_xmit+0xabb/0x1d10 [ 157.963067][ T7328] netlink_rcv_skb+0x126/0x220 [ 157.968018][ T7328] ? rtnetlink_bind+0x60/0x60 [ 157.973863][ T7328] rtnetlink_rcv+0x1c/0x20 [ 157.978460][ T7328] netlink_unicast+0x56f/0x640 [ 157.983230][ T7328] netlink_sendmsg+0x665/0x770 [ 157.988048][ T7328] ? netlink_getsockopt+0x3e0/0x3e0 [ 157.993300][ T7328] ____sys_sendmsg+0x37c/0x4d0 [ 157.998107][ T7328] __sys_sendmsg+0x1e9/0x270 [ 158.002836][ T7328] __x64_sys_sendmsg+0x46/0x50 [ 158.007700][ T7328] do_syscall_64+0x41/0xc0 [ 158.012297][ T7328] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 158.018220][ T7328] RIP: 0033:0x7fbb4510cae9 [ 158.022624][ T7328] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 158.042635][ T7328] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 158.051054][ T7328] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 158.059204][ T7328] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 158.067169][ T7328] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 158.075205][ T7328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.083327][ T7328] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 01:01:01 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 48) 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x9000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0xc03e, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x300000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 158.091376][ T7328] 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x400000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 1: getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[], 0x1, 0x53b, &(0x7f0000000780)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[], 0x1, 0x53b, &(0x7f0000000780)="$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") (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) (async) 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x33fe0, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:01 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) [ 158.136504][ T7372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x500000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x600000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 158.219981][ T7372] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 158.239175][ T7389] loop1: detected capacity change from 0 to 2048 [ 158.299310][ T7402] FAULT_INJECTION: forcing a failure. [ 158.299310][ T7402] name failslab, interval 1, probability 0, space 0, times 0 [ 158.312091][ T7402] CPU: 1 PID: 7402 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 158.322513][ T7402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 158.332639][ T7402] Call Trace: [ 158.335909][ T7402] [ 158.338820][ T7402] dump_stack_lvl+0xda/0x130 [ 158.343472][ T7402] dump_stack+0x15/0x20 [ 158.347653][ T7402] should_fail_ex+0x21f/0x230 [ 158.352458][ T7402] __should_failslab+0x92/0xa0 [ 158.357274][ T7402] should_failslab+0x9/0x20 [ 158.361894][ T7402] slab_pre_alloc_hook+0x38/0x180 [ 158.367054][ T7402] kmem_cache_alloc+0x52/0x220 [ 158.371826][ T7402] ? __kernfs_new_node+0x6a/0x380 [ 158.376851][ T7402] __kernfs_new_node+0x6a/0x380 [ 158.381752][ T7402] ? rb_insert_color+0x263/0x290 [ 158.386688][ T7402] ? up_write+0x30/0xe0 [ 158.390930][ T7402] ? kernfs_activate+0x252/0x270 [ 158.395887][ T7402] kernfs_new_node+0x5f/0xd0 [ 158.400457][ T7402] __kernfs_create_file+0x49/0x180 [ 158.405644][ T7402] ? dev_attr_show+0x90/0x90 [ 158.410306][ T7402] sysfs_add_file_mode_ns+0x136/0x1b0 [ 158.415806][ T7402] internal_create_group+0x2e4/0x800 [ 158.421110][ T7402] sysfs_create_groups+0x3c/0xe0 [ 158.426081][ T7402] device_add_attrs+0x69/0x400 [ 158.430844][ T7402] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 158.436394][ T7402] device_add+0x4e9/0xab0 [ 158.440770][ T7402] netdev_register_kobject+0xfc/0x230 [ 158.446227][ T7402] register_netdevice+0x903/0xcd0 [ 158.451327][ T7402] register_vlan_dev+0x21e/0x460 [ 158.456349][ T7402] vlan_newlink+0x317/0x350 [ 158.460830][ T7402] ? vlan_validate+0x420/0x420 [ 158.465580][ T7402] rtnl_newlink+0xe83/0x1600 [ 158.470297][ T7402] ? cgroup_rstat_updated+0x8c/0x1c0 [ 158.475567][ T7402] ? __list_del_entry_valid+0x5f/0xe0 [ 158.481009][ T7402] ? _raw_spin_unlock+0x26/0x40 [ 158.485962][ T7402] ? __mutex_lock+0x21c/0x8d0 [ 158.490622][ T7402] ? rtnl_setlink+0x300/0x300 [ 158.495284][ T7402] rtnetlink_rcv_msg+0x807/0x8c0 [ 158.500206][ T7402] ? slab_post_alloc_hook+0x8c/0x340 [ 158.505636][ T7402] ? try_charge_memcg+0xb45/0xd20 [ 158.510724][ T7402] ? xas_load+0x37c/0x390 [ 158.515149][ T7402] ? skb_release_data+0x542/0x560 [ 158.520349][ T7402] ? kmem_cache_free+0x1db/0x3a0 [ 158.525936][ T7402] ? __kfree_skb+0x104/0x140 [ 158.530580][ T7402] ? nlmon_xmit+0x4b/0x60 [ 158.534902][ T7402] ? __kfree_skb+0x104/0x140 [ 158.539545][ T7402] ? consume_skb+0x57/0x180 [ 158.544077][ T7402] ? nlmon_xmit+0x4b/0x60 [ 158.548391][ T7402] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 158.553689][ T7402] ? ref_tracker_free+0x3a1/0x400 [ 158.558699][ T7402] ? __dev_queue_xmit+0xabb/0x1d10 [ 158.563797][ T7402] netlink_rcv_skb+0x126/0x220 [ 158.568573][ T7402] ? rtnetlink_bind+0x60/0x60 [ 158.573667][ T7402] rtnetlink_rcv+0x1c/0x20 [ 158.578170][ T7402] netlink_unicast+0x56f/0x640 [ 158.582935][ T7402] netlink_sendmsg+0x665/0x770 [ 158.587737][ T7402] ? netlink_getsockopt+0x3e0/0x3e0 [ 158.592927][ T7402] ____sys_sendmsg+0x37c/0x4d0 [ 158.597681][ T7402] __sys_sendmsg+0x1e9/0x270 [ 158.602353][ T7402] __x64_sys_sendmsg+0x46/0x50 [ 158.607165][ T7402] do_syscall_64+0x41/0xc0 [ 158.611637][ T7402] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 158.617582][ T7402] RIP: 0033:0x7fbb4510cae9 [ 158.622051][ T7402] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 158.641659][ T7402] RSP: 002b:00007fbb4446e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 49) 01:01:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:02 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x34000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x700000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:02 executing program 1: getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[], 0x1, 0x53b, &(0x7f0000000780)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[], 0x1, 0x53b, &(0x7f0000000780)="$eJzs1T9rE2EcB/Bf0tieTp3F4QEXp1LdnIxICsUDQcmgk4HGJSdCbrlk6kvwBfjCHHwRkqlbpFyqxlYcTO5K+/ks+ZLvk+dP7rh7/+Dj5ORT+eHr5y+R9TvR7cfd7lkn9qMbF04DALhJzpbL+L6stb0XAKAZ3v8AcPu8efvu5fM8H7xOKYtYnFbDalh/1v3RcT44TOd2f/vVoqqGOz/7x6m23t+Je6v+yZX9bjx6WPfn3YtX+R/9Xpxs/fQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHC7HaTUi4iUUsp+fbuoquFO3R+kC/vrfZ2OjvPB4WrAet+L+73GjgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABsQDmbT0ZFMZ7+T4joxCbm+Vfo/KWK7qXBEd9i6/tZD9nqL2100fG0v1q20UVbCs+2MfPTiKvu3qz5S3mtQosPJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoFXlbD4ZFcV4Wra9EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADguihn88moKMbTTYW9y1XbZwQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADa8SMAAP//AIEpCw==") (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) (async) 01:01:02 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10080000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 158.650366][ T7402] RAX: ffffffffffffffda RBX: 00007fbb4522c050 RCX: 00007fbb4510cae9 [ 158.658329][ T7402] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 158.666353][ T7402] RBP: 00007fbb4446e120 R08: 0000000000000000 R09: 0000000000000000 [ 158.674402][ T7402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.682356][ T7402] R13: 000000000000006e R14: 00007fbb4522c050 R15: 00007fff290bdd88 [ 158.690325][ T7402] 01:01:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x800000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x900000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 158.748826][ T7418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 158.752829][ T7414] loop1: detected capacity change from 0 to 2048 01:01:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x30000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 158.789951][ T7418] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 158.845885][ T7418] FAULT_INJECTION: forcing a failure. [ 158.845885][ T7418] name failslab, interval 1, probability 0, space 0, times 0 [ 158.858740][ T7418] CPU: 1 PID: 7418 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 158.869175][ T7418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 158.879225][ T7418] Call Trace: [ 158.882554][ T7418] [ 158.885466][ T7418] dump_stack_lvl+0xda/0x130 [ 158.890048][ T7418] dump_stack+0x15/0x20 [ 158.894244][ T7418] should_fail_ex+0x21f/0x230 [ 158.898926][ T7418] __should_failslab+0x92/0xa0 [ 158.903770][ T7418] should_failslab+0x9/0x20 [ 158.908305][ T7418] slab_pre_alloc_hook+0x38/0x180 [ 158.913320][ T7418] kmem_cache_alloc+0x52/0x220 [ 158.918138][ T7418] ? __kernfs_new_node+0x6a/0x380 [ 158.923768][ T7418] __kernfs_new_node+0x6a/0x380 [ 158.928865][ T7418] ? rb_insert_color+0x263/0x290 [ 158.933791][ T7418] ? up_write+0x30/0xe0 [ 158.937996][ T7418] ? kernfs_activate+0x252/0x270 [ 158.942924][ T7418] kernfs_new_node+0x5f/0xd0 [ 158.947559][ T7418] __kernfs_create_file+0x49/0x180 [ 158.952743][ T7418] ? dev_attr_show+0x90/0x90 [ 158.957337][ T7418] sysfs_add_file_mode_ns+0x136/0x1b0 [ 158.962811][ T7418] internal_create_group+0x2e4/0x800 [ 158.968113][ T7418] sysfs_create_groups+0x3c/0xe0 [ 158.973103][ T7418] device_add_attrs+0x69/0x400 [ 158.977937][ T7418] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 158.983965][ T7418] device_add+0x4e9/0xab0 [ 158.988287][ T7418] netdev_register_kobject+0xfc/0x230 [ 158.994093][ T7418] register_netdevice+0x903/0xcd0 [ 158.999105][ T7418] register_vlan_dev+0x21e/0x460 [ 159.004035][ T7418] vlan_newlink+0x317/0x350 [ 159.008530][ T7418] ? vlan_validate+0x420/0x420 [ 159.013328][ T7418] rtnl_newlink+0xe83/0x1600 [ 159.017920][ T7418] ? rtnl_newlink+0x5d/0x1600 [ 159.022588][ T7418] ? __schedule+0x63b/0x8c0 [ 159.027071][ T7418] ? security_capable+0x5e/0x80 [ 159.032196][ T7418] ? rtnl_setlink+0x300/0x300 [ 159.036863][ T7418] rtnetlink_rcv_msg+0x807/0x8c0 [ 159.041813][ T7418] ? slab_post_alloc_hook+0x8c/0x340 [ 159.047182][ T7418] ? kmem_cache_alloc+0x10f/0x220 [ 159.052255][ T7418] ? xas_load+0x37c/0x390 [ 159.056667][ T7418] ? skb_release_data+0x542/0x560 [ 159.061735][ T7418] ? kmem_cache_free+0x1db/0x3a0 [ 159.066676][ T7418] ? __kfree_skb+0x104/0x140 [ 159.071486][ T7418] ? nlmon_xmit+0x4b/0x60 [ 159.075890][ T7418] ? __kfree_skb+0x104/0x140 [ 159.080624][ T7418] ? consume_skb+0x57/0x180 [ 159.085182][ T7418] ? nlmon_xmit+0x4b/0x60 [ 159.089569][ T7418] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 159.094844][ T7418] ? ref_tracker_free+0x3a1/0x400 [ 159.099941][ T7418] ? __dev_queue_xmit+0xabb/0x1d10 [ 159.105208][ T7418] netlink_rcv_skb+0x126/0x220 [ 159.110063][ T7418] ? rtnetlink_bind+0x60/0x60 [ 159.114789][ T7418] rtnetlink_rcv+0x1c/0x20 [ 159.119374][ T7418] netlink_unicast+0x56f/0x640 [ 159.124132][ T7418] netlink_sendmsg+0x665/0x770 [ 159.128890][ T7418] ? netlink_getsockopt+0x3e0/0x3e0 [ 159.134169][ T7418] ____sys_sendmsg+0x37c/0x4d0 [ 159.139040][ T7418] __sys_sendmsg+0x1e9/0x270 [ 159.143739][ T7418] __x64_sys_sendmsg+0x46/0x50 [ 159.148496][ T7418] do_syscall_64+0x41/0xc0 [ 159.152975][ T7418] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 159.159030][ T7418] RIP: 0033:0x7fbb4510cae9 [ 159.164052][ T7418] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 159.183751][ T7418] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:01:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 50) 01:01:02 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x535, &(0x7f0000000240)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 159.192153][ T7418] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 159.200115][ T7418] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 159.208146][ T7418] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 159.216174][ T7418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.224177][ T7418] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 159.232234][ T7418] [ 159.257342][ T7445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 159.267018][ T7445] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 159.268112][ T7444] loop1: detected capacity change from 0 to 2048 [ 159.282665][ T7445] FAULT_INJECTION: forcing a failure. [ 159.282665][ T7445] name failslab, interval 1, probability 0, space 0, times 0 [ 159.295553][ T7445] CPU: 1 PID: 7445 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 159.305892][ T7445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 159.316022][ T7445] Call Trace: [ 159.319295][ T7445] [ 159.322210][ T7445] dump_stack_lvl+0xda/0x130 [ 159.326827][ T7445] dump_stack+0x15/0x20 [ 159.330965][ T7445] should_fail_ex+0x21f/0x230 [ 159.335642][ T7445] __should_failslab+0x92/0xa0 [ 159.340407][ T7445] should_failslab+0x9/0x20 [ 159.344919][ T7445] slab_pre_alloc_hook+0x38/0x180 [ 159.349940][ T7445] kmem_cache_alloc+0x52/0x220 [ 159.354730][ T7445] ? __kernfs_new_node+0x6a/0x380 [ 159.359754][ T7445] __kernfs_new_node+0x6a/0x380 [ 159.365028][ T7445] ? rb_insert_color+0x6a/0x290 [ 159.369889][ T7445] ? up_write+0x30/0xe0 [ 159.374226][ T7445] ? kernfs_activate+0x252/0x270 [ 159.379224][ T7445] kernfs_new_node+0x5f/0xd0 [ 159.383806][ T7445] __kernfs_create_file+0x49/0x180 [ 159.388956][ T7445] ? dev_attr_show+0x90/0x90 [ 159.393617][ T7445] sysfs_add_file_mode_ns+0x136/0x1b0 [ 159.398983][ T7445] internal_create_group+0x2e4/0x800 [ 159.404349][ T7445] sysfs_create_groups+0x3c/0xe0 [ 159.409340][ T7445] device_add_attrs+0x69/0x400 [ 159.414198][ T7445] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 159.419641][ T7445] device_add+0x4e9/0xab0 [ 159.424036][ T7445] netdev_register_kobject+0xfc/0x230 [ 159.429427][ T7445] register_netdevice+0x903/0xcd0 [ 159.434471][ T7445] register_vlan_dev+0x21e/0x460 [ 159.439417][ T7445] vlan_newlink+0x317/0x350 [ 159.443919][ T7445] ? vlan_validate+0x420/0x420 [ 159.448665][ T7445] rtnl_newlink+0xe83/0x1600 [ 159.453326][ T7445] ? rtnl_newlink+0x5d/0x1600 [ 159.458010][ T7445] ? security_capable+0x5e/0x80 [ 159.462883][ T7445] ? ns_capable+0x7c/0xb0 [ 159.467240][ T7445] ? rtnl_setlink+0x300/0x300 [ 159.472058][ T7445] rtnetlink_rcv_msg+0x807/0x8c0 [ 159.476983][ T7445] ? __rcu_read_unlock+0x4d/0x70 [ 159.481950][ T7445] ? slab_post_alloc_hook+0x8c/0x340 [ 159.487225][ T7445] ? kmem_cache_alloc+0x10f/0x220 [ 159.492233][ T7445] ? xas_load+0x37c/0x390 [ 159.496623][ T7445] ? skb_release_data+0x542/0x560 [ 159.501669][ T7445] ? kmem_cache_free+0x1db/0x3a0 [ 159.506605][ T7445] ? __kfree_skb+0x104/0x140 [ 159.511281][ T7445] ? nlmon_xmit+0x4b/0x60 [ 159.515609][ T7445] ? __kfree_skb+0x104/0x140 [ 159.520190][ T7445] ? consume_skb+0x57/0x180 [ 159.524707][ T7445] ? nlmon_xmit+0x4b/0x60 [ 159.529093][ T7445] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 159.534371][ T7445] ? ref_tracker_free+0x3a1/0x400 [ 159.539411][ T7445] ? __dev_queue_xmit+0xabb/0x1d10 [ 159.544504][ T7445] netlink_rcv_skb+0x126/0x220 [ 159.549332][ T7445] ? rtnetlink_bind+0x60/0x60 [ 159.553999][ T7445] rtnetlink_rcv+0x1c/0x20 01:01:03 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x80040, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3f000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:03 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x0, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:03 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x535, &(0x7f0000000240)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) getuid() (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x535, &(0x7f0000000240)="$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") (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) 01:01:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1008000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 159.558412][ T7445] netlink_unicast+0x56f/0x640 [ 159.563292][ T7445] netlink_sendmsg+0x665/0x770 [ 159.568148][ T7445] ? netlink_getsockopt+0x3e0/0x3e0 [ 159.573375][ T7445] ____sys_sendmsg+0x37c/0x4d0 [ 159.578229][ T7445] __sys_sendmsg+0x1e9/0x270 [ 159.582868][ T7445] __x64_sys_sendmsg+0x46/0x50 [ 159.587654][ T7445] do_syscall_64+0x41/0xc0 [ 159.592084][ T7445] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 159.598078][ T7445] RIP: 0033:0x7fbb4510cae9 01:01:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 159.602500][ T7445] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 159.622436][ T7445] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 159.630862][ T7445] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 159.638944][ T7445] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 159.647035][ T7445] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 01:01:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 159.655041][ T7445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.663272][ T7445] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 159.671351][ T7445] [ 159.676733][ T3186] ================================================================== [ 159.685153][ T3186] BUG: KCSAN: data-race in insert_work / wq_worker_running [ 159.692419][ T3186] [ 159.694719][ T3186] read-write to 0xffff888237c2c8e4 of 4 bytes by task 9 on cpu 0: [ 159.702506][ T3186] wq_worker_running+0x98/0x120 [ 159.707335][ T3186] schedule_timeout+0xcc/0x230 [ 159.712075][ T3186] rcu_exp_sel_wait_wake+0x554/0x1380 [ 159.717424][ T3186] wait_rcu_exp_gp+0x1e/0x30 [ 159.722077][ T3186] process_one_work+0x434/0x860 [ 159.726926][ T3186] worker_thread+0x5f2/0xa10 [ 159.732295][ T3186] kthread+0x1d7/0x210 [ 159.736361][ T3186] ret_from_fork+0x2e/0x40 [ 159.740766][ T3186] ret_from_fork_asm+0x11/0x20 [ 159.745524][ T3186] [ 159.747854][ T3186] read to 0xffff888237c2c8e4 of 4 bytes by task 3186 on cpu 1: [ 159.755988][ T3186] insert_work+0x10e/0x190 [ 159.760384][ T3186] __queue_work+0x722/0x980 [ 159.764869][ T3186] queue_work_on+0x95/0xf0 [ 159.769452][ T3186] wg_queue_enqueue_per_peer_tx+0x127/0x270 [ 159.775339][ T3186] wg_packet_encrypt_worker+0x885/0xa30 [ 159.780864][ T3186] process_one_work+0x434/0x860 [ 159.785691][ T3186] worker_thread+0x5f2/0xa10 [ 159.790268][ T3186] kthread+0x1d7/0x210 [ 159.794325][ T3186] ret_from_fork+0x2e/0x40 [ 159.799280][ T3186] ret_from_fork_asm+0x11/0x20 [ 159.804033][ T3186] 01:01:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 51) 01:01:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x40000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 159.806334][ T3186] value changed: 0x00000000 -> 0x00000001 [ 159.812030][ T3186] [ 159.814329][ T3186] Reported by Kernel Concurrency Sanitizer on: [ 159.820544][ T3186] CPU: 1 PID: 3186 Comm: kworker/1:6 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 159.830683][ T3186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 159.840720][ T3186] Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker [ 159.847211][ T3186] ================================================================== [ 159.915649][ T7471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 159.929120][ T7469] loop1: detected capacity change from 0 to 2048 [ 159.955667][ T7471] FAULT_INJECTION: forcing a failure. [ 159.955667][ T7471] name failslab, interval 1, probability 0, space 0, times 0 [ 159.968504][ T7471] CPU: 1 PID: 7471 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 159.978904][ T7471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 159.988962][ T7471] Call Trace: [ 159.992288][ T7471] [ 159.995212][ T7471] dump_stack_lvl+0xda/0x130 [ 159.999795][ T7471] dump_stack+0x15/0x20 [ 160.003982][ T7471] should_fail_ex+0x21f/0x230 [ 160.008641][ T7471] __should_failslab+0x92/0xa0 [ 160.013478][ T7471] should_failslab+0x9/0x20 [ 160.017965][ T7471] slab_pre_alloc_hook+0x38/0x180 [ 160.023061][ T7471] kmem_cache_alloc+0x52/0x220 [ 160.027868][ T7471] ? __kernfs_new_node+0x6a/0x380 [ 160.032896][ T7471] __kernfs_new_node+0x6a/0x380 [ 160.037772][ T7471] ? rb_insert_color+0x263/0x290 [ 160.042700][ T7471] ? up_write+0x30/0xe0 [ 160.046862][ T7471] ? kernfs_activate+0x252/0x270 [ 160.051790][ T7471] kernfs_new_node+0x5f/0xd0 [ 160.056361][ T7471] __kernfs_create_file+0x49/0x180 [ 160.061630][ T7471] ? dev_attr_show+0x90/0x90 [ 160.066203][ T7471] sysfs_add_file_mode_ns+0x136/0x1b0 [ 160.071576][ T7471] internal_create_group+0x2e4/0x800 [ 160.076907][ T7471] sysfs_create_groups+0x3c/0xe0 [ 160.081920][ T7471] device_add_attrs+0x69/0x400 [ 160.086678][ T7471] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 160.092155][ T7471] device_add+0x4e9/0xab0 [ 160.096466][ T7471] netdev_register_kobject+0xfc/0x230 [ 160.101877][ T7471] register_netdevice+0x903/0xcd0 [ 160.106889][ T7471] register_vlan_dev+0x21e/0x460 [ 160.111828][ T7471] vlan_newlink+0x317/0x350 [ 160.116361][ T7471] ? vlan_validate+0x420/0x420 [ 160.121149][ T7471] rtnl_newlink+0xe83/0x1600 [ 160.125737][ T7471] ? rb_insert_color+0x6a/0x290 [ 160.130605][ T7471] ? security_capable+0x5e/0x80 [ 160.135477][ T7471] ? ns_capable+0x7c/0xb0 [ 160.139821][ T7471] ? rtnl_setlink+0x300/0x300 [ 160.144491][ T7471] rtnetlink_rcv_msg+0x807/0x8c0 [ 160.149486][ T7471] ? slab_post_alloc_hook+0x8c/0x340 [ 160.154904][ T7471] ? try_charge_memcg+0xb45/0xd20 [ 160.159965][ T7471] ? xas_load+0x37c/0x390 [ 160.164367][ T7471] ? skb_release_data+0x542/0x560 [ 160.169518][ T7471] ? kmem_cache_free+0x1db/0x3a0 [ 160.174454][ T7471] ? __kfree_skb+0x104/0x140 [ 160.179118][ T7471] ? nlmon_xmit+0x4b/0x60 [ 160.183454][ T7471] ? __kfree_skb+0x104/0x140 [ 160.188099][ T7471] ? consume_skb+0x57/0x180 [ 160.192592][ T7471] ? nlmon_xmit+0x4b/0x60 [ 160.196941][ T7471] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 160.202209][ T7471] ? ref_tracker_free+0x3a1/0x400 [ 160.207221][ T7471] ? __dev_queue_xmit+0xabb/0x1d10 [ 160.212405][ T7471] netlink_rcv_skb+0x126/0x220 [ 160.217156][ T7471] ? rtnetlink_bind+0x60/0x60 [ 160.221904][ T7471] rtnetlink_rcv+0x1c/0x20 [ 160.226348][ T7471] netlink_unicast+0x56f/0x640 [ 160.231192][ T7471] netlink_sendmsg+0x665/0x770 [ 160.235952][ T7471] ? netlink_getsockopt+0x3e0/0x3e0 [ 160.241196][ T7471] ____sys_sendmsg+0x37c/0x4d0 [ 160.246017][ T7471] __sys_sendmsg+0x1e9/0x270 [ 160.250703][ T7471] __x64_sys_sendmsg+0x46/0x50 [ 160.255467][ T7471] do_syscall_64+0x41/0xc0 [ 160.259875][ T7471] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 160.265761][ T7471] RIP: 0033:0x7fbb4510cae9 [ 160.270198][ T7471] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 160.289880][ T7471] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 160.298354][ T7471] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 160.306334][ T7471] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 160.314297][ T7471] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 160.322345][ T7471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 160.330303][ T7471] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 160.338863][ T7471] 01:01:04 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x400300, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x47ee0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:04 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRESHEX=r0], 0x1, 0x535, &(0x7f0000000240)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:01:04 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x0, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 52) 01:01:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x7ffffff7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x47ee000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8dffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x8dffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x97ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 160.530570][ T7484] loop1: detected capacity change from 0 to 2048 [ 160.557912][ T7489] FAULT_INJECTION: forcing a failure. [ 160.557912][ T7489] name failslab, interval 1, probability 0, space 0, times 0 [ 160.570607][ T7489] CPU: 0 PID: 7489 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 01:01:04 executing program 1: bind$qrtr(0xffffffffffffffff, &(0x7f0000000000)={0x2a, 0x0, 0x4001}, 0xc) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000002a00100025bd7000fddbdf25f4000000d33e0ed17c9901924e39d8863c5518872af2a285a59382ad01bb536b2a011b10142e9383a716ccee3ec2fc745e6a61f79a3d6cba1914c8b77c70512df07b977a9fbffeeb371f16d8999887f500000000000000", @ANYRES32=0x0, @ANYBLOB="0000000031872cf785c00ea3f2aa93781ff7e68bdf16039bcb54d16d8aaf0e41a9b65ff0cc246372fa2884d58e64bd1587f01b7b9487c12391cf318439c057d544ccc5ebccee4e86fe8f6a92ef48e3ff6d4fcfb987ab57419b6e93b64f8df01f4efbbaae34dd0ebb379a757228fbdbbb6a437632a670b8a715fd444f55a325dfa7ccff3c3aa5108fd2"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x4800) [ 160.580938][ T7489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 160.591134][ T7489] Call Trace: [ 160.594418][ T7489] [ 160.597372][ T7489] dump_stack_lvl+0xda/0x130 [ 160.601977][ T7489] dump_stack+0x15/0x20 [ 160.606249][ T7489] should_fail_ex+0x21f/0x230 [ 160.610933][ T7489] __should_failslab+0x92/0xa0 [ 160.615696][ T7489] should_failslab+0x9/0x20 [ 160.620234][ T7489] slab_pre_alloc_hook+0x38/0x180 [ 160.625337][ T7489] kmem_cache_alloc+0x52/0x220 [ 160.630161][ T7489] ? __kernfs_new_node+0x6a/0x380 [ 160.635195][ T7489] __kernfs_new_node+0x6a/0x380 [ 160.640056][ T7489] ? rb_insert_color+0x6a/0x290 [ 160.644926][ T7489] ? up_write+0x30/0xe0 [ 160.649178][ T7489] ? kernfs_activate+0x252/0x270 [ 160.654214][ T7489] kernfs_new_node+0x5f/0xd0 [ 160.658816][ T7489] __kernfs_create_file+0x49/0x180 [ 160.664011][ T7489] ? dev_attr_show+0x90/0x90 [ 160.668614][ T7489] sysfs_add_file_mode_ns+0x136/0x1b0 [ 160.674052][ T7489] internal_create_group+0x2e4/0x800 [ 160.679416][ T7489] sysfs_create_groups+0x3c/0xe0 [ 160.684523][ T7489] device_add_attrs+0x69/0x400 [ 160.689266][ T7489] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 160.694724][ T7489] device_add+0x4e9/0xab0 [ 160.699140][ T7489] netdev_register_kobject+0xfc/0x230 [ 160.704497][ T7489] register_netdevice+0x903/0xcd0 [ 160.709575][ T7489] register_vlan_dev+0x21e/0x460 [ 160.714522][ T7489] vlan_newlink+0x317/0x350 [ 160.719067][ T7489] ? vlan_validate+0x420/0x420 [ 160.723810][ T7489] rtnl_newlink+0xe83/0x1600 [ 160.728498][ T7489] ? rtnl_newlink+0x5d/0x1600 [ 160.733189][ T7489] ? security_capable+0x5e/0x80 [ 160.738023][ T7489] ? ns_capable+0x7c/0xb0 [ 160.742344][ T7489] ? rtnl_setlink+0x300/0x300 [ 160.747008][ T7489] rtnetlink_rcv_msg+0x807/0x8c0 [ 160.751935][ T7489] ? slab_post_alloc_hook+0x8c/0x340 [ 160.757239][ T7489] ? kmem_cache_alloc+0x10f/0x220 [ 160.762249][ T7489] ? xas_load+0x37c/0x390 [ 160.766616][ T7489] ? skb_release_data+0x542/0x560 [ 160.771688][ T7489] ? kmem_cache_free+0x1db/0x3a0 [ 160.776626][ T7489] ? __kfree_skb+0x104/0x140 [ 160.781335][ T7489] ? nlmon_xmit+0x4b/0x60 [ 160.785752][ T7489] ? __kfree_skb+0x104/0x140 [ 160.790330][ T7489] ? consume_skb+0x57/0x180 [ 160.794822][ T7489] ? nlmon_xmit+0x4b/0x60 [ 160.799134][ T7489] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 160.804470][ T7489] ? ref_tracker_free+0x3a1/0x400 [ 160.809573][ T7489] ? __dev_queue_xmit+0xabb/0x1d10 [ 160.814676][ T7489] netlink_rcv_skb+0x126/0x220 [ 160.819927][ T7489] ? rtnetlink_bind+0x60/0x60 [ 160.824728][ T7489] rtnetlink_rcv+0x1c/0x20 [ 160.829146][ T7489] netlink_unicast+0x56f/0x640 [ 160.833914][ T7489] netlink_sendmsg+0x665/0x770 [ 160.838670][ T7489] ? netlink_getsockopt+0x3e0/0x3e0 [ 160.844209][ T7489] ____sys_sendmsg+0x37c/0x4d0 [ 160.848970][ T7489] __sys_sendmsg+0x1e9/0x270 [ 160.853603][ T7489] __x64_sys_sendmsg+0x46/0x50 [ 160.858358][ T7489] do_syscall_64+0x41/0xc0 [ 160.862778][ T7489] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 160.868707][ T7489] RIP: 0033:0x7fbb4510cae9 [ 160.873101][ T7489] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 160.892694][ T7489] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 160.901094][ T7489] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 160.909280][ T7489] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 160.917308][ T7489] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 160.925285][ T7489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 160.933302][ T7489] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 160.941257][ T7489] [ 160.985114][ T7511] loop1: detected capacity change from 0 to 2048 01:01:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x97ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x1000000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 53) 01:01:05 executing program 1: bind$qrtr(0xffffffffffffffff, &(0x7f0000000000)={0x2a, 0x0, 0x4001}, 0xc) (async) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000002a00100025bd7000fddbdf25f4000000d33e0ed17c9901924e39d8863c5518872af2a285a59382ad01bb536b2a011b10142e9383a716ccee3ec2fc745e6a61f79a3d6cba1914c8b77c70512df07b977a9fbffeeb371f16d8999887f500000000000000", @ANYRES32=0x0, @ANYBLOB="0000000031872cf785c00ea3f2aa93781ff7e68bdf16039bcb54d16d8aaf0e41a9b65ff0cc246372fa2884d58e64bd1587f01b7b9487c12391cf318439c057d544ccc5ebccee4e86fe8f6a92ef48e3ff6d4fcfb987ab57419b6e93b64f8df01f4efbbaae34dd0ebb379a757228fbdbbb6a437632a670b8a715fd444f55a325dfa7ccff3c3aa5108fd2"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x4800) 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xa8aaaafffeaaaaaa}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x0, 0xff) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb80b0000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xaa00000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xdc050000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 161.407911][ T7518] loop1: detected capacity change from 0 to 2048 [ 161.426879][ T7521] FAULT_INJECTION: forcing a failure. [ 161.426879][ T7521] name failslab, interval 1, probability 0, space 0, times 0 [ 161.439660][ T7521] CPU: 0 PID: 7521 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 01:01:05 executing program 1: bind$qrtr(0xffffffffffffffff, &(0x7f0000000000)={0x2a, 0x0, 0x4001}, 0xc) (async) r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000002a00100025bd7000fddbdf25f4000000d33e0ed17c9901924e39d8863c5518872af2a285a59382ad01bb536b2a011b10142e9383a716ccee3ec2fc745e6a61f79a3d6cba1914c8b77c70512df07b977a9fbffeeb371f16d8999887f500000000000000", @ANYRES32=0x0, @ANYBLOB="0000000031872cf785c00ea3f2aa93781ff7e68bdf16039bcb54d16d8aaf0e41a9b65ff0cc246372fa2884d58e64bd1587f01b7b9487c12391cf318439c057d544ccc5ebccee4e86fe8f6a92ef48e3ff6d4fcfb987ab57419b6e93b64f8df01f4efbbaae34dd0ebb379a757228fbdbbb6a437632a670b8a715fd444f55a325dfa7ccff3c3aa5108fd2"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x4800) 01:01:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xaaaaaafeffaaaaa8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 161.450085][ T7521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 161.460152][ T7521] Call Trace: [ 161.463438][ T7521] [ 161.466385][ T7521] dump_stack_lvl+0xda/0x130 [ 161.471115][ T7521] dump_stack+0x15/0x20 [ 161.475338][ T7521] should_fail_ex+0x21f/0x230 [ 161.480028][ T7521] __should_failslab+0x92/0xa0 [ 161.484814][ T7521] should_failslab+0x9/0x20 [ 161.489385][ T7521] slab_pre_alloc_hook+0x38/0x180 [ 161.494436][ T7521] kmem_cache_alloc+0x52/0x220 [ 161.499237][ T7521] ? __kernfs_new_node+0x6a/0x380 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xb80b000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 161.504320][ T7521] __kernfs_new_node+0x6a/0x380 [ 161.509298][ T7521] ? rb_insert_color+0x6a/0x290 [ 161.514193][ T7521] ? up_write+0x30/0xe0 [ 161.518421][ T7521] ? kernfs_activate+0x252/0x270 [ 161.523377][ T7521] kernfs_new_node+0x5f/0xd0 [ 161.528005][ T7521] __kernfs_create_file+0x49/0x180 [ 161.533317][ T7521] ? dev_attr_show+0x90/0x90 [ 161.537915][ T7521] sysfs_add_file_mode_ns+0x136/0x1b0 [ 161.543582][ T7521] internal_create_group+0x2e4/0x800 [ 161.548882][ T7521] sysfs_create_groups+0x3c/0xe0 [ 161.553850][ T7521] device_add_attrs+0x69/0x400 [ 161.558636][ T7521] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 161.564241][ T7521] device_add+0x4e9/0xab0 [ 161.568596][ T7521] netdev_register_kobject+0xfc/0x230 [ 161.574039][ T7521] register_netdevice+0x903/0xcd0 [ 161.579100][ T7521] register_vlan_dev+0x21e/0x460 [ 161.584148][ T7521] vlan_newlink+0x317/0x350 [ 161.588662][ T7521] ? vlan_validate+0x420/0x420 [ 161.593536][ T7521] rtnl_newlink+0xe83/0x1600 [ 161.598890][ T7521] ? rtnl_newlink+0x5d/0x1600 [ 161.603671][ T7521] ? security_capable+0x5e/0x80 [ 161.608515][ T7521] ? ns_capable+0x7c/0xb0 [ 161.612914][ T7521] ? rtnl_setlink+0x300/0x300 [ 161.617594][ T7521] rtnetlink_rcv_msg+0x807/0x8c0 [ 161.622603][ T7521] ? security_inode_alloc+0x32/0xd0 [ 161.627827][ T7521] ? slab_post_alloc_hook+0x8c/0x340 [ 161.633185][ T7521] ? kmem_cache_alloc+0x10f/0x220 [ 161.638254][ T7521] ? xas_load+0x37c/0x390 [ 161.642601][ T7521] ? skb_release_data+0x542/0x560 [ 161.647703][ T7521] ? kmem_cache_free+0x1db/0x3a0 [ 161.652744][ T7521] ? __kfree_skb+0x104/0x140 [ 161.657392][ T7521] ? nlmon_xmit+0x4b/0x60 [ 161.661702][ T7521] ? __kfree_skb+0x104/0x140 [ 161.666476][ T7521] ? consume_skb+0x57/0x180 [ 161.671017][ T7521] ? nlmon_xmit+0x4b/0x60 [ 161.675332][ T7521] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 161.680713][ T7521] ? ref_tracker_free+0x3a1/0x400 [ 161.685833][ T7521] ? __dev_queue_xmit+0xabb/0x1d10 [ 161.690945][ T7521] netlink_rcv_skb+0x126/0x220 [ 161.696608][ T7521] ? rtnetlink_bind+0x60/0x60 [ 161.701340][ T7521] rtnetlink_rcv+0x1c/0x20 [ 161.705806][ T7521] netlink_unicast+0x56f/0x640 [ 161.710586][ T7521] netlink_sendmsg+0x665/0x770 [ 161.715372][ T7521] ? netlink_getsockopt+0x3e0/0x3e0 [ 161.720900][ T7521] ____sys_sendmsg+0x37c/0x4d0 [ 161.725735][ T7521] __sys_sendmsg+0x1e9/0x270 [ 161.730436][ T7521] __x64_sys_sendmsg+0x46/0x50 [ 161.735198][ T7521] do_syscall_64+0x41/0xc0 [ 161.739619][ T7521] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 161.745949][ T7521] RIP: 0033:0x7fbb4510cae9 [ 161.750462][ T7521] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 161.770293][ T7521] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 161.778771][ T7521] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 161.786727][ T7521] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 161.794698][ T7521] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 161.802659][ T7521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.810612][ T7521] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 161.818863][ T7521] 01:01:05 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x2000000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xdc05000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xf5ffffff}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 54) 01:01:05 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:05 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/thunderbolt_net', 0x80400, 0x80) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:01:05 