00000000000000000000000feffffff00000000"]}, 0x138) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:45 executing program 3: 09:19:45 executing program 1: 09:19:45 executing program 2: 09:19:45 executing program 4: 09:19:45 executing program 0: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:19:45 executing program 5: socket(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:45 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) 09:19:45 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffc4b, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000004c0)="d3", 0x1, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x757}, &(0x7f0000000340)=0x8) gettid() setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000380), 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000003c0)={{0x0, @multicast1, 0x0, 0x0, 'fo\x00'}, {@rand_addr, 0x0, 0x0, 0x0, 0x100000001, 0x400}}, 0x44) write$P9_RLERROR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="11"], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x4e, "32ec879c034e23794523ded017f6e9f88121ca37d3b975cf4d59896fdd97f04bcc24696bece4ebb00f35dc35e933a991f1e10446ed83f9db040f5d1c8572ed491947ea62d3de5ed0896dbd79b9c3"}, &(0x7f0000000100)=0x56) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x80000000001e) 09:19:45 executing program 1: 09:19:45 executing program 2: [ 431.919796] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:19:46 executing program 3: 09:19:46 executing program 0: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:19:46 executing program 2: 09:19:46 executing program 5: socket(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:46 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x8c02) write(r0, &(0x7f0000000000)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) 09:19:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000105}]}) 09:19:46 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000380)=0x1c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz1\x00', 0x1ff) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/42, 0x2a) 09:19:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000106}]}) 09:19:46 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffc4b, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000004c0)="d3", 0x1, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x757}, &(0x7f0000000340)=0x8) gettid() setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000380), 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000003c0)={{0x0, @multicast1, 0x0, 0x0, 'fo\x00'}, {@rand_addr, 0x0, 0x0, 0x0, 0x100000001, 0x400}}, 0x44) write$P9_RLERROR(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="11"], 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x4e, "32ec879c034e23794523ded017f6e9f88121ca37d3b975cf4d59896fdd97f04bcc24696bece4ebb00f35dc35e933a991f1e10446ed83f9db040f5d1c8572ed491947ea62d3de5ed0896dbd79b9c3"}, &(0x7f0000000100)=0x56) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x80000000001e) 09:19:46 executing program 5: socket(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000000)) 09:19:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000105}]}) 09:19:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:19:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)) 09:19:47 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000105}]}) 09:19:48 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) 09:19:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffdfffffeb1fb0ad0e58d04d3cc35b8357f60fab1418f7aaf32a5e05682d8adefc54d462976de7bb9e3d2decba076411f4d89c2fa8742925c7552ab6e6b2216cdf27c6988485ec47321051dbd966a16efacbc943b82888524b5e0fc132c0093ef139fe071474c03a3157c21134e080432748d700a219ae895310f6910d3818a0be9d63d6ece5a6f90eb44222f039b267327ee3767de87999d1876258ac36fa30bbedf72cba17ba6b123a31aaac0d1f753cd040b98061"], 0x1}}, 0x0) 09:19:48 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffc4b, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000004c0)="d3", 0x1, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x757}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000380), 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000003c0)={{0x0, @multicast1, 0x0, 0x0, 'fo\x00'}, {@rand_addr, 0x0, 0x0, 0x0, 0x100000001, 0x400}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x4e, "32ec879c034e23794523ded017f6e9f88121ca37d3b975cf4d59896fdd97f04bcc24696bece4ebb00f35dc35e933a991f1e10446ed83f9db040f5d1c8572ed491947ea62d3de5ed0896dbd79b9c3"}, &(0x7f0000000100)=0x56) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x80000000000a) 09:19:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045431, 0xfffffffffffffff9) 09:19:48 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000001}]}) 09:19:48 executing program 4: set_mempolicy(0x1, &(0x7f0000000000), 0x9) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"6e72300100", 0x2}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) [ 434.571883] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:19:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x40045431, 0xfffffffffffffff9) 09:19:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0x29c) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f00000000c0), 0x28a, 0x0, 0x0, 0x0) 09:19:48 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x1d}], 0x1, &(0x7f0000000240)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:19:49 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4206, r1) 09:19:49 executing program 0: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)) [ 435.203026] ptrace attach of "/root/syz-executor4"[6983] was attempted by "/root/syz-executor4"[10765] [ 435.271122] ptrace attach of "/root/syz-executor4"[6983] was attempted by "/root/syz-executor4"[10770] 09:19:49 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 435.360157] ptrace attach of "/root/syz-executor4"[6983] was attempted by "/root/syz-executor4"[10765] [ 435.418503] ptrace attach of "/root/syz-executor4"[6983] was attempted by "/root/syz-executor4"[10770] 09:19:49 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffc4b, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000004c0)="d3", 0x1, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x757}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000380), 0x4) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000003c0)={{0x0, @multicast1, 0x0, 0x0, 'fo\x00'}, {@rand_addr, 0x0, 0x0, 0x0, 0x100000001, 0x400}}, 0x44) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x4e, "32ec879c034e23794523ded017f6e9f88121ca37d3b975cf4d59896fdd97f04bcc24696bece4ebb00f35dc35e933a991f1e10446ed83f9db040f5d1c8572ed491947ea62d3de5ed0896dbd79b9c3"}, &(0x7f0000000100)=0x56) r2 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x80000000000a) 09:19:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r1, r0, &(0x7f0000000000), 0x7fff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, &(0x7f00000000c0), 0x812) 09:19:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000108}]}) 09:19:49 executing program 5: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0)="b7", 0x1, 0x8000, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$P9_RCLUNK(r0, &(0x7f0000000000)={0x2d7}, 0x7) [ 435.727959] syz-executor1 (10779): /proc/10779/oom_adj is deprecated, please use /proc/10779/oom_score_adj instead. 09:19:49 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)) 09:19:50 executing program 5: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto(r0, &(0x7f0000000140)="8b", 0x1, 0x0, &(0x7f0000000400)=@ethernet={0x0, @dev}, 0x80) 09:19:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f00000000c0)='/dev/kvm\x00', 0xffffffffffffffff}, 0x30) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:19:50 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000040)) 09:19:50 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 09:19:50 executing program 0: write$P9_RLCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x2f4}, 0xfffffffffffffeb1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0xc00000000000000) [ 436.827948] kvm [10809]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000030 data 0x0 09:19:51 executing program 2: semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x355bc0fe0ffd73de}], 0x1, &(0x7f0000000180)) 09:19:51 executing program 5: r0 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)={0xfffbffff80000013}) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x1, 0x0) 09:19:51 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) memfd_create(&(0x7f0000000100)='\x00', 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[]}}, 0x0) 09:19:51 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:19:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000100}]}) 09:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x42, &(0x7f0000000200)={@mcast1={0xff, 0x1, [0x4]}}, 0x10) 09:19:51 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) 09:19:51 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000001c0)={0x0, 0x611}) 09:19:51 executing program 5: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x3}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0xffff}, &(0x7f00000001c0)=0x8) mknod(&(0x7f00000000c0)='./file0\x00', 0x88, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x218082) setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 09:19:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:19:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f0000000000)=""/66, 0x1ff}) 09:19:52 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)) 09:19:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000940)='syz_tun\x00', 0x10) sendto(r0, &(0x7f0000000140)="8b", 0x1, 0x0, &(0x7f0000000180)=@nl=@proc, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6tnl0\x00', 0x10) sendmsg(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="d2", 0x1}], 0x1, &(0x7f0000000a40)}, 0x0) shutdown(r0, 0x1) 09:19:52 executing program 5: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:52 executing program 2: pipe(&(0x7f00003fe000)={0xffffffffffffffff}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f00000009c0)=""/4096, 0x1000) socket$inet(0x2, 0x5, 0x1) tee(r0, r2, 0x80007385, 0x0) r3 = dup2(r1, r2) ioctl$int_in(r3, 0x5452, &(0x7f0000e35ff8)=0x45) r4 = getpgrp(0x0) fcntl$setown(r1, 0x8, r4) fcntl$setsig(r2, 0xa, 0x12) r5 = gettid() clone(0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) tkill(r5, 0x100000000000016) 09:19:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000940)='syz_tun\x00', 0x10) sendto(r0, &(0x7f0000000140)="8b", 0x1, 0x0, &(0x7f0000000180)=@nl=@proc, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6tnl0\x00', 0x10) sendmsg(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="d2", 0x1}], 0x1, &(0x7f0000000a40)}, 0x0) shutdown(r0, 0x1) 09:19:52 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000040)) 09:19:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x40000107}]}) 09:19:53 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) 09:19:53 executing program 5: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000940)='syz_tun\x00', 0x10) sendto(r0, &(0x7f0000000140)="8b", 0x1, 0x0, &(0x7f0000000180)=@nl=@proc, 0x80) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6tnl0\x00', 0x10) sendmsg(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="d2", 0x1}], 0x1, &(0x7f0000000a40)}, 0x0) shutdown(r0, 0x1) 09:19:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x43, &(0x7f0000000200)={@mcast1={0xff, 0x1, [0x4]}}, 0x10) 09:19:53 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0x355bc0fe0ffd73de}, {0x0, 0x7672f17d}], 0x2, &(0x7f0000000180)) 09:19:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:53 