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xf7ffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xf5ffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 162.304623][ T7557] FAULT_INJECTION: forcing a failure. [ 162.304623][ T7557] name failslab, interval 1, probability 0, space 0, times 0 [ 162.311903][ T7558] loop1: detected capacity change from 0 to 2048 [ 162.317700][ T7557] CPU: 0 PID: 7557 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 162.334297][ T7557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 162.344490][ T7557] Call Trace: [ 162.347762][ T7557] [ 162.350723][ T7557] dump_stack_lvl+0xda/0x130 [ 162.355435][ T7557] dump_stack+0x15/0x20 [ 162.360299][ T7557] should_fail_ex+0x21f/0x230 [ 162.365026][ T7557] __should_failslab+0x92/0xa0 [ 162.369875][ T7557] should_failslab+0x9/0x20 [ 162.374378][ T7557] slab_pre_alloc_hook+0x38/0x180 [ 162.379471][ T7557] kmem_cache_alloc+0x52/0x220 [ 162.384239][ T7557] ? __kernfs_new_node+0x6a/0x380 [ 162.389267][ T7557] __kernfs_new_node+0x6a/0x380 [ 162.394155][ T7557] ? rb_insert_color+0x6a/0x290 [ 162.399018][ T7557] ? up_write+0x30/0xe0 [ 162.403293][ T7557] ? kernfs_activate+0x252/0x270 [ 162.408248][ T7557] kernfs_new_node+0x5f/0xd0 [ 162.412858][ T7557] __kernfs_create_file+0x49/0x180 [ 162.417991][ T7557] ? dev_attr_show+0x90/0x90 [ 162.422638][ T7557] sysfs_add_file_mode_ns+0x136/0x1b0 [ 162.428023][ T7557] internal_create_group+0x2e4/0x800 [ 162.433323][ T7557] sysfs_create_groups+0x3c/0xe0 [ 162.438888][ T7557] device_add_attrs+0x69/0x400 [ 162.443912][ T7557] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 162.449384][ T7557] device_add+0x4e9/0xab0 [ 162.453812][ T7557] netdev_register_kobject+0xfc/0x230 [ 162.459213][ T7557] register_netdevice+0x903/0xcd0 [ 162.464248][ T7557] register_vlan_dev+0x21e/0x460 [ 162.469250][ T7557] vlan_newlink+0x317/0x350 [ 162.473748][ T7557] ? vlan_validate+0x420/0x420 [ 162.478615][ T7557] rtnl_newlink+0xe83/0x1600 [ 162.483225][ T7557] ? rb_insert_color+0x6a/0x290 [ 162.488132][ T7557] ? security_capable+0x5e/0x80 [ 162.492981][ T7557] ? ns_capable+0x7c/0xb0 [ 162.497433][ T7557] ? rtnl_setlink+0x300/0x300 [ 162.502115][ T7557] rtnetlink_rcv_msg+0x807/0x8c0 [ 162.507326][ T7557] ? __rcu_read_unlock+0x4d/0x70 [ 162.512281][ T7557] ? slab_post_alloc_hook+0x8c/0x340 [ 162.517579][ T7557] ? kmem_cache_alloc+0x10f/0x220 [ 162.522687][ T7557] ? xas_load+0x37c/0x390 [ 162.527019][ T7557] ? skb_release_data+0x542/0x560 [ 162.532049][ T7557] ? kmem_cache_free+0x1db/0x3a0 [ 162.536989][ T7557] ? __kfree_skb+0x104/0x140 [ 162.541577][ T7557] ? nlmon_xmit+0x4b/0x60 [ 162.546011][ T7557] ? __kfree_skb+0x104/0x140 [ 162.550613][ T7557] ? consume_skb+0x57/0x180 [ 162.555136][ T7557] ? nlmon_xmit+0x4b/0x60 [ 162.559469][ T7557] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 162.564765][ T7557] ? ref_tracker_free+0x3a1/0x400 [ 162.569941][ T7557] ? __dev_queue_xmit+0xabb/0x1d10 [ 162.575048][ T7557] netlink_rcv_skb+0x126/0x220 [ 162.579958][ T7557] ? rtnetlink_bind+0x60/0x60 [ 162.584661][ T7557] rtnetlink_rcv+0x1c/0x20 [ 162.589080][ T7557] netlink_unicast+0x56f/0x640 [ 162.593851][ T7557] netlink_sendmsg+0x665/0x770 [ 162.598697][ T7557] ? netlink_getsockopt+0x3e0/0x3e0 [ 162.603993][ T7557] ____sys_sendmsg+0x37c/0x4d0 [ 162.608779][ T7557] __sys_sendmsg+0x1e9/0x270 [ 162.613399][ T7557] __x64_sys_sendmsg+0x46/0x50 [ 162.618167][ T7557] do_syscall_64+0x41/0xc0 [ 162.622646][ T7557] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 162.628625][ T7557] RIP: 0033:0x7fbb4510cae9 [ 162.633028][ T7557] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 01:01:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfe800000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xf7ffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 55) [ 162.652657][ T7557] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 162.661081][ T7557] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 162.669187][ T7557] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 162.677153][ T7557] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 162.685113][ T7557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 162.693151][ T7557] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 162.701225][ T7557] [ 162.759603][ T7580] __nla_validate_parse: 7 callbacks suppressed [ 162.759615][ T7580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 162.775696][ T7580] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 162.802523][ T7580] bridge130: port 1(vlan8) entered blocking state [ 162.810813][ T7580] bridge130: port 1(vlan8) entered disabled state [ 162.818016][ T7580] vlan8: entered allmulticast mode [ 162.823627][ T7580] vlan8: left allmulticast mode 01:01:06 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x4000000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfe80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") (async) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/thunderbolt_net', 0x80400, 0x80) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:01:06 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) r6 = socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r7}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r7, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r10 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r10, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r9, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 56) 01:01:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 1: r0 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/thunderbolt_net', 0x80400, 0x80) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:01:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 163.151684][ T7593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 163.154535][ T7585] loop1: detected capacity change from 0 to 2048 01:01:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff8d}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 163.229779][ T7609] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 163.246809][ T7605] loop1: detected capacity change from 0 to 2048 [ 163.278312][ T7593] bridge131: port 1(vlan8) entered blocking state [ 163.284846][ T7593] bridge131: port 1(vlan8) entered disabled state [ 163.303672][ T7593] vlan8: entered allmulticast mode [ 163.309392][ T7593] vlan8: left allmulticast mode 01:01:07 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0xf1d0000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xffffff97}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:07 executing program 1: r0 = getuid() r1 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x8000, 0x7800, 0x5, 0x9, {{0x1b, 0x4, 0x1, 0x3e, 0x6c, 0x65, 0x0, 0xcb, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@end, @rr={0x7, 0x7, 0xd0, [@dev={0xac, 0x14, 0x14, 0x40}]}, @noop, @lsrr={0x83, 0x17, 0xdf, [@empty, @private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @loopback]}, @timestamp={0x44, 0x24, 0xce, 0x0, 0xd, [0x4, 0x9, 0x1ff, 0xfc, 0xfffffbff, 0x0, 0x80000000, 0x0]}, @generic={0x82, 0x10, "3501fa2d6692c5761d581b695d69"}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x19}, 0x53, r2}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x60}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xb) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x856dce437995f705, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="f40700002c000100000000000080130000000000", @ANYRES32=r5, @ANYBLOB="00000000000000000c144500080001"], 0x7f4}}, 0x0) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r6, 0x4004662b, &(0x7f00000002c0)) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x400100, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f00000004c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xb}}, 0x70, r5}) ioctl$EXT4_IOC_CHECKPOINT(r7, 0x4004662b, &(0x7f00000002c0)) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r9, 0x4004662b, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1434d32e195b6e87, 0x0, &(0x7f00000000c0), &(0x7f0000000180)='GPL\x00', 0x7dde, 0x5b, &(0x7f0000000300)=""/91, 0x41000, 0x0, '\x00', r5, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x2, 0xe000, 0x7fffffff}, 0x10, 0x0, r6, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r7, r9]}, 0x80) fcntl$setlease(r1, 0x400, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) 01:01:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:07 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, r6}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32=r6, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r9 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r8, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 57) 01:01:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x3}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0xfffffff5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 164.035839][ T7624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 164.038995][ T7628] loop1: detected capacity change from 0 to 2048 [ 164.056866][ T7628] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:01:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x5}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 164.086695][ T7637] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 164.126797][ T7624] FAULT_INJECTION: forcing a failure. 