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @rand_addr}, 'syz_tun\x00'}) 09:19:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000200)={0x1, 0x0, [{0x6e0}]}) 09:19:55 executing program 5: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:55 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 09:19:55 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000007) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x100010031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000df3000/0x6000)=nil, 0x6000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:19:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:19:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) 09:19:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f00000000c0)) 09:19:56 executing program 5: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:56 executing program 1: 09:19:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:56 executing program 2: 09:19:56 executing program 3: 09:19:56 executing program 4: 09:19:56 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xb, 0x21, 0x6, 0x9, 0x40000000001, 0xffffffffffffff9c, 0x0, [0x10]}, 0x2c) 09:19:56 executing program 5: socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000200)={0x1, 0x0, [{0x40000108}]}) 09:19:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:56 executing program 4: 09:19:57 executing program 2: 09:19:57 executing program 1: 09:19:57 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[]}, 0x78) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:57 executing program 4: [ 443.231883] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:19:57 executing program 3: 09:19:57 executing program 1: 09:19:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:57 executing program 2: 09:19:57 executing program 4: 09:19:57 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[]}, 0x78) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:57 executing program 3: 09:19:57 executing program 1: 09:19:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:58 executing program 4: [ 443.954249] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:19:58 executing program 2: 09:19:58 executing program 3: 09:19:58 executing program 1: 09:19:58 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[]}, 0x78) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:58 executing program 4: 09:19:58 executing program 2: [ 444.483231] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:19:58 executing program 3: 09:19:58 executing program 1: 09:19:58 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:58 executing program 4: 09:19:59 executing program 2: [ 445.021395] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:19:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:59 executing program 1: 09:19:59 executing program 4: 09:19:59 executing program 3: 09:19:59 executing program 2: 09:19:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:19:59 executing program 3: 09:19:59 executing program 1: 09:19:59 executing program 4: [ 445.730181] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:19:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:00 executing program 2: 09:20:00 executing program 4: 09:20:00 executing program 3: 09:20:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x78) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:00 executing program 1: [ 446.393044] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:00 executing program 2: 09:20:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:00 executing program 4: 09:20:00 executing program 3: 09:20:00 executing program 1: 09:20:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x60, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000"]}, 0xd8) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:00 executing program 2: 09:20:01 executing program 4: [ 446.971524] kernel msg: ebtables bug: please report to author: Valid hook without chain 09:20:01 executing program 1: 09:20:01 executing program 3: 09:20:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:01 executing program 2: 09:20:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x60, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000"]}, 0xd8) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:01 executing program 4: 09:20:01 executing program 1: 09:20:01 executing program 3: [ 447.637122] kernel msg: ebtables bug: please report to author: Valid hook without chain 09:20:01 executing program 2: 09:20:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:01 executing program 4: 09:20:02 executing program 1: 09:20:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x60, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000"]}, 0xd8) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:02 executing program 3: [ 448.227051] kernel msg: ebtables bug: please report to author: Valid hook without chain 09:20:02 executing program 2: 09:20:02 executing program 4: 09:20:02 executing program 1: 09:20:02 executing program 3: 09:20:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:02 executing program 2: 09:20:02 executing program 4: 09:20:02 executing program 1: 09:20:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) 09:20:03 executing program 4: request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000140)='{trustedsystem]\'bdev$!-systemvboxnet1\x00', 0x0) 09:20:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000000)='2', 0x1}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="636c6561725f72656673007edb") writev(r0, &(0x7f00000000c0), 0x2000000000000002) 09:20:03 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) 09:20:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000180)="153f6234488dd25d766070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x8}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 09:20:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:03 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) 09:20:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e000012670000110001001f750800010005000000000000000000200000", 0x27) 09:20:03 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000640)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='ecryptfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 09:20:04 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fed000/0x11000)=nil) unshare(0x8000200) 09:20:04 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xa8, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000"]}, 0x120) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 450.103448] ecryptfs_parse_options: eCryptfs: unrecognized option [] [ 450.110362] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.123125] Error parsing options; rc = [-22] 09:20:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x401, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='selinuxuser\x00'}, 0x10) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x5) [ 450.281661] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000005c00)="2700000014000707030e000012670000110001001f750800010005000000000000000000200000", 0x27) [ 450.373042] ecryptfs_parse_options: eCryptfs: unrecognized option [] [ 450.379957] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 450.392493] Error parsing options; rc = [-22] 09:20:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000340)=0x7) 09:20:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xa8, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000"]}, 0x120) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:04 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 450.786861] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0xbef1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:20:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x401, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='selinuxuser\x00'}, 0x10) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x5) 09:20:05 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:05 executing program 3: 09:20:05 executing program 4: 09:20:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xa8, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000"]}, 0x120) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 451.346944] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:05 executing program 3: 09:20:05 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={"6c6f0000000001fff300", 0x0}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000001c0), 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000380)={"62707130000b07000000000000faff00", r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x502}) getpeername(0xffffffffffffffff, &(0x7f00000003c0)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000040)=0x80) 09:20:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf6, &(0x7f0000000500)=[{&(0x7f0000003ac0)=""/4096, 0xfffffe44}], 0x1, &(0x7f0000000200)=""/20, 0xd2}, 0x0) 09:20:05 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000040), &(0x7f0000000000), &(0x7f0000000200), &(0x7f0000000280)) 09:20:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xb4, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x12c) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:05 executing program 3: [ 451.948578] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:06 executing program 2: 09:20:06 executing program 3: 09:20:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xb4, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x12c) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 452.380776] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:06 executing program 2: 09:20:06 executing program 4: 09:20:06 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:07 executing program 1: 09:20:07 executing program 3: 09:20:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xb4, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x12c) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:07 executing program 2: 09:20:07 executing program 4: 09:20:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 453.375179] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:07 executing program 3: 09:20:07 executing program 1: 09:20:07 executing program 2: 09:20:07 executing program 4: 09:20:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xba, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff"]}, 0x132) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:07 executing program 3: 09:20:08 executing program 1: 09:20:08 executing program 4: 09:20:08 executing program 2: [ 454.111275] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:08 executing program 3: 09:20:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:08 executing program 1: 09:20:08 executing program 2: 09:20:08 executing program 4: 09:20:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xba, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff"]}, 0x132) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:08 executing program 3: 09:20:08 executing program 1: 09:20:08 executing program 4: [ 454.893092] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:09 executing program 2: 09:20:09 executing program 3: 09:20:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xba, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff"]}, 0x132) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:09 executing program 1: 09:20:09 executing program 4: [ 455.365592] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:09 executing program 2: 09:20:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:09 executing program 3: 09:20:09 executing program 4: 09:20:09 executing program 2: 09:20:09 executing program 1: 