01:01:07 executing program 1: r0 = getuid() r1 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$eJzs1b1u01AYBuCvaSiBqTNiOBILU1XYmAhCqVRhCQmUASYiNSwxQooXJ1MvgQvgwhi4CJSpW1BlF2jFWP+oeZ4ln/LaPuc9g/3p8ZfF2dfi849v32M03ovBOB4MLvbiMAZx5TwAgLvkYruNX9tK13sBANrh+w8Au+f9h49vXmXZ5F1Ko4jNeTktp9VvlZ+cZpPjdOngn7s2ZTnd/5M/S5Xr+b14WOfP/5sfxNMnVX6ZvX6b3cjvx1nj7QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYLcdpTSMiJRSOvz776Ysp/tVfpSu3Mir6eQ0mxzXF1zPh/Fo2FoNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4BYUq/Vilufz5R0bIn5Gy4uO6iNtuem4XrYvJ9/k8LKJJ7+IiL4U7NHQ4UsJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVLFaL2Z5Pl8WXe8EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOiLYrVezPJ8vmxw6LojAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0I3fAQAA///PCC46") ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x8000, 0x7800, 0x5, 0x9, {{0x1b, 0x4, 0x1, 0x3e, 0x6c, 0x65, 0x0, 0xcb, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@end, @rr={0x7, 0x7, 0xd0, [@dev={0xac, 0x14, 0x14, 0x40}]}, @noop, @lsrr={0x83, 0x17, 0xdf, [@empty, @private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @loopback]}, @timestamp={0x44, 0x24, 0xce, 0x0, 0xd, [0x4, 0x9, 0x1ff, 0xfc, 0xfffffbff, 0x0, 0x80000000, 0x0]}, @generic={0x82, 0x10, "3501fa2d6692c5761d581b695d69"}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x19}, 0x53, r2}) (async) r3 = socket$netlink(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x60}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xb) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x856dce437995f705, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="f40700002c000100000000000080130000000000", @ANYRES32=r5, @ANYBLOB="00000000000000000c144500080001"], 0x7f4}}, 0x0) (async) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r6, 0x4004662b, &(0x7f00000002c0)) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) (async) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x400100, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f00000004c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xb}}, 0x70, r5}) ioctl$EXT4_IOC_CHECKPOINT(r7, 0x4004662b, &(0x7f00000002c0)) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r9, 0x4004662b, &(0x7f00000002c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1434d32e195b6e87, 0x0, &(0x7f00000000c0), &(0x7f0000000180)='GPL\x00', 0x7dde, 0x5b, &(0x7f0000000300)=""/91, 0x41000, 0x0, '\x00', r5, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x2, 0xe000, 0x7fffffff}, 0x10, 0x0, r6, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r7, r9]}, 0x80) fcntl$setlease(r1, 0x400, 0x1) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 164.126797][ T7624] name failslab, interval 1, probability 0, space 0, times 0 [ 164.139629][ T7624] CPU: 1 PID: 7624 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 164.150059][ T7624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 164.160117][ T7624] Call Trace: [ 164.163401][ T7624] [ 164.166348][ T7624] dump_stack_lvl+0xda/0x130 [ 164.170978][ T7624] dump_stack+0x15/0x20 [ 164.175328][ T7624] should_fail_ex+0x21f/0x230 [ 164.180019][ T7624] __should_failslab+0x92/0xa0 [ 164.184864][ T7624] should_failslab+0x9/0x20 [ 164.189381][ T7624] slab_pre_alloc_hook+0x38/0x180 [ 164.194419][ T7624] kmem_cache_alloc+0x52/0x220 [ 164.199345][ T7624] ? __kernfs_new_node+0x6a/0x380 [ 164.204902][ T7624] __kernfs_new_node+0x6a/0x380 [ 164.209917][ T7624] ? rb_insert_color+0x263/0x290 [ 164.214852][ T7624] ? up_write+0x30/0xe0 [ 164.219008][ T7624] ? kernfs_activate+0x252/0x270 [ 164.223957][ T7624] kernfs_new_node+0x5f/0xd0 [ 164.228855][ T7624] __kernfs_create_file+0x49/0x180 [ 164.233967][ T7624] ? dev_attr_show+0x90/0x90 [ 164.238539][ T7624] sysfs_add_file_mode_ns+0x136/0x1b0 [ 164.243952][ T7624] internal_create_group+0x2e4/0x800 [ 164.249256][ T7624] sysfs_create_groups+0x3c/0xe0 [ 164.254210][ T7624] device_add_attrs+0x69/0x400 [ 164.258999][ T7624] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 164.264511][ T7624] device_add+0x4e9/0xab0 [ 164.268825][ T7624] netdev_register_kobject+0xfc/0x230 [ 164.274204][ T7624] register_netdevice+0x903/0xcd0 [ 164.279303][ T7624] register_vlan_dev+0x21e/0x460 [ 164.284371][ T7624] vlan_newlink+0x317/0x350 [ 164.288914][ T7624] ? vlan_validate+0x420/0x420 [ 164.293765][ T7624] rtnl_newlink+0xe83/0x1600 [ 164.298431][ T7624] ? rtnl_newlink+0x5d/0x1600 [ 164.303285][ T7624] ? security_capable+0x5e/0x80 [ 164.308139][ T7624] ? ns_capable+0x7c/0xb0 [ 164.312450][ T7624] ? rtnl_setlink+0x300/0x300 [ 164.317190][ T7624] rtnetlink_rcv_msg+0x807/0x8c0 [ 164.322209][ T7624] ? slab_post_alloc_hook+0x8c/0x340 [ 164.327492][ T7624] ? kmem_cache_alloc+0x10f/0x220 [ 164.332515][ T7624] ? xas_load+0x37c/0x390 [ 164.336862][ T7624] ? skb_release_data+0x542/0x560 [ 164.341914][ T7624] ? kmem_cache_free+0x1db/0x3a0 [ 164.346863][ T7624] ? __kfree_skb+0x104/0x140 [ 164.351528][ T7624] ? nlmon_xmit+0x4b/0x60 [ 164.355889][ T7624] ? __kfree_skb+0x104/0x140 [ 164.360472][ T7624] ? consume_skb+0x57/0x180 [ 164.365039][ T7624] ? nlmon_xmit+0x4b/0x60 [ 164.369362][ T7624] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 164.374636][ T7624] ? ref_tracker_free+0x3a1/0x400 [ 164.379664][ T7624] ? __dev_queue_xmit+0xabb/0x1d10 [ 164.384804][ T7624] netlink_rcv_skb+0x126/0x220 [ 164.389612][ T7624] ? rtnetlink_bind+0x60/0x60 [ 164.394310][ T7624] rtnetlink_rcv+0x1c/0x20 [ 164.398734][ T7624] netlink_unicast+0x56f/0x640 [ 164.403525][ T7624] netlink_sendmsg+0x665/0x770 [ 164.408326][ T7624] ? netlink_getsockopt+0x3e0/0x3e0 [ 164.413557][ T7624] ____sys_sendmsg+0x37c/0x4d0 [ 164.418320][ T7624] __sys_sendmsg+0x1e9/0x270 [ 164.422916][ T7624] __x64_sys_sendmsg+0x46/0x50 [ 164.427694][ T7624] do_syscall_64+0x41/0xc0 [ 164.432179][ T7624] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 164.438088][ T7624] RIP: 0033:0x7fbb4510cae9 [ 164.442490][ T7624] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 164.462274][ T7624] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 164.470704][ T7624] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 164.478730][ T7624] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 164.486697][ T7624] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 164.494694][ T7624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 164.502651][ T7624] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 164.510640][ T7624] [ 164.533350][ T7652] loop1: detected capacity change from 0 to 2048 [ 164.551640][ T7652] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:01:08 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x11000000, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x10000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x6}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 58) 01:01:08 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r6 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r8 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r7, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:08 executing program 1: r0 = getuid() r1 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x8000, 0x7800, 0x5, 0x9, {{0x1b, 0x4, 0x1, 0x3e, 0x6c, 0x65, 0x0, 0xcb, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@end, @rr={0x7, 0x7, 0xd0, [@dev={0xac, 0x14, 0x14, 0x40}]}, @noop, @lsrr={0x83, 0x17, 0xdf, [@empty, @private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @loopback]}, @timestamp={0x44, 0x24, 0xce, 0x0, 0xd, [0x4, 0x9, 0x1ff, 0xfc, 0xfffffbff, 0x0, 0x80000000, 0x0]}, @generic={0x82, 0x10, "3501fa2d6692c5761d581b695d69"}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x19}, 0x53, r2}) (async) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x60}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xb) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async, rerun: 64) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x856dce437995f705, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) (async, rerun: 64) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a40)=ANY=[@ANYBLOB="f40700002c000100000000000080130000000000", @ANYRES32=r5, @ANYBLOB="00000000000000000c144500080001"], 0x7f4}}, 0x0) (async, rerun: 32) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x0) (rerun: 32) ioctl$EXT4_IOC_CHECKPOINT(r6, 0x4004662b, &(0x7f00000002c0)) (async) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x400100, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f00000004c0)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xb}}, 0x70, r5}) ioctl$EXT4_IOC_CHECKPOINT(r7, 0x4004662b, &(0x7f00000002c0)) (async) r9 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_CHECKPOINT(r9, 0x4004662b, &(0x7f00000002c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1434d32e195b6e87, 0x0, &(0x7f00000000c0), &(0x7f0000000180)='GPL\x00', 0x7dde, 0x5b, &(0x7f0000000300)=""/91, 0x41000, 0x0, '\x00', r5, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x2, 0xe000, 0x7fffffff}, 0x10, 0x0, r6, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, r7, r9]}, 0x80) (async) fcntl$setlease(r1, 0x400, 0x1) (async, rerun: 32) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 32) 01:01:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x7}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 164.885775][ T7664] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 164.896103][ T7667] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 164.925451][ T7664] FAULT_INJECTION: forcing a failure. 01:01:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x80000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 164.925451][ T7664] name failslab, interval 1, probability 0, space 0, times 0 [ 164.938273][ T7664] CPU: 1 PID: 7664 Comm: syz-executor.2 Not tainted 6.5.0-rc6-syzkaller-00038-g16931859a650 #0 [ 164.948739][ T7664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 164.958799][ T7664] Call Trace: [ 164.962086][ T7664] [ 164.965018][ T7664] dump_stack_lvl+0xda/0x130 [ 164.969670][ T7664] dump_stack+0x15/0x20 [ 164.973833][ T7664] should_fail_ex+0x21f/0x230 [ 164.978584][ T7664] __should_failslab+0x92/0xa0 01:01:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x200000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) [ 164.983364][ T7664] should_failslab+0x9/0x20 [ 164.987937][ T7664] slab_pre_alloc_hook+0x38/0x180 [ 164.993042][ T7664] kmem_cache_alloc+0x52/0x220 [ 164.997920][ T7664] ? __kernfs_new_node+0x6a/0x380 [ 165.002995][ T7664] __kernfs_new_node+0x6a/0x380 [ 165.007865][ T7664] ? rb_insert_color+0x6a/0x290 [ 165.012723][ T7664] ? up_write+0x30/0xe0 [ 165.016894][ T7664] ? kernfs_activate+0x252/0x270 [ 165.021846][ T7664] kernfs_new_node+0x5f/0xd0 [ 165.026441][ T7664] __kernfs_create_file+0x49/0x180 [ 165.031564][ T7664] ? dev_attr_show+0x90/0x90 01:01:08 executing program 1: r0 = getuid() r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = syz_io_uring_setup(0x4786, &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000040)) io_uring_enter(r2, 0x2, 0x0, 0x0, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) r4 = syz_io_uring_setup(0x4786, &(0x7f0000000140), &(0x7f0000000100), &(0x7f0000000040)) io_uring_enter(r4, 0x2, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4786, &(0x7f0000000140), &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_devices(r7, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd=r8}) r9 = syz_io_uring_setup(0x3046, &(0x7f0000000180)={0x0, 0x5435, 0x200, 0x1, 0x2ab}, &(0x7f0000000700), &(0x7f0000000740)) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r11, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) r13 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) close(r13) fcntl$setstatus(r13, 0x4, 0x2c00) r14 = gettid() fcntl$setown(r13, 0x8, r14) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r16, 0x0) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r17, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) sendmsg$netlink(r1, &(0x7f0000000900)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff}, 0xc, &(0x7f0000000080)=[{&(0x7f0000000240)={0x4bc, 0x14, 0x8, 0x70bd25, 0x25dfdbfe, "", [@generic="6c9cd9d68c2e20ecc360b7f98a724ec7a19ac053e18214855a52c647ba748829b5f6f48039e99460e717a4de694b92bc1d9b8e05284ced8cb73a887c19f51b2e4b2b7f11d5c266bd006788c83b1f3424bea573b43607ad3e367c81e483832253359ccb4595180ca1f34db796d57d69eba8e538b13754a4907f9897fa86cca9e645bba2f44ed629b588c17c0e9ec4f9fb42", @nested={0x4e, 0xb, 0x0, 0x1, [@generic="ef71f2f3319bad98b523464537a39dab1e3c505f0fe117675e35ef20d82cfffef8434acceee830a1e58f21354009f079c34bd8a817d9145428f82883b71fd446db10d4656d9480a67ba1"]}, @nested={0x2e9, 0x87, 0x0, 0x1, [@typed={0x44, 0x59, 0x0, 0x0, @binary="c943b5fc5372c82e8b2a14a2d5da3aa376a2b15b51bbe09c9fa476c92bec733bb674f97c59d362723bfa24785e62144ae3e562d344b406f5a7d4b621bf5e5b05"}, @generic="47029de1f7c0eec95e7785b875654200de2f2e1588b2e4a78c9b2b192f30891bebdf8b27307d484454cace1845f98a6cccb0f2bdd26aa7b6ee08b1", @generic="7d445454801721fc3365ea4ca9456884a056", @generic="7b08dbc329ac6b486f735e6ee0a9", @typed={0x8, 0x53, 0x0, 0x0, @uid=r0}, @typed={0xef, 0x21, 0x0, 0x0, @binary="600410eabc67da326c1c560dfd817f6af8a6d2368266af54d7fa97da1323b095050b88d3ba2c97e785ad746dd9e9648c3a174d2abe6ba73a3889468303ad972cf1081eb3a9cf76275f4abde2c6adaa0189e8d232c7b219457e678208112f371986ea0b517791bbb9136752c2896787797b1dbb15aec2ce7b2879a2e8769a543a49742937f73b931b748dd50183d57a4da49182dd7124894fb0b7aaf38f1724123e198c0d4f1bd9e969dd32ffeaf2bacaf1ddfc6ef3108282448ffec852f7ce3bee0aa5b64452a5e90e86203a9b6d4328a0826ca1410dce5b85af7ee068d7909304b22b367acc7b6f648b64"}, @generic="2216b188b22f95a8ac35d8dbd237cc8e906b1db3a823eb929e45feca368f8924123c648e4de672c967a223b7e4c73b0decf5a85f38ee71d0e6995cd30f6558a48cb44c19efc3210ad09de660cd1bff3ad2cd707003a24ad8e3a783d463bd7844586654a2c9a8a2265d42002c929c92322ace6254fcf22335f72acde0ba46102eda12047afb49da8e5a426296efd51cfa22985c0f56f1b2e69b08338a6863a1f138e1c4035092d87b3cce9e4439d1cdc06dc00e0785c65e29ea5b2196407276cd1fb52cb1c5e404d5dd19e874e36e139d544f", @generic="89e0e458dae1aeb4ca13f0f4004c8afa7464486a8b377c07", @generic="e8850a8339cdbc25e3260498dd3dd393e2e15a4c037e5f16f12790e4d09db835bd02a1d9b83078d9fd7704f120ccc1385b405ddb8512cba181a7f62558480ccd7967bc7bb0491ad7b4b34c681f686792810103246714b19a7c52e1cb476ed4384e672845"]}, @nested={0xda, 0x95, 0x0, 0x1, [@generic="d4a10fdfa9ba5944f26a784e1e7d544323bc7dfb14bf7d6b4081acfc9438046051c80451ca1dcdd13ef191504c1bb6aecc3111e2ce8802c71c4bfb7c0f34474c57c7b691293b2d1f0ce0219554a910eb8a947978f123391f944bee3a5ab692a087c021ca44c6abf26c50cd5af860d9702dbd6d7ff86b279fa2", @generic="ea31586afefa3794b15a8741507c02ef1487192cf7881e16e8f21d6b0f0cf6553359e7c5f62e0c897d73cfd6b51bbdef7bec20f0307625ece83c48f011839f9a8e95312bf6b25b3a7408d8c6c9fbc05cbacbde1185b0806f2152c1bb42"]}]}, 0x4bc}, {&(0x7f0000000fc0)={0x1834, 0x22, 0x4, 0x70bd26, 0x25dfdbfb, "", [@nested={0x192, 0x93, 0x0, 0x1, [@typed={0xc, 0x8d, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0x73, 0x0, 0x0, @fd=r2}, @typed={0x14, 0x4c, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x8, 0x89, 0x0, 0x0, @uid=r0}, @generic="a159f93eb5bd9dacd4c80c0b9605237038870ca2d9b8a2efa9c3861e3548fd5ab025aeba8665e1f843439cf2ded585eac0fa1eb719ae8ca47c1f58e8e6bfa5acdca72c9bebb0f5fa4a1a617e4994b23760c36f9f06ccc2bc41a09d386bfe18e6f07e069d5274324d164253f2ef935e7f04cfbba85084cd067b6a67fdf4da4a071fe3987d1913dd49d60202c8da9102b27a19149c09826894c1adc4", @generic="a08e89a323c6a82249f699f2f36269ebc7d71388c9f2208bdadec722c65343c86ff296fdd3455fdebb5cfb98e4f0d00776c1558cde5bb6f16b3fae896f9a62826db632004836f2db12450f2d1441730cdd361ca10ac7ffda95509d1b967422ef8a60a922ec06ccee66301cef020a88a973a5584513baf6e380151d4c6a1d687194c190a2b1eadd128cd39bb978f32a8a9deeaa0dae993812084c864e0e826bfb0c24e676cd", @generic="2644520f47a7a6ae391881f3db80b626f7693cbac274cbeecf680b32bca6"]}, @generic="8e68c5d67ea9b59f3a368cd3f244c4c35218ce62b7a7378e814ae0ac5e1934b94a0686e4811f869086a90093d04669f460b1344c596bf255d55a98d3998aef69124154bccaae3b0eb7bee02f3e75ba47fc18dc616d59ce881b3f73df8f34f2727c9b9c113e878837d96b3e71ba9bb6aa4f918d34693304c3966f8052876f9d5b22d2247d599b9289be6b31a319cc7ea298f418607e45d82d99e292a3978b8273d3ac77", @generic="497749de13c64fd3ecc6fe21b1d3479c40fbe248f0b44c0208bfe078fd08f36eb8d8219c201ce184b5d39891df561e06ca2886d6362c862ed5fece54f84041f0507cf6618c115cd5c47b828171c549da727b31913e53d3cc3148c55979ee5e07f017d4965f8b2c2cfe97c2c3b0c2312ece645ac09b6ecc358860b630ee544d77a256459af86d51db388ca130", @generic="5ec6b32b7259f58e1b60cb73a945e783ba2e61f4dc265b90da2a8da17d406ca2ba2c41ac0933127c54b70d3aecac3ae0712989316cc340e60b9f596f7176e7195d6a21b5f37f1bbb919eb9732a228fe6e44d19609ff2e9e6491d61199477c40be33fb64f678e7a9ab2bf710502dfe03791cea220b96e6c815fad48c61774e7b491891dbca8bdce224b6bd1b6cf282795", @typed={0x5d, 0x7f, 0x0, 0x0, @binary="43fa6abf266e000f14773262f1b1ca150c9ebd8d3ba7d5f086b1cb7c24496c72f14483a1eb133d83c250f24278c4c7850b2ae56ba22085352874bf69f1189c652dcb0eb0efa9a102b1a8ec5ec8e5768aec4e4eb1dc3c7dfd92"}, @nested={0x18a, 0x3c, 0x0, 