09:20:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbd, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00"]}, 0x135) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:10 executing program 3: [ 456.115235] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:10 executing program 1: 09:20:10 executing program 4: 09:20:10 executing program 2: 09:20:10 executing program 3: 09:20:10 executing program 1: 09:20:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbd, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00"]}, 0x135) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:10 executing program 4: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) getpgid(0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) io_pgetevents(0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340), 0x8}) io_submit(0x0, 0x0, &(0x7f0000000240)) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x120002, &(0x7f0000002040)=ANY=[]) clock_settime(0x0, &(0x7f00000007c0)={0x77359400}) 09:20:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x8}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) pwritev(r0, &(0x7f0000002480)=[{&(0x7f00000000c0)='M', 0x1}], 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 09:20:10 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000080)=0x5) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xe000)=nil, 0xe000, 0x0, 0x1012, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$tun(r1, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 09:20:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 456.963960] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000001080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000080)=""/4096) 09:20:11 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) close(r0) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_submit(0x0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbd, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00"]}, 0x135) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:11 executing program 3: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 457.427027] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25d76") r1 = socket(0x2, 0x2, 0x0) shutdown(r1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f000000eff4)={0x20000000}) epoll_wait(r2, &(0x7f000000affb)=[{}], 0x1, 0xfffffffffffffef7) close(r2) shutdown(r1, 0x1) 09:20:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbf, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000"]}, 0x137) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 457.850675] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:12 executing program 2 (fault-call:7 fault-nth:0): io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) 09:20:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbf, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000"]}, 0x137) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x0, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 458.309552] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:12 executing program 3 (fault-call:2 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbf, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000"]}, 0x137) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 458.559854] FAULT_INJECTION: forcing a failure. [ 458.559854] name failslab, interval 1, probability 0, space 0, times 1 [ 458.571500] CPU: 1 PID: 11440 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #69 [ 458.578835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.588248] Call Trace: [ 458.590954] dump_stack+0x306/0x460 [ 458.594752] should_fail+0x1170/0x1350 [ 458.598749] __should_failslab+0x278/0x2a0 [ 458.603061] should_failslab+0x29/0x70 [ 458.607049] kmem_cache_alloc+0x146/0xd50 [ 458.611263] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 458.616803] ? io_submit_one+0xcc8/0x45b0 [ 458.621074] io_submit_one+0xcc8/0x45b0 [ 458.625109] ? kmsan_set_origin+0x83/0x140 [ 458.625826] kernel msg: ebtables bug: please report to author: entries_size too small [ 458.629515] __se_sys_io_submit+0x2be/0x7a0 [ 458.629639] __x64_sys_io_submit+0x4a/0x70 [ 458.629705] do_syscall_64+0xbe/0x100 [ 458.650078] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 458.655328] RIP: 0033:0x457569 [ 458.658589] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.677538] RSP: 002b:00007f85b4918c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 458.685317] RAX: ffffffffffffffda RBX: 00007f85b4918c90 RCX: 0000000000457569 [ 458.692725] RDX: 0000000020000b00 RSI: 1ffffffffffffe76 RDI: 00007f85b48f7000 [ 458.700105] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 458.707414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85b49196d4 [ 458.714729] R13: 00000000004be72d R14: 00000000004ce380 R15: 0000000000000006 [ 458.830358] FAULT_INJECTION: forcing a failure. [ 458.830358] name failslab, interval 1, probability 0, space 0, times 0 [ 458.841902] CPU: 1 PID: 11446 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #69 [ 458.849217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.858606] Call Trace: [ 458.861272] dump_stack+0x306/0x460 [ 458.864981] should_fail+0x1170/0x1350 [ 458.868991] __should_failslab+0x278/0x2a0 [ 458.873299] should_failslab+0x29/0x70 [ 458.877296] __kmalloc+0xcf/0x440 09:20:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 458.880857] ? __do_sys_bpf+0x4cd7/0xf970 [ 458.885106] __do_sys_bpf+0x4cd7/0xf970 [ 458.889158] ? __msan_poison_alloca+0x17a/0x210 [ 458.893928] ? prepare_exit_to_usermode+0x53/0x470 [ 458.898972] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 458.904528] ? prepare_exit_to_usermode+0x14c/0x470 [ 458.909659] ? syscall_return_slowpath+0x112/0x880 [ 458.914745] __se_sys_bpf+0x8e/0xa0 [ 458.918507] __x64_sys_bpf+0x4a/0x70 [ 458.922292] do_syscall_64+0xbe/0x100 [ 458.926175] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 458.931411] RIP: 0033:0x457569 [ 458.934670] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.953615] RSP: 002b:00007fb6e1224c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 458.961399] RAX: ffffffffffffffda RBX: 00007fb6e1224c90 RCX: 0000000000457569 [ 458.968744] RDX: 0000000000000018 RSI: 0000000020000040 RDI: 0000000000000004 09:20:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 458.976059] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 458.983384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6e12256d4 [ 458.990697] R13: 00000000004bd8fd R14: 00000000004cc280 R15: 0000000000000004 09:20:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:13 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:13 executing program 2 (fault-call:7 fault-nth:1): io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:13 executing program 3 (fault-call:2 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:13 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0xfff, 0x0, 0x0}, 0x2c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x8, 0x80000001, 0x1, r1, 0x7f}, 0x2c) ioctl$KDSETMODE(r1, 0x4b3a, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000180)="c688d38eb3cd10185f63c2aab4718b840626a3a02a9332b388cb9310e9a0d8a1783eb8c10e1f00000000000000a4c0565d97094cf432e002a48debbb13b7df00ac7ba5e682b21e151ea44575e5ab91515bed0e96409f0012bb9121596dbf32d7a5043920926b1be8857772700259444d8abb6d5394bad1395eb3882d072cd2c413ef9473", &(0x7f0000000100)}, 0xfffffffffffffd31) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:13 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @remote, @remote}, &(0x7f0000000200)=0xc) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000000)=0x40) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=@bridge_dellink={0xa4, 0x11, 0x806, 0x70bd2b, 0x25dfdbfb, {0x7, 0x0, 0x0, r2, 0x20, 0x2}, [@IFLA_IFALIASn={0x4}, @IFLA_NET_NS_FD={0x8, 0x1c, r0}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xd85}, @IFLA_PHYS_PORT_ID={0x18, 0x22, "80bb19c59eb98c365ab94696a9183b60d2c4"}, @IFLA_CARRIER={0x8, 0x21, 0x5}, @IFLA_IFNAME={0x14, 0x3, 'erspan0\x00'}, @IFLA_PHYS_PORT_ID={0x18, 0x22, "fdcb3acb39acf00b6d364591a521dd6c8a5d43"}, @IFLA_IF_NETNSID={0x8, 0x2e, 0x4}, @IFLA_IFALIAS={0x14, 0x14, 'team0\x00'}, @IFLA_EVENT={0x8, 0x2c, 0x6}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180)="be786c394e40dea6c0facbd4c0437a15503bf0c93e21d9c0ec7d", &(0x7f0000000100), 0x6}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, "14bd"}, 0x3, 0x2) 09:20:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:14 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:14 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2400c0, 0x0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000040)=r1) sendfile(r2, r2, &(0x7f0000000080), 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000340)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'syz_tun\x00', 0x20, 0x400, 0x20, [0x38]}, 0x36, r4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @broadcast}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', r5}) 09:20:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:15 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7, 0x200) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000001c0)=0x393, 0x2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x60) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000000010100060000010800040001801da1d58d922f1d59ab28a04e8a1dbdf5e7f20c55b6d8c400cea8904ab1b1386d4035c52fd28abefdc5ec6e714515b53f7bea6d6c85a08dc429a470fa9d3a5c2290b658148d81d3c5130aecc785106c77cd2d0e0f8632d0c64ab168a9504b7bf3425ce4a8059056489e7aa7d3bfdb72872265b70fd6c733d9f1721e"], &(0x7f00000000c0)=0x12) 09:20:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x800, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x75) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x1, r3, 0x10, 0x1, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [], @multicast2}, 0x9}}}, 0xa0) 09:20:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:15 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) eventfd2(0xfffffffffffffffd, 0x80001) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:16 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = msgget(0x3, 0x4) msgctl$IPC_RMID(r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x1) ioctl$UFFDIO_UNREGISTER(r6, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 462.217153] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r1 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x2, 0x400, 0x2, 0x4, 0xffffffffffffff9c, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:17 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x400) 09:20:17 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000340)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'syz_tun\x00', 0x20, 0x400, 0x20, [0x38]}, 0x36, r4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @broadcast}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', r5}) [ 462.956908] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:17 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x101000) recvfrom(r0, &(0x7f00000003c0)=""/4096, 0x1000, 0x103, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r1, 0x100000001, 0x10}, 0xc) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0x3f, @broadcast, 0x4e24, 0x0, 'dh\x00', 0x30, 0x3, 0x6f}, 0x2c) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000200)={@multicast2, @loopback, r2}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:17 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000340)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'syz_tun\x00', 0x20, 0x400, 0x20, [0x38]}, 0x36, r4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @broadcast}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', r5}) 09:20:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:17 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) fsetxattr$security_ima(r1, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "30d2e1c126a0b892e84fec5311a60001"}, 0x11, 0x3) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r3 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x100000000, 0x2001) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f0000000200)) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000040)={0x8, 0x4a}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 463.464927] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:17 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000340)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'syz_tun\x00', 0x20, 0x400, 0x20, [0x38]}, 0x36, r4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @broadcast}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', r5}) 09:20:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000180)={0x4, [0x100000001, 0x1, 0x9, 0x9]}, &(0x7f00000001c0)=0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:18 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20200, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000200)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x3000}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9f, 0x410600) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000040)={0x9, 0x0, 0x8}) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r3) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@loopback, 0x4e23, 0x0, 0x4e20, 0x3738, 0x2, 0xa0, 0xa0, 0x3c, 0x0, r5}, {0x401, 0x0, 0x101, 0x4, 0x8, 0x1, 0x7ff, 0x1}, {0x8000, 0xa6, 0x4, 0xf76}, 0xffff, 0x6e6bb9, 0x0, 0x0, 0x1, 0x3}, {{@in=@remote, 0x4d6, 0xff}, 0xa, @in6=@mcast2, 0x3500, 0x7, 0x1, 0xffffffffffffffff, 0x4, 0x10000, 0x80000000}}, 0xe8) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x200) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 464.099533] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:18 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000340)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'syz_tun\x00', 0x20, 0x400, 0x20, [0x38]}, 0x36, r4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000100)={0x0, @local, @broadcast}, &(0x7f0000000140)=0xc) 09:20:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:18 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="328f7d76cce646d4719a91f65756f556e08bcb5ebcdaf7dee747f71d4df64f7f895a0f898c2d07011a9dec96e2063aab8578744cdbab99dfc7715c"], 0x6) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r3 = shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x2000)=nil, 0x2000) shmdt(r3) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) close(r2) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sync_file_range(r4, 0x0, 0x800, 0x7) write$P9_RFLUSH(r1, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x11) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x40, 0x5, 0x8001, 0x8, 0xffffffffffffff9c, 0xa41}, 0x2c) 09:20:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:18 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000340)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'syz_tun\x00', 0x20, 0x400, 0x20, [0x38]}, 0x36, r4) 09:20:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 464.833107] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:19 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@dev, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_getscheduler(r2) socketpair(0x3, 0x1, 0x2a38, &(0x7f0000000040)={0xffffffffffffffff}) listen(r3, 0x2) 09:20:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB]}, 0x78) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:19 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a74feb3293c7a361417194bca556a8342900a48b2b89b0b007c97fb2758f831cf3ff04bce7d7b87e2b6ee66ed16548f619e32f5f5a980c574e894b02eb4ad4ee4f6602778cfac71b03e534479fa423f576a1f4a971f5a12b055ad00317597a67e0f3cac974d26b71ca518947d052d42ede017bba42d2e0ec25f8e2955ffdab8f11d45eabcf1b9d605d972bbda67d7ff23a371c62d85609d178f8e257f0ba59ecb4ad500284c2705db3a0f49f2b0a43f7803e55bbf700a517bbe300a7af9ceee905203b664c257997cc4de3ea6ceda1ea192106b948de9e6dc384b603082c7ca6a0d4378d496833", 0xe7, 0xfffffffffffffffc) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:19 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 465.451082] kernel msg: ebtables bug: please report to author: Entries_size never zero 09:20:19 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x60, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000"]}, 0xd8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:19 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, r1, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:19 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:19 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc843, 0x200000) fcntl$setflags(r0, 0x2, 0x1) io_setup(0x48, &(0x7f0000000100)=0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r1, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 465.963394] kernel msg: ebtables bug: please report to author: Valid hook without chain 09:20:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000200), &(0x7f00000001c0)}, 0x20) r1 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x1b, 0x1) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000340)={0x56, 0x0, 0x5, {0x1, 0xffff}, {0x1, 0x100000000}, @period={0x58, 0x9, 0xffffffffffff5d29, 0x1f, 0x7, {0x4d97, 0x5, 0xfff, 0x9}, 0x1, &(0x7f0000000300)=[0x7]}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8081, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) mq_timedsend(r2, &(0x7f00000001c0)="8ebbcb60ffd08b03e40e88495cf5e552089ce9567673b59cef1d23513a8f4ad33463dc52a1e18e8118c8fabe0d286cdcfd89a8e265f9c647eaea5f32e2c5b725afdf69e899ede44ffb656a5e50e7e25c1a5174ae", 0x54, 0x3ff, &(0x7f0000000280)={r3, r4+10000000}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$packet_buf(r5, 0x107, 0xf, &(0x7f00000000c0)="b696ddda352ddd46b54fc519619d06919163bdbba51a57f9c64cb4f87f34a1a29246a348fabdf453d2bc6d9bf4cf979e450d89bfa2473e0cdd74e0e5c791391bb12758840bd8d83bb62226e8132236fba73f9c9ad3681d50b063b7cb06b3113528fbb36c13956682898c3a9e7b3c44cfa4bd3505011df80bb2ed95c5ea407a41030e039c3c163cf33252803f4b91724065c362e0ecfca3023314c6107f9df92c92ab7a824ec9074f628a209673710b52724db7344623820b2e6b", 0xba) fcntl$getownex(r2, 0x10, &(0x7f00000003c0)={0x0, 0x0}) fcntl$lock(r2, 0x6, &(0x7f0000000400)={0x1, 0x7, 0x0, 0x3d, r6}) 09:20:20 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000000c0)={0x0, 0x9, 0x5}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:20 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x6, 0x8001}) fdatasync(r1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x50) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0xeffd, 0x4000}) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f00000000c0)="c3d6896d651627384cc66f85fd4fb8e1d1") munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) socket$inet_sctp(0x2, 0x5, 0x84) 09:20:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x60, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000"]}, 0xd8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:20 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x687b4a4461a87a92, 0x0) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) [ 466.785956] kernel msg: ebtables bug: please report to author: Valid hook without chain 09:20:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:20 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:21 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) mlockall(0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x4000}, {r0, 0x4104}, {r0, 0x20a4}, {r0, 0x4010}, {r0, 0x2}, {r0, 0x684}, {r0, 0x100}], 0x7, &(0x7f0000000100)={r1, r2+30000000}, &(0x7f0000000140), 0x8) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x6, 0x20000) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000002c0)=0x1010182, 0x4) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000001c0)={{0xffffffffffffffff, 0x3, 0x200020, 0x1, 0x6}, 0xea, 0x6819c91c, 'id1\x00', 'timer1\x00', 0x0, 0x5, 0xf85, 0xfffffffffffffff8}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0xfffffeaa) 09:20:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:21 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x109000, 0x0) write$P9_RLERROR(r4, &(0x7f00000007c0)={0x1b, 0x7, 0x1, {0x12, '/dev/snd/pcmC#D#c\x00'}}, 0x1b) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x610400, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x10000, 0x10) io_submit(r0, 0x5, &(0x7f0000000780)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x5, r1, &(0x7f0000000140)="d4147bbbd8f21644053c5626121966ff632a492022a7767d165eea250b9393620974eff7244d975ce698ae7f6547a6d1d4b6e4d4875996636a12f9a3fdfaff4a2b03945f4b431352d26fb531f7d61342854fcf34f64a4312b3d9d74d9a625a21a710921a7b9dea3024cf04828844", 0x6e, 0xfff, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1, r1, &(0x7f0000001b40)="fab95478c2ced3d1a25640358cadb12002acacb5b63f29a3c3ce2685e73e49c212d406da2ef357efdc8190c095423a51cdd5fe4d0bfce10385c0fd407fbf131fc90cb695f2dca133e9baf41266994d10e4b1bf9c00ab994a2e3556800b89f98ff0bc4947382f93952891ba8a3abc13876b57de4dd3772afb117582ba253a9dc0dbd4ce5f56a57bd25c4d70b201e1269287667adf807abfd6d945e7b6677e46eae76dab5a24d7d1e864fbd7b257dd1b7435d38decf3b6bda84b33415aa1117ffddd78432db5b36fcf8e4883a412534f367cec62df34c68f7c2d6a08c36cdf024bd99816f95bb679b35d51e82dd72930cecd7c2cc2ff20635ab58fb100b6156eed145cbb6ff05dcfbf9b23913bb12649395d87cb9e79c8cea754834df39567348bbb5f990a6aa360974f15a7233cccad46d4d5aa9047930a7e282847ff459391f2339e0b38727b9d1d29866d03d2ab6a4eeae7bffbdc9777fb59825b0be180614e3721f4b3eaf8d587a942bf9e1f47e66adae22a82e54c8ac6e0dde8ec2bd3167b5ae162d5bafbc57971d6f537a71903abc0b5cfa70d1c5f6c0dd7ae2044fe970804ba4d06de71e3ded13f0db45346212b67bed7289a2076f35d380dd8994c7cc3b1ae6323e080a4c2a1c074355d60164d682f89b202ca2f2aa8815fc7aa4ea97548955361425f10b09fd4e185dacbc927566c2b7902cfa671d7aae845146fd7af341423fe97b50537e20e26146bc90e11ea0e5c059af4f22f0bde36e40e20db7a30339b0d23c897029d9ec75fa66e3e81251ebabbb27b357a13edffd7470cd02fcf1828fe9080df677ad20f9f6421e7d702f5fb0cd154c5353736cf1228b2cd65073f6082caaf69195299b7e7b892a163fae4d6aaf3139c9856cfc8a6dd690af83ee1bc58763d3b6647709d7d2e6524e450592f6dd19cff4a3a6f1774f6bb39ccb7774ac283af50492702ea14b9910e7cb9c4564db277bc111428bf183e4cd611e8b1060f572eb59f8518c34895add3e81a90fb379a0a7bb638237a9a6ffb20f122368ee0577d9c8b78183361a9d0e130dcc375d4db0235eaf5868a490420b6b09502c75050d4b80a6caf5d40222fe40d83c20116b4545e516b2368c725eac7eb892e3c11b909c381778e8349375e5658669312d0d4b345c46da562333ea9b918193c1815722b2e92ccfc1bd60078db9eacfbdb281ff4db94f62bd3c6b4d30ffb33bd64ec6aa0146159c872813971eb2bedd2ded94b9857bd9d9f8d4c4eec1e5dc394ee414e54abecadfdf205738aafdecee97103ec80bc638e8f70e310c05857835c92a2e96eb928d1a772e920610924b477722759faaaa9cb820dcc951adf469dad78404687ff6554d3c6df6024b7b1f41233ec5be2f5967c6d04ee1bac282ec97d65b5325f83ed8c2d5b21b372a6e0a7f1dd9cfdb7e9aa632738775f41d8e5ea29ca5445bfe0062a023bde8f254c1d6f6d2a6270c7c716437a87f68d9ff295bbe6e5e1975917ff11df58c6273c38301a13e13fdce8346b02d7562d97e0d39fedb9f4542fe563e4984f2b3cff08d1108545b61be5189d063db5412f46d8280fb3cff972dd242bbda31d403e90c3e4f90a90c3fee05cd01f3f90ac81a215eb1c5e88df02a1e29bf45c64fe34ba8d6e447b7d4fa0bc83cfbfd9add5391244ba7ef7f6e70284cbe736359e2ed505f8985b4d7f6863f6afa4f05fa0ba9b9beec6116315fa3cd7c213fc43836ac65f367dd92a74586b54e21f55341c7aa4486a1cf692b16ba92997483d071aeb33543f907988f8eb375131aabd5ca3a251dded3f5d58f2b4614b4d0110ac4e3bf1086ebd92a941777ccb01d0f42fea1b792b663734cf767c829026674c2e06c21da361870