0x1, [@generic="dc7cb81fb1a3ea803348de00451251a233e299515fcad5233f3e98154f8eeceb08de1aa995a17eb9f56654bf15575a677839dd255741180926084f63e21800aad3121821591ac4e960f655f706a0edf0cab5874f612585fe6aa7767cfbd8392373f9738b73d6b22fa36d50417347f2", @generic="96ccef54fabc89e1634c39051ae9e19399fea173d22ae36329b36e3dc96389fb1a776ad8f5bb624403925b9960bf8ed7", @generic="9156ad4a7dc0540651af2d6c40b790ffe0934abe2d6c1c02656841b882294957ff971d18eab33f0feb625c1c9688a0c52f3fc2e837df7282ab9d03cd25dcc0c171b0f9146236be7c69c8cb3e22ce8a70149b7e086a436d547c05c35433be59d28f5152eadc626eebc9b1e4d1688e15f4761e6d01a50d28dbb78d833472356c1e91139a7cb82df71c3fa6c081686946d59338407ca62986eee4bcb42813a7a95bdfa1ce3a145d9cdb846e4545cb7f6afd92a6661a2722e655cd53196324ab156ac2f0f8a8b08efa37293a2e", @typed={0x14, 0x3c, 0x0, 0x0, @ipv6=@private1}, @typed={0x8, 0x63, 0x0, 0x0, @ipv4=@multicast2}]}, @nested={0x1024, 0x5a, 0x0, 0x1, [@generic="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", @typed={0x14, 0x19, 0x0, 0x0, @ipv6=@empty}, @typed={0x8, 0x68, 0x0, 0x0, @pid}, @typed={0x4, 0x74}]}, @typed={0x14, 0x2, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}, @nested={0x2a2, 0x18, 0x0, 0x1, [@typed={0x14, 0x7c, 0x0, 0x0, @ipv6=@mcast2}, @generic="4dcfa800bfb18068ce4d237f98e6368532a6822d28aa9a0bc31be90e71be4c8afbc988fa4570b0ad6b54500e750089184e3537babc79fc5c25a66866895f3c1e2f4a686971e77bce15e12e98eb8daf61767dd0c9a1599a9660d439ead57ccc01bf629120bbd7c7a9cfa1ed99745fb276a38ec5cdab12f5a3dc9b2963764f5d25", @generic="4725bfdfbec91f07011a59c59e958dc7c50b7171606be616f2ceff099829bcef6b0286adc7c910d8834ae7de59de6105e6d101beac1e182119ddd71e302ff781cca305bf67ccebb7f150a2fdba0e722534bf338e972b65101db686642a0b8214375a19a83442d957c17a69880d71dd8cf5d17ee553e18a9e0456f511b22f90fa3c061790", @typed={0xae, 0x2d, 0x0, 0x0, @binary="47a1ed6d2ae1d5e7fa88f13c9e005857562aa8d50b553413c4eebb299da7b3964dc2a277bc42637f14589cbe10a47b8efeffe3ebda4cffafa8aeab5005f57db2b47b6edd80ca44185036c917c476425c165b4f7cc2a1d5a2cece503cf7d721066cee62308ae67fbcc00c0f92f9093b9ec58142596d3854c683f12dd358cf463fed84af8f8c9e81e96961ed5bcaf4f0ff7cc79616314f9b1b6ae042d76bd0744f47c8416a9c94934a2c3f"}, @generic="b3e0e65ac8ab3fabdc81a97b1aa858e794627073679950edf88f1f05b13d6f59b276a95dbeaed0629520802fe73bca9061df1805f76594f3c3b18bde9fcfe0e602fb4649b68a5d187375dbf78e39515cdf979eb930a72c59087584882632e20d3dd4fb3b2bcc5a7039e4f9484a318b1388be570442f1d89b7730e6fd95ba6a7c3498ecd7add5707a810efb17eee79fa7559a5b606adc3b97a1984d2d6f86424d5bb53b205ee899913bd0cfaf4d49a8e8df4383f917ce65f08cdc3f0f8982d3ea8e6634d2e03852d40dcf810f1c115871d67f3dbb55ca"]}, @typed={0x6, 0x45, 0x0, 0x0, @str='\v\x00'}]}, 0x1834}], 0x2, &(0x7f0000000800)=[@rights={{0x34, 0x1, 0x1, [r3, 0xffffffffffffffff, r4, r8, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r11, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r12, r0}}}, @cred={{0x1c, 0x1, 0x2, {r14, r16, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r17, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8, 0x40001}, 0x8000) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x200040, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRESDEC, @ANYRESHEX=r0], 0x1, 0x522, &(0x7f0000000a80)="$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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 165.036167][ T7664] sysfs_add_file_mode_ns+0x136/0x1b0 [ 165.041652][ T7664] internal_create_group+0x2e4/0x800 [ 165.041690][ T7664] sysfs_create_groups+0x3c/0xe0 [ 165.041723][ T7664] device_add_attrs+0x69/0x400 [ 165.041740][ T7664] ? sysfs_do_create_link_sd+0xc3/0xf0 [ 165.041768][ T7664] device_add+0x4e9/0xab0 [ 165.041857][ T7664] netdev_register_kobject+0xfc/0x230 [ 165.041887][ T7664] register_netdevice+0x903/0xcd0 [ 165.041919][ T7664] register_vlan_dev+0x21e/0x460 [ 165.041950][ T7664] vlan_newlink+0x317/0x350 [ 165.042017][ T7664] ? vlan_validate+0x420/0x420 [ 165.042056][ T7664] rtnl_newlink+0xe83/0x1600 [ 165.042084][ T7664] ? cgroup_rstat_updated+0x8c/0x1c0 [ 165.042197][ T7664] ? security_capable+0x5e/0x80 [ 165.042220][ T7664] ? ns_capable+0x7c/0xb0 [ 165.042241][ T7664] ? rtnl_setlink+0x300/0x300 [ 165.042263][ T7664] rtnetlink_rcv_msg+0x807/0x8c0 [ 165.042350][ T7664] ? slab_post_alloc_hook+0x8c/0x340 [ 165.042381][ T7664] ? try_charge_memcg+0xb45/0xd20 [ 165.042411][ T7664] ? xas_load+0x37c/0x390 [ 165.042437][ T7664] ? skb_release_data+0x542/0x560 [ 165.042489][ T7664] ? kmem_cache_free+0x1db/0x3a0 [ 165.042514][ T7664] ? __kfree_skb+0x104/0x140 [ 165.042584][ T7664] ? nlmon_xmit+0x4b/0x60 [ 165.042648][ T7664] ? __kfree_skb+0x104/0x140 [ 165.042677][ T7664] ? consume_skb+0x57/0x180 [ 165.042774][ T7664] ? nlmon_xmit+0x4b/0x60 [ 165.042799][ T7664] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 165.042820][ T7664] ? ref_tracker_free+0x3a1/0x400 [ 165.042851][ T7664] ? __dev_queue_xmit+0xabb/0x1d10 [ 165.042908][ T7664] netlink_rcv_skb+0x126/0x220 [ 165.042935][ T7664] ? rtnetlink_bind+0x60/0x60 [ 165.043049][ T7664] rtnetlink_rcv+0x1c/0x20 [ 165.043107][ T7664] netlink_unicast+0x56f/0x640 [ 165.043136][ T7664] netlink_sendmsg+0x665/0x770 [ 165.043167][ T7664] ? netlink_getsockopt+0x3e0/0x3e0 [ 165.043226][ T7664] ____sys_sendmsg+0x37c/0x4d0 [ 165.043253][ T7664] __sys_sendmsg+0x1e9/0x270 [ 165.043348][ T7664] __x64_sys_sendmsg+0x46/0x50 [ 165.043447][ T7664] do_syscall_64+0x41/0xc0 [ 165.043468][ T7664] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 165.043498][ T7664] RIP: 0033:0x7fbb4510cae9 [ 165.043520][ T7664] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 165.043560][ T7664] RSP: 002b:00007fbb4448f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 165.043578][ T7664] RAX: ffffffffffffffda RBX: 00007fbb4522bf80 RCX: 00007fbb4510cae9 [ 165.043593][ T7664] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 165.043607][ T7664] RBP: 00007fbb4448f120 R08: 0000000000000000 R09: 0000000000000000 [ 165.043619][ T7664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 165.043629][ T7664] R13: 000000000000000b R14: 00007fbb4522bf80 R15: 00007fff290bdd88 [ 165.043643][ T7664] 01:01:09 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0x12, 0x8, 0x8, 0x6, 0x0, 0x1}, 0x48) r1 = socket(0x1, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000002040), &(0x7f0000000100)=@tcp6=r1}, 0x20) ioctl$int_in(r1, 0x5452, &(0x7f0000000780)=0x20b) recvmmsg(r1, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/249, 0xf9}], 0x1}}], 0x1, 0x0, 0x0) sendto$unix(r1, 0x0, 0x40000800, 0x0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) 01:01:09 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x300000000000000}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001c00)=[{{&(0x7f0000000080)={0xa, 0x4e25, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x20000063, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) 01:01:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) (fail_nth: 59) 01:01:09 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x45, 0xfffffffa, 0x4, @private2, @mcast2, 0x700, 0x8, 0x0, 0x3}}) r2 = socket(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000000c0), 0xc) r3 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) r4 = socket(0x0, 0x3, 0x3a) socket$inet(0x2, 0x3, 0x0) setsockopt$MRT6_ADD_MIF(r4, 0x29, 0xca, 0x0, 0x0) r5 = socket(0x0, 0x3, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f00000000c0), 0xc) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1080}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="180100005400080025bd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="20000100", @ANYRES32=0x0, @ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="01020300000000000000000000000000000000008edd000020000100", @ANYRES32, @ANYBLOB="01010300ac14141e00000000000000000000000086dd000020000100", @ANYRES32=0x0, @ANYBLOB="01010400ffffffff0000000000000000000000000800000020000100", @ANYRES32, @ANYBLOB="01030300fe88000000000000000000000000010186dd000020000100", @ANYRES32, @ANYBLOB="00010296a1ff8086dd000600210000", @ANYRES32, @ANYBLOB="01020100ac1414380000000000000000000000f6000000002000e500", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000000000000000000008000000"], 0x118}, 0x1, 0x0, 0x0, 0x14040114}, 0x20000001) r6 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000440)={'vxcan0\x00'}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='net/if_inet6\x00') r8 = socket(0xa, 0x3, 0x3a) socket$inet(0x2, 0x3, 0xff) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000080)={0x100010, 0x7a}, 0x20) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @loopback}, &(0x7f00000004c0)=0x10) setsockopt$MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f00000000c0), 0xc) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x50bf}, 0xc) pread64(r7, &(0x7f00000002c0)=""/189, 0xbd, 0x400000000000002) 01:01:09 executing program 1: r0 = getuid() (async) r1 = socket$nl_audit