d26b61d80eb120f4f238b79c8c1482e5a67a9f438bd7874ad83353900fe7811af62638dd05764cf586b23982f5db5b967134c9507ef9d2309b59af5635f2ae5abd2b4e6aec73c7697e10ce4652957ae6e2847a17c08a4dd48adc3d9e4dff96d51af7059b4b6e7a7089abe983ddd74a688819393c2cceb169bbbf484d5b2ede2667ad21e06f65f5fde620865e3a814f3cb18b16cd3040a10feb9d222f30c8719b3e442ee45d52e80b19bd0cfb9b37d93406e18b5a6c000cecd522622ee2ff748ebdf04b5572ae5fad7cc77fdfcf4ad9714d51a9bd4a60a5a7b65cf8dc3b3e711f4d5ca190e5bf5f7cc93ba1ad10ce8b45b402182bd03cb6625c8f6c97b9de2172c470262d86586bde3ba33f5dec9cc90508b8c6c50e06fff9b7d7ead2d3a6829d54c4445f1f0a722d8d4bcac9841d65efcd82cb7d38f376bfa5ba6012855a9d329d43eae06ceb7b366843d91830352c0a092b7957d07de3c88763ad20ca26188c98209877d653d10e01f04f071c4b2985b0ba3c5899919cc4057c6fa9745ae852bcd37ae78da69f25350fc24caaddafd95367445fc2b221c03fba246f5a68d0dfe5cdbb04c30d42a508f6653c409f7a4773cc44490287023dc159a048a4621c20fbebdb9722a8fbfa87b27603432e9763fe1c7063923111b2f76fa4c02f48c08e4933e7d91834afbba1c1f6a29b17af87509cf07f0d06ff23a50fd807a088ac1dfcf988dd79f23209b42439a11e6bad8aaddb2ac8b70adc3c4fea6664a1e5a46184976c3bd828a2d5c3f1fd08b1b79c681c800a5903ef1b8ce2610aeb507ff69083d4fa883d45f2c9ae477202c8e8cdea29f51c13f2d3503e26d475b35e48a60e657b0388190172d5f14f0029454d1bbef72764244f6d9ea94155804efead562fabe98741cee68723863f0f6584cff159877633e9e16fd73a8ed466083f49386cf491d230c39a2b9fd0fe008704d54fb3646fd58b9f10e1cd813694a33bd764953e89678fa78cf78bd9aadd8e2ffeda943a35180855e402a7a9dfffd12211450f11200cefd9883f07e38dbdef516e8582196ff11819c9449b48c3e1376b1ca2eddb7f715dc1e51208e0b1fb633f89cca2ff7843f4dd76ef073c16431ca092fa5b8ae920ad7706a848f3cfba25bf7b66f1b33e44b69c8dd06922bcde384732c6e9b4be10e018636be4b8941e1ba9dbb5aa92ac00cab4e3b85f591adf3be0ea5b825a5012a26c5ea19be156225240175dbeb73c30118f18fb3abddc21e3cfd7ea70734b86833eb18b2be50c1f146c549d23a27756b03545a63cedf64184b022028ead6266a0c55ca64f7e57eca63d6b5331987df9a2beb752a3037e2ecabd1d51e7e40cd7bbdf601ee3bdc04da0ee656d254f7ad1f1114440fd08495441e918418777a52ca5aef51937b77c1caabed1eaa876558fdf91fb586eb217fd0848224e7b4fc464c4256c7e4d81ae0031d6e55426ba1fc883d4c412d352910aafd55baab89edb1f769dd97166b9b229863b3806e877fb5cc2de98c9afb8a89fe97e7009a025ab076cfb4c49723b295f694fe6ca2776b53d1df7078700e4809bbea455f9a2942b897acce6ed7c7382bbed979e75096d7528d9ad388af17647cad437f478e2462368184a21eecf2cbae4d39b6c3ff6f08d948a725a3e7d8cffe77f8452f510f8acff8406281f44745ff91a6d8e0c2c73b9765984259acd13f41b4afee369b8bcabf612a4219d53e203977417c8dc491f483117197e0950394e1f3c5e4485090ed6bca0d7a877c73c07aed911da71c90dbb8f0e15863f981c2d845bf3f74eef4a48965369bd9b395cb2aef1dd97d5b2db255ff3e50729ff8416513c194b8a82a0119f6000dc5ffc8e301f2a9eafefd4fdb6e3755a90711b36b9935b978047181884db264b0d90bd2d6687e1580402130026c321363fe782461c60ca75e2c49596f802ff03091077b2eff3db386108f92ae81056e1abfe2982b69f5c8081ea0fe29e229fd045818eb1307d8a5f9ee63c109ada04a62a9b117bfae32c066245e4b5016dbcfdde3ee7019b1b914b4a0d87bcf977b467ce87785f438bda04c900568c965bd2b835c17c2346465b524c9210f4eccd852baf5c4b3003f7674c02394f8495db6fd8a499fe6c58627b90eb6837806596e1e67dd555cd7d8c5f0b14591f2b646c545acbc5bdf008c3b1b74728d76d43fb450acc509eb77b8d5c0f2f7fb9bfb2d12f53f3fae7cfd1c74fa17660da0d8202a0a451d95835d281f842d037678a1a6c826a63d838975354522d8238cd7d98547d21936c52c52a6ec003a67f51e774fae88da48d7930465e37bfca197ea56f8be7c325ec7308cd9fc926d31997d43a5ebe205312b7ebbc3cda94877a620b3f510128a9f53a375129fc0a594f1bd71807c550ef9cc63adb642302d089cca9e22f64c474ef2377ad49bfe734fc91b3366444ab553afafb1b31236879c27ddba56ff91b432737c3fe1a8e5fdb2ee8345d0507a71a6e88f614e782c37bf929dd29205dba072226ee53c7e6de95fc60e47fe9ad1a05c249b5b687f9dd0740dcc8a1cde089e588d9a20b43b2a5110fe5736356af66981042a25eefa524eb788f01e0c9faad6d542435df1e1584268f7fb0ba22ea592c19056fd4bb93d2b4a93523191872089a0bf4561baf48496c71731603ebce3abcccc905641c4c67e9595a773778dfffb794019f918267733a5cb99034cf8cb413127aa327e82e7916b8174eb7afb95ea17e49617f07d46aeb9f82f6d6559c1ec9572290bf3281f00c6c5f429a493e053871d2e2ab95da15d76620b4ace1227dd4fc92036b788210e02e2779d39d55f0a98ecda19a77c1a55279b50bfe35404e9cc1e87841786a2d46173f831e61ab22422bea83e930fde51960ae3b4ad61e2bf8fe23c209e51330dc1db95a6c34516b917e219d31908cc2ed5dcd63247486264b61bc2fe866a5ff3731f4d230e8825eb2e3405699b63ba75e3afd24ed50929f475bb08c985abef0fc6e0fd547ac09682e71e672fc33c6b83bd3c4a98f6d733dde57fbfd19dd668f7243deb70148e68a9b5b744492c02b7bd793190d5866ccd3ea9f53d356d123dde4145a3ba2e573de8d7b585d25203b0ea08e3221ab3a1a1d26ea05acc5d1356693a91d1b5b53873f8b1c2c4d0f8f36287f5e53c43d82d6d282a1b22930d355a42f560b803084a4486a47f56fa334af653a880251d881cda903516a79ee651c491fc474e45d0f6dea33d6f939923d72b36c51ee578ae3b29acf0866b5e80c43ce6ed60a805aaf9a930b1c65d11bb9dc582d7dc0ffcea0dfb6a69c694cde650906955b2962c31d8fc95d8325aa3a76b6712e2f6651d7489f9ccd4be9553e2c89b790880826453b0aa9c17e4a04547f3944fd5d428fcee4b61f2a78379d0ae600ce0908ac66677fe768c6b7f9f740cc72778f57c7321db0bf8eaaddfdc32437e506e466a509d743143a381ec532f17c555a6d53c5045e8d4e9ff792eb3d18c8f2ffa7e5a15b4a2d42b4192b3021b5bccb31544db430f7198e340c442180594be71f81d9c58b4d1d728e76943143aba8568ff0e8e6404fcd48c76ad4eb2d47c1adc61d41d6ba0181d07f275cc2e981c2cff7e8a2bb5b49f91e27315677b87c242d7f2fcba488a0b8e8fb0c91eb024bc2222b249f9ab7717d1d7f8fad2fd1499ddacc7644f7a49d14917945643e03b4a00a5b804a5727a8036c2c8b45fb67129493fc985da284b3827ad1c8a7cfc2963c0193184eb342fc5356f397e53053f967b00552a6b7aeb42050578d5c15793d97b8ee1bc66bc0eafd9632ca82d7e26de6cbb9a98429f82a900f6261eb2497896fef4331e19b825a79e25b95f89b5d9da06d41c86d290ca067e57d11de05d760df712ec37c8f30b8bd6b210c151849feb28d8ce5b6cdcd10f0477ba49983bb8bf5647e2dd69eb5a63fde8e8cf4342458bb990a33f6678cdc480156b9a11841be047c0ab2a8a8765fa9509330cde446d2d0b4a0e87a5fd22ad3910ea5137b808bde3a2c24ed2cdb78cd8db0e9ff485361da120740ab0971bbe240c7760feb0be175717ef5510a5a6f35f4b326636b1a67ebcd4ae35cf814523eb838108092d466a4c576194e718aed74695db100e6f0eb13dc778617364a86d5a25ef0b623346b1fe37eb2efd76501f37fca9d26d3e10e3311eb26542708ac69d77af21f49e5ee809c99e2649e0e7ed20b6bd52acd61dd2df896e1174ad052865f2fdf26664087bdfb2c02d4f8ecfdd6bed93afeae6885f7dc594e632e8", 0x1100, 0x5, 0x0, 0x2, r1}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x5, 0x1, r2, &(0x7f0000000500)="aa44b249935c3abd632b322104d82d05e445f7371f42b9f07592cf988bab729639105be16bec138a9435da37737a24cacdd839fd21b778b7baccecb2be5a1665171301fdb4c15c577b7850cc305f8f3054488a6c0266acd94dabfee2c78c0e92a20052", 0x63, 0x0, 0x0, 0x3, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x3, 0x2000000000000200, r2, &(0x7f0000000600)="6e3f698f3de369e4e4945393eee6ab6f3b5e02d02591467e9d91fd60140ba3cccbe5b4062b403178fcb4a07d0cd5523a3d9e00cffdcc6e56a9f0aecf7f166871fe5497b10cd619d8a276fe2f6a0a01631d8f61c6916713a1cd4acf8db71196c5ef79d53bcfc358bac2557a4ce61064", 0x6f, 0xffffffff7fffffff, 0x0, 0x2, r5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x9, r1, &(0x7f00000006c0)="558f16a5026b5204d0534ed64edfcc32ec1de76931edcff8df6020fee0266c44c31573a67706f9884dd205ca2a25494b3bf10571b32b84206d9e4f1ada96fef48c8d1cceb5078bd454d3ef66b2cfbb1d20487dbf30f55d6517139dbc531a96a01052f0003ea408b0006761f4fc", 0x6d, 0x6, 0x0, 0x3}]) r6 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x50100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r6, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r7, 0x1}}, 0x18) 09:20:21 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x2c) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x60, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000"]}, 0xd8) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:21 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) fstatfs(r0, &(0x7f0000000180)=""/83) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x167) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000140)={0xbd, 0x329a, 0x80, 0x501, 0x8001, 0x0, 0x4, 0x5, 0xbe, 0x1, 0xd7d, 0x401}) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f00000000c0)="9a648561fc38dfc54b3e525f985b968947c9c2aa0ac97f54a43847fc35b6e63ae3350b8942f7627a3eb6", 0x2a) 09:20:21 executing program 2: io_setup(0x48, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 467.739222] kernel msg: ebtables bug: please report to author: Valid hook without chain 09:20:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:22 executing program 5: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:22 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x3, 0x400000) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000340)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000400)={0x0, r4}) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x8, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x4, 0xff, 0x7, 0x4, 0x9, &(0x7f00000001c0)='bridge0\x00', 0x80, 0x7, 0xffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000380)=""/61}, 0x18) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000140)={{0x2, 0x4e24, @local}, {0x6, @local}, 0x22, {0x2, 0x4e20, @multicast2}, 'veth0_to_bond\x00'}) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x1000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, &(0x7f0000000280)="c380a3751b8f66f5ce1e424ff9bbea1976bc10d83ce3f42e388a572cd3"}, 0x10) 09:20:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:22 executing program 2: io_setup(0x48, &(0x7f0000000100)) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x40003, 0x0) close(r0) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x102, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x117, 0xb}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x48000) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000040)={0x8, 0x2, 0x2, 0x747bac0f, 0x3, 0x100000000, 0x5000, 0x7, 0x7, 0x5}) 09:20:22 executing program 5: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440)="e6af73deaaa4782970bc", 0xa, 0xfffffffffffffffe) 09:20:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xf, 0x80046, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x27) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x502, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x364, 0x13, 0x100, 0x70bd2d, 0x25dfdbfc, {0xd}, [@nested={0x338, 0x67, [@generic="d81e749885435c9bd75d9123d37c8b57507a72bc22bce197c977312f48c90af335878cb7e4d17c93c4235017945f694dee6548689e43e5aed7c20c1542620b0a295182be4ab5392dc484fc3f64bf91059fe4af03", @generic="b2dc2b2aa5c7dac6d5149649193dd8f27b375098a5583c104028cbd23dfbe27f9f3819dfd52334136ac526660d2d03b505d44abef122439cfba734d3b49cb08f4649757902c194b221b63c7f92927b2871012988eb6357db917330eeffffce919608a870f08edab6593519662ec0591a5cdc3ddf2d5ea0906fbf6a054e8d64e0a0c234cb17c7e5047bb814d615c4a6c49e6aff58f032fbc0aaf7a3da626d0ce2a124c71db54c2bbfbba9c217bcbfee3cd4ac4c4786e86d4a38cef619395a5cdcbc8a4a0373d9e0782b4b65c755603001c8fb29e30549c3d42956ccf0514a1dbb850212ae85197ac1ad09f9eedce479ecebfaf5", @generic="ae70325efab72fb55fa72e0428652a058a873ec4dac797ef120b627b6e8e1cd4211a7e7f8f65815dfa5d2198fad13c1b74cb7735f7ea158df59e6ab8aed5f0ae5f180799fdb1bd3a00d9bab1d554793f3c3ce0f5b0af8079de19a05c6eea5f674d1cc3c57430882b8ece9c15d22546dbce04e5a0ecb7c7e0b22f2fcf8a6479189124b34ca4c26be6c536a0368bdbf830f5c263463b27f092955af682695fd7811fd895f18128fd99fd60f1f19f7d75", @generic="6757ff412db64d96faa58ee6f5354a3c133b8ffd714b2b9f529d049c4c1cd407721e5e74ef7952a19940c85d08b280b060419bdaff8376bd1858f5d7685716fb0f3eee198961b5037f99a8e90afe99d5867855b21fab4d652af6a3ffcef884024951d2", @generic="11fa7e8c954c38a691e2d8b93797ea53d1aad4d9ac9ed7e6df154f050b474a53d98e2145e911669b84c1badc7e5f885973a3752dc4c41853ba6a41581bbbfc73742e9d3fae14b839d041dcc5a5b3c4da6c91f5cc8713b23a2e2230590e8d6d611e0906ecad787d82ec0e2db1732ab2aa5f5267", @generic="87ad2bfce9d9b2b2ef6e9bcb0bebf47dfe3ccdf06a9819f0c3a122dba36cfb6c206c33408ed27014ba78c16e621a798ae1ccc420d69745fe40fb48e39ea2157f74d0eba4712da1bebdca65887c907c31faecad44c6dd23ad025459f263ce0bdf", @typed={0x8, 0x2b, @ipv4=@broadcast}]}, @generic="b1e50a6418c1f3b31851879543562847b65d3536bd547f48"]}, 0x364}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000100)=""/61}, 0x18) 09:20:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:22 executing program 5: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:20:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) open_by_handle_at(r0, &(0x7f0000000000)={0x2d, 0x14e000, "181ebd2d3e818df71a549aa6fdbdb2e79aba096b1cf65d91670e5e9133f36e2be05c32cbb4"}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000"]}, 0x108) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:23 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000000)={0x2, 0x7, 0xfffffffffffffffc, 0x6, 0x140}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x2}, 0x8) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000400)="72616d66730030bfcb4aba98b7a2f31c7f11c80a865b1b109a70ccbaf9b068e2668dbdd92d6a125cb01ff20630f3475ef67d37cf2a6f9daf09212d433e0930a7a858c37c16e2eb014b9207e29c17be9327e609a73e2d5094385e4d079981b04302af7b9d50f290c9a1c26c33dc1636bbfadcf4779eb7b569330544d9db47", 0x0, &(0x7f0000000380)="f89ad25c69a14ddeb6b9ca55419d15e036219134235884fe73") mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) socket(0x0, 0x0, 0x0) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='udf\x00', 0x20, 0x0) 09:20:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f00000003c0)="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", &(0x7f0000000100)=""/243}, 0x18) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r1, 0x8000, &(0x7f00000000c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xa8, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000"]}, 0x120) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:23 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 469.804901] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) creat(&(0x7f0000000000)='./file0\x00', 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xa8, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000"]}, 0x120) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x4000000000000, &(0x7f0000002a80), 0x159, &(0x7f0000000100)=[@op={0x18}], 0x24}], 0x4924924924924b1, 0x0) 09:20:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="961655d496b7b1459cfcd743a28315a3eafc8038fa80083a159bdb1b847612d9e967439c2848") io_setup(0x48, &(0x7f0000000100)=0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7ff, 0x1e, 0x8, 0x9}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r3, 0x9}, 0x8) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 470.399508] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xa8, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000"]}, 0x120) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:25 executing program 3: io_setup(0x9, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) 09:20:25 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x80000, 0x0) read$eventfd(r3, &(0x7f0000000440), 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000040)={0xffffffff, 0x0, 'client0\x00', 0x2, "eda8ec2f6b2f3e05", "83070d44643362b2fc593e74044821243ffea41d9ebfe85a2ac16635453138d5", 0xfc2, 0x8001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000180)={r5, 0x58, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x6f, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @broadcast}]}, &(0x7f00000003c0)=0x10) [ 471.094843] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:25 executing program 3: r0 = msgget(0x0, 0x0) r1 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) r4 = getpid() r5 = getpid() msgctl$IPC_SET(r0, 0x1, &(0x7f00000002c0)={{0x0, r1, r2, 0x0, r3, 0xa, 0x9}, 0x4, 0x2, 0x1, 0x4, 0x0, 0x4, r4, r5}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0xd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r6, 0x0, &(0x7f0000000380)=""/61}, 0x18) r7 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x0) ioctl$TIOCSWINSZ(r7, 0x5414, &(0x7f0000000100)={0xfff, 0xe0, 0x7, 0x5}) 09:20:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xb4, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x12c) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:25 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) 09:20:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:25 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="710000000500000045c30c25a757d51c07cb4bf6b5564e6c8d8985f9c8c11efc922b39a86118c683f4ee2bb45c2f5e74bbb1635a9a2e69174a2f671503fa98b6b02c29a53526c38c22a11260985144d157793b0546f58324aefeaee2a151ca3a41e0f80dbce05a02983ea9127fcafada1e"], &(0x7f00000000c0), 0x400) [ 471.835239] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x400000, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000280)=0x6, &(0x7f00000002c0)=0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r4 = msgget$private(0x0, 0x48) msgctl$MSG_INFO(r4, 0xc, &(0x7f0000000400)=""/181) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xb8, r3, 0xb10, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfcd}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8a3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) getsockopt(r1, 0x8, 0x1, &(0x7f0000000300)=""/93, &(0x7f00000003c0)=0x5d) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f00000004c0)={0x4400000000000000, {{0x2, 0x4e24, @multicast1}}}, 0x88) 09:20:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xb4, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x12c) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:26 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f00000000c0)={@remote, @multicast2}, 0x8) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2a0000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) truncate(&(0x7f0000000040)='./file0\x00', 0x1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x2000000000000184, &(0x7f0000000200)) 09:20:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000280), 0x0, 0x20000000, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) dup2(r1, r3) tkill(r2, 0x1000000000016) [ 472.317958] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:26 executing program 3: setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x1ffffffffffffd, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xb4, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000"]}, 0x12c) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:26 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000080005, 0xfffffffffffffffd, r1, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffff9c}]) fcntl$addseals(r2, 0x409, 0x4) [ 472.727295] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x13, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x0, 0x6, 0xffffffffffffff26, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0x0, 0x0, 0x7, 0xff}, 0x0, 0x0, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) 09:20:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x224440, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f00000000c0)=""/147, 0x9}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x5, 0x800c, 0x10000, 0x4, 0x0}, &(0x7f0000000200)=0x10) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000340)=@get={0x1, &(0x7f00000003c0)=""/207, 0xa98}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000700)={r2, 0x8d, "b441e56e46427a45fbad745d85231daba09f63da85c4f452113995152a1d45887b4c396a6bf71d87c6216454985bf3d5daf21a131b108825a119ee23dc2884e8470c8305406d801882169a9f5c360c7b02000000000000411533336b33f71ca7d406000000000000bede6d520bef46867675bd6d7980969b37d621e19d7261d74a0f94719e9f921da3fa82ab29299d8d590a8a836567cce5de99e5a5f1162327beb8b046cfae"}, &(0x7f0000000300)=0xffffffffffffff17) 09:20:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xba, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff"]}, 0x132) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:27 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0xffffffffffffffff, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000180)={'bridge0\x00'}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') exit(0x0) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)) getdents64(r1, &(0x7f0000000340)=""/57, 0x3c) 09:20:27 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80180, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 473.328255] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xba, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff"]}, 0x132) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1000, 0x10000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x8000, 0x101, 0x9, 0x3, 0x6, 0x1000, 0x9, {0x0, @in6={{0xa, 0x4e24, 0x2, @mcast2, 0x2}}, 0x5, 0xf0, 0x1, 0xff, 0x4}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x80000000}, &(0x7f0000000200)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x6) 09:20:27 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400000000400203) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 473.747926] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xba, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feff"]}, 0x132) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 474.063145] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x240401) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000240)="a191d24a706e5ec5f7df3bf8598f44d6b11425368bc0a13c293a59e1d2866cde37d006f286c0410a81b2ecc6af7675cc48f2104d1c46016dac5a2cfda7f679718d0b7ac810a0c768039f7d95282021544bdf5022e32dd7e9a15413a02dc19612e2c54abd18df0305948bfd2ea5a846329312bf6fe635f54669dfb569e1", &(0x7f00000002c0)=""/171}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4010800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000001a0027042cbd7000ffdbdf2502100002fe00fe0700340000dc4c1dd62a6c147d2cf6b2de312256bdd2707af887542b92a605ab6c0e2caef0bafd3d7fac4c3ba8f8ca0c91b8e9f72dd6dd04c407836bb5218634cedf81edbf4ce55ce457dc20344ca86cd1a704e16bdf227050ed5c28a9f066c2cc0df47c02b7"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 09:20:28 executing program 2: io_setup(0x48, &(0x7f0000000080)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'vcan0\x00'}) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) geteuid() io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbd, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00"]}, 0x135) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 474.437180] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/wireless\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000080)={@mcast1, 0x6f, r2}) readv(0xffffffffffffffff, &(0x7f0000000a40)=[{&(0x7f0000000540)=""/254, 0xfe}, {&(0x7f00000006c0)=""/219, 0xdb}], 0x2) preadv(r1, &(0x7f0000000480), 0x1000000000000282, 0x0) 09:20:28 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2000000002, 0x100) write$UHID_CREATE2(r0, &(0x7f00000000c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x30, 0xffffffffffffff01, 0x7, 0x2, 0x9, 0x8, "e4a7a5185e286103659d88d518610628e0c018c57b794a78e53005c18c1e3cbaf1879647ab3f4e0097e53188c72e1c94"}, 0x148) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000380)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) socketpair$inet(0x2, 0xa, 0x80, &(0x7f0000000340)) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000300)={@empty, @multicast2, r3}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, 0x0, &(0x7f0000000240)=""/61}, 0x18) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000440)="0963b5e5e8845cf9aeccff200faf44497a53010e58a000b27ffedac110643ba3897960582bb4938911360628efad7615f37ed01952f0ca9a38435a5df452dade3ee487f80ef9702b68012dfe7c415b2282ed81b846fe5491f5721c002a2e23655dda151b2275552a843285") 09:20:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbd, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00"]}, 0x135) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 474.720231] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) 09:20:28 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r4, 0x4018aee2, &(0x7f0000000140)={0x0, 0x829, 0x7a, &(0x7f00000000c0)=0x6}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee1, &(0x7f0000000080)={0x0, 0x0, 0xffffffff, &(0x7f0000000040)=0x2}) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 474.841198] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x28, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}, [@typed={0x14, 0x3d, @ipv6=@ipv4={[], [], @loopback}}]}, 0x28}}, 0x0) 09:20:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbd, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00"]}, 0x135) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x80000000, 0x1000, 0x1}) 09:20:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 475.206657] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf617732743e397b89f26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d5c6070") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x541b, &(0x7f0000000000)) 09:20:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:29 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x100, 0x200000) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ff4000/0x9000)=nil, 0x9000}, 0x3}) 09:20:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbf, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000"]}, 0x137) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x200001, 0x6, 0x7f, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x2000, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000200)) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:var_auth_t:s0\x00', 0x20, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) 09:20:29 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x28, &(0x7f00000002c0)}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') read(r1, &(0x7f0000000400)=""/117, 0xfffffffffffffdbf) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x401, 0xa}, 0x2c) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000000)) [ 475.753762] Unknown ioctl -2145357807 [ 475.766272] kernel msg: ebtables bug: please report to author: entries_size too small [ 475.777348] Unknown ioctl -2145357807 09:20:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0), &(0x7f0000000100), 0x100000000000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000000)=""/61}, 0x18) 09:20:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbf, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000"]}, 0x137) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:30 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000000005, 0x4000080000) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x91) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0xfffffffffffffffd, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r2) read(r1, &(0x7f0000000080)=""/116, 0x74) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r4 = semget(0x0, 0x0, 0x80) semop(r4, &(0x7f0000000040)=[{0x0, 0x100000001, 0x1800}, {0xffffffffffffffff, 0x0, 0x1800}, {0x4, 0x4, 0x1000}, {0x8, 0x8, 0x1800}, {0x3, 0x6, 0x7fe}, {0x2, 0x8000, 0x1800}, {0x2, 0xff, 0x1000}, {0x3, 0x22, 0x1000}], 0x8) [ 476.285868] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1000, 0x4, 0x0, 0x0, 0x0, 0x7fff}, 0x1c) 09:20:30 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f00000003c0)={0x7}, 0x7) creat(&(0x7f0000000300)='./file0\x00', 0x0) 09:20:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xd2a0, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x4, {0x8, 0x0, "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", 0x3d, 0x5, 0x8, 0x63, 0x800, 0x339, 0x1}, r2}}, 0x128) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xbf, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000"]}, 0x137) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 476.634770] kernel msg: ebtables bug: please report to author: entries_size too small 09:20:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000005c0)={0x3, 0x70, 0x9, 0x0, 0x90, 0x5, 0x0, 0x4, 0x0, 0xe, 0x5, 0x7, 0x9, 0x3, 0x7, 0x4, 0x3, 0xc2be, 0x2, 0x200, 0x0, 0x3, 0x984, 0x5, 0x1, 0x12a915ee, 0x8a0, 0xfffffffffffffffa, 0x5039b34b, 0x9, 0x2, 0x0, 0xfffffffffffffabb, 0x0, 0x1, 0x872e, 0xe9, 0x7, 0x0, 0x2, 0x2, @perf_config_ext={0x3ff, 0x1f1e0000000}, 0x500, 0x2, 0x7, 0x3, 0x7, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x9, 0x52b7, 0x0, 0x2, 0x0, 0xfff, 0xa0000, 0x5, 0x100, 0x6, 0x9, 0xeb, 0x0, 0x0, 0x4, 0x9, 0x3, 0x0, 0x800, 0x2, 0x8, 0x100, 0x81, 0xffffffffffffff81, 0x4, 0x3, 0x800, 0x3f, 0x0, 0xffff, 0x7, 0x242, 0x5, 0x8, 0x5, 0x586, 0x0, 0x9, 0x1, @perf_config_ext={0x38f, 0x8}, 0xc008, 0x81, 0x0, 0x2, 0x3, 0xfffffffffffffff9, 0x40}, r0, 0x10, r1, 0x4f7eac2cdc12f10b) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x0, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={&(0x7f0000002600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002780), 0x0, &(0x7f00000027c0)=""/250, 0xfa}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000002900)=r2) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0xe, 0x46, &(0x7f0000001f40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000001a00)=@hci, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001a80)=""/87, 0x57}, {&(0x7f0000001b40)=""/200, 0xc8}, {&(0x7f0000001d00)}, {&(0x7f0000001d40)=""/20, 0x14}], 0x4, &(0x7f0000001e00)=""/247, 0xf7}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000200)='(}\x00'}, 0x30) sendmsg$kcm(r3, &(0x7f0000000240)={&(0x7f00000000c0)=@llc={0x1a, 0x13, 0x2, 0x0, 0x1, 0xfff, @broadcast}, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="e8000000000000001201000006000000c0d5ce843efc11ec7c13e74762bd36448dc7aafaa2a500662effc50a79b6580551fefb273aad5e4ab8a6f660744825f7f0821db03532f7fed6e084580002ce73bfa3e4dfa33cf165b95b3624df356d9921e3026b3bce5f3b60abfb2741ececb6ef97c3daa9b989f141cb5dba56544044c177cc8a771cb75bb73549e9e4555d9f4548d070c203a4fe9ee2a1d79cda1dadaef0fbb1de4442402d8b0a7c526e482d776144646a8587c2da46c1ee9329ba1fb6fdaad93509a3069e3c1b9b121bf1e2ee783b6a080e343f0000000000003b2e686cd77b8a6febfd2f37fff9e5eb8253d7ece2fd8ab1dd6502a7e8c735ccb9845b3b2f16a31d7012ce99b53e79d4378c3877187ea46e98ae6b70ea1a4fffa0a379726501f749c6c62a41c9ebf2af93b68d83beb4dcaf7ae84a00800185692d2c12efd26148ba138c0fb64ed46539d0de51b75da1d784bde8d61a443239d5808479c303ca50f6e687d1c7073bbca14e750a602a6d6d00000000000000000000"], 0x17f, 0x4040090}, 0x800) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000001fc0)) 09:20:30 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cgroup.cpu/sxz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003480)='cgroup.controllers\x00', 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003500)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000003540)={0xffffffffffffffff, r2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r1, 0x50, &(0x7f0000001b00)}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) gettid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000200)="54f3af2696caefedc29d980b7b2cd6961a01e7920f92dd36f14b44cd6915238ec9bf9c1dd1059d9a5b88f099c19828ffbc7162f2b18cfb823bdb2ea598acaff456c255460545aae4fbd216fbba8c937e359a", &(0x7f0000000280)=""/136}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000001c0)}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x1}, 0x2c) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001a80)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x28, &(0x7f0000000500)}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001c80)) socketpair(0x1b, 0x7, 0x7f, &(0x7f0000000340)) 09:20:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x4, 0x300fff) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000000c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:31 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") close(r0) 09:20:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x2, 0x3, 0x2, 0x1, 0xfffffffffffffffc}) 09:20:31 executing program 2: io_setup(0xfffffffffffffffd, &(0x7f0000000040)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:31 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 09:20:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 09:20:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000300)={@local, 0x0, r1}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@ipv4, 0x0, r1}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="a358767ea41690abda75ff1b6e29c58c", 0x10) 09:20:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) lookup_dcookie(0x6, &(0x7f0000000140)=""/133, 0x85) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x8, 0x10}, 0xc) 09:20:32 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0xfffffffffffff800}, 0x2) close(r0) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(0x0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x12, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x46f, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8}, 0x48) 09:20:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x900, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000000c0)=0x20, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000200)=""/61}, 0x11) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x7, 0x100) 09:20:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)) 09:20:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, 0x0, &(0x7f0000000140)=""/61}, 0x4e) r1 = semget(0x3, 0x7, 0x2) semctl$SEM_INFO(r1, 0x6, 0x13, &(0x7f0000000280)=""/235) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @rand_addr}, &(0x7f00000001c0)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xc}, [@generic={0x40, 0x101, 0x100}, @jmp={0x5, 0x3, 0x7, 0x1, 0xf, 0x8, 0x1}, @exit, @map={0x18, 0x5, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000000}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, [], r2, 0x1}, 0x48) 09:20:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RLOCK(r1, &(0x7f00000000c0)={0x8, 0x35, 0x2, 0x1}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x10, 0x4) close(r0) 09:20:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xf, 0x6, 0x7c, 0x20000000000005, 0x8, 0x0, 0x1000000000}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop', 0x0}, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000400)="72616d66730030bfcb4aba98b7a2f31c7f11c80a865b1b109a70ccbaf9b068e2668dbdd92d6a125cb01ff20630f3475ef67d37cf2a6f9daf09212d433e0930a7a858c37c16e2eb014b9207e29c17be9327e609a73e2d5094385e4d079981b04302af7b9d50f290c9a1c26c33dc1636bbfadcf4779eb7b569330544d9db47", 0x0, &(0x7f0000000380)="f89ad25c69a14ddeb6b9ca55419d15e036219134235884fe73") mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240), &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) socket(0x10, 0x0, 0x0) 09:20:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x10, 0xf}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x22, 0x301, 0x0, 0x0, {0x3006}}, 0x14}}, 0x0) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/233, 0xe9}], 0x1) 09:20:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$3(0x3) 09:20:33 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x5a) 09:20:34 executing program 1: 09:20:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x1fe) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) fchdir(r1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1f00000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0900000000000000ffffff7f0000000000000000020000000a000000000000002a0700000000000024020000000000000700000000000000000000000000000000000000000000008000000000000000000000000000000001010000000000000400000000000000060000000000000000000000000000000000000000000000010e0000000000000000000000000000ba00000000000000400000000000000005000000000000000000000000000000000000000000000004000000000000000000000000000000030000000000000005000000000000005e040000000000000000000000000000000000000000000002040000000000000000000000000000ff070000000000000100010000000000060000000000000000000000000000000000000000000000000400000000000000000000000000000004000000000000ff07000000040000000000000000000000000000000000000000000000810400000000000000000000000000000400000000000000faffffffffffffff03000000000000000000000000000000000000000000000000200000000000000000000000000000060000000000000007000000000000005c9400000000000000000000000000000000000000000000800000000000000000000000000000000200000000000000f200000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000020000000000000004000000000000000000000000000000000000000000000000080000000000000000000000000000"]) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000000)="7ec783a3f994126846c7e414fdc00f22ed09719bfac818", &(0x7f0000000540)=""/173}, 0x18) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x40000, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000400)={0xfffffffffffffffa, 0x7c79, 0x0, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000440)={0x0, 0x100000001}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000004c0)={0x1, 0x800d, 0xffffffffffffffff, 0x7f, r5}, &(0x7f0000000500)=0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:34 executing program 2: io_setup(0x4a, &(0x7f0000000500)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x80000000) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb0, r3, 0x308, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x54}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x67}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000480)={0xffffffffffffffff, 0x3, 0x3, 0x3, 0x100}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) r6 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x7ffd, 0x8e000) io_submit(r0, 0x1, &(0x7f0000000200)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x37eb3627, r5, &(0x7f0000000000)="99f940b75086f77f6432636d7ce5093f557a1afdb534ce838a5a9fe9c1abd34c599fcb65c1d82db7c92245c2fad0a528d6a7fff436102e479fb0b530a638f168961a33245afd5aa971d1e90f7196b0f96deb72a637695c32f279a6cf769d5d96c6cf8d29cca370e0cc7b21746cbf4a81f2a7e33f8734ebbd77c1245e105e3dc7412e42464c8db8574b391e2242831e5844da753e90ed66154f0448463c7c73543f18a7a7cfd9d7a138c2323d6eef5a7d2175d7d56260245b0cfa5f2083c55f03f779d1952743e2260b726180abe4955fa242d32f90440b", 0xd7, 0x1, 0x0, 0x1, r6}]) 09:20:34 executing program 1: 09:20:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:35 executing program 5: 09:20:35 executing program 4: 09:20:35 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000480)={0x3, 0x1, &(0x7f0000000200)=""/67, &(0x7f0000000300)=""/193, &(0x7f0000000400)=""/98}) accept4$unix(r3, &(0x7f0000000040), &(0x7f00000000c0)=0x6e, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:35 executing program 1: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$bt_rfcomm(0x1f, 0x3, 0x3) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x64}, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) write(0xffffffffffffffff, &(0x7f0000000480)="c96939072ff232171e937bc190e66fa850b8cfae48ed22d458411203d8110e3caec86a49d974c56d02c18c442328ee95ae2955e758352a60cae75c9c40a53c5b0fed535bd829f0ac3816e9f190b5b1783c9f4f3686a5958caac4030190e9d7f8e0838e7a4b024781895dce83ed1fa3", 0x6f) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000340)=0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380)="88cd4e497568deb4d2240e1a6afc1dccb3fe8b7cc08af1ed2f054847bc121e9363d6b2dde2d7f7106802b0eb9876cb89e91a7d9c8f28076774a4f76f58685b7e6f7f3b2a1500264dec844a3fb6d8504d4ca015d98894788bbfd8494a8d20ca7869d0132f4868b483508a47", 0x6b) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 09:20:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000002c7, 0x0) 09:20:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000000)=""/61}, 0xa8) 09:20:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:35 executing program 5: 09:20:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000180)="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"}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x280}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x48, r2, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x778d}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xc}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x15}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x0) pipe(&(0x7f0000000000)) 09:20:35 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1ff, 0x40) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000300)={{0x0, 0x0, 0x1ff, 0x3, 0x4}, 0x2, 0x76, 'id1\x00', 'timer0\x00', 0x0, 0x89e5, 0xcffc, 0x7, 0x8}) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:36 executing program 4: 09:20:36 executing program 5: 09:20:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x101000) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000000c0)={0x39, 0x6, 0x0, {0x0, 0x6, 0x10, 0x0, ':&\'-#GPL.vmnet0/'}}, 0x39) 09:20:36 executing program 1: 09:20:36 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x4000, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffa, 0x8002) getrlimit(0x2, &(0x7f0000000080)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3, &(0x7f0000000300)="261501880606c8b6f3e2a1eb2a438f4fed22455804a45a73d083f20fddaa08641dc0b1ee6490cec5f6c49b556eaec33c28ac5598d04372c26d4f60410962a814d89c0d632c799cc7df52ad1cf18b760b7e5e551d57177a62482067b008112d96fce4aeb67a9e04b03214e91a7c6c657ac65623f91386030e202074f96945480ed3e9e982a5ed09207de8c51448fc535bdb7436d514ae20fc6c7c9010a4dddbe3e07ad0b4d450087ea4bc1cd999de07daaa3c6c1cdc015f600fc3f2b4afe06ee1152900c361fd85f3971d75f33df6db6296f60e5fbe2366684fb86d87b8e7f015cd2c527167ef30a9"}, 0x10) 09:20:36 executing program 4: 09:20:36 executing program 5: 09:20:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:36 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/61}, 0x18) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x3, 0x92, [], 0x3, &(0x7f00000000c0)=[{}, {}, {}], &(0x7f0000000100)=""/146}, &(0x7f0000000240)=0x78) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x7) 09:20:36 executing program 5: 09:20:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f00000000c0)="68705baba433bfa54faf736cfdeef1198c2d49bd438e28f2328ac3d9955217a1ea79602581c847942a65feaac5e1dd3d5124947b9a5c6236b243d64fc92c315e5bedfba1209777f8aee4e6cde60c6c94fbeb64fe07cff7031b7afc99fa1ac44791a0e63d0b0c08962b06db69efb6ae87ba949f421e014c55a781a06936d283749080db5b4bf76a199a487b962c1f8e9d727ff828c01f5db3357a96e4ed349b3925589a83779c6a35f06df609a26afdab7afeec309d945495fd2c614a637e2dcd57abe5b700c978157ec426396c98acc800be937e48123fd250cd3e5615d82a806acd2d4d5362c28b77dec9b56fde74f6fbebb2abd98e4b9bac27e9b687ef", &(0x7f00000001c0)=""/112}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x42c80, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000280)={0x4, 0x8, 0xd15, 0x3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:37 executing program 1: 09:20:37 executing program 4: 09:20:37 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) 09:20:37 executing program 5: 09:20:37 executing program 1: 09:20:37 executing program 3: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x80000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x401c2, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000000180)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f00000000c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) fchmod(r0, 0x2) 09:20:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:37 executing program 4: 09:20:37 executing program 5: 09:20:37 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r0, 0x7, &(0x7f0000000040)) io_setup(0x48, &(0x7f0000000100)=0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) close(r2) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r1, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:37 executing program 1: 09:20:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:38 executing program 4: 09:20:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/246) 09:20:38 executing program 5: 09:20:38 executing program 1: 09:20:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x7, 0x100000000, 0x1, 0x2, r0, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f00000000c0)="ca5bf08aa20540e5a6", &(0x7f0000000100)="c2b64f6a50f824baea14f0f8bed21df192085b3a266dbc6eb97837a39a3b6b117ed2f8f9f6d28d4eb5c8a9ed30c992219e9ab8ff0b5bd1273c5bd38c7f5bee01389979bfc6aa36e2f60bf136e232489c76bddcbcc1f739987b39d931b37acb34260effcb65196cbb109c4be5765c08c2e573356a987e27844d9e6085bad62790061c07978b949815147d6e93332c53f2c7fb130ca6958a27515f44cf4ad4e51cfee20160c3", 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:38 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0xe, 0x104) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:38 executing program 5: 09:20:38 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000040)={0x80003}) 09:20:38 executing program 1: 09:20:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000000c0)="a5be6d81dd3dd8a62d34f5c9dc926a720b42cf5d9b5b12bfbbb26466ca6a63accadaf9ac3969537623e90cce63c63866bc23d84b8e090c408bedee703417d7468889eb82d03d95", &(0x7f0000000000)="81e093594ce85c3cdf4987e04fdd373d1a53362bc69bef8fd3845c6b8feaf1ac8e058854", 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:39 executing program 2: io_setup(0x7fffffff, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = accept$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x7ff, 0x3}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000200)={r4, 0x0, 0x4}, 0x8) pipe(&(0x7f0000000500)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x3c, r6, 0x210, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x41) accept$inet6(r3, &(0x7f0000000480)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f00000004c0)=0x1c) socket$inet6(0xa, 0x1, 0x101) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = request_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)='/bdev\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='em1wlan0nodev\x00', r8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='/bdev\x00'}, 0x30) ioprio_set$pid(0x2, r9, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:39 executing program 1: 09:20:39 executing program 5: 09:20:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x7, 0x0, 0x11, 0xc38, 0x1000, "647e079487fd3c40a91a939687a554494a1bafb6b3e24cd2b4a30826894f551561bbc1ca58db6f568a11607e5b78bd24d3c864fe15e53a52c2e14edd89a0445cdff9f44e1fde012ab0b189ed7720dc7ecf6b072b810795640c7d6fcfe2411b8915c35d299cede5560aec810b62c425f03fe7418fbcbc2e2e61373fb02e4f9b7c3d650ffdc3c5c2e5d205936dcd598f862262ff2033912bfc202e9991899dd21efa95589c815ec4e86e8eea8d405cfdc0b1a3ddf777c3f1a26ea253f3dbd1c8ac8ad1ffa60731f7f075abdf2d07d91771e06a43e79a49cff28645a62a43fe26f9360487155b1bbfc4cd19a538e207e8670a82d92fb3c8daaf5ad97bb2a48545d701984266f569b8bea38dec177568bd4c21fcfc2f18d49b9dc664f1bb278ec25be1d5af47ccc75fbb65e8cf5b19514b682108514bf1a93bb426d4e6459a595bbe84977191edb740dc8f13c9e7c574a0152b7441990d8c60de688957b7226ceab8103add126d516531c01f3d2a8246a7e5f3786f2804969a1ec05d63a4f56f9288b6774dfeb39507bd376d78ca9e1cbfcf9314ac9887af48932367c53c914e3923e06e4b5c5c13dab2dd6f0bd0cfa4f0094ac031472b54e32153fd79dc3acf618515158b6a1299b1e470f62ac3fb2775f34007406f9e8bd72c906c7f13bdd5f2af161014320d578456285d298046138e6b59aecbfbc5539090dd3d686f2d477e65d8458be3a91e94e2c6e2a2cea8591621041a51be953bf132d33e7327952e491c34376f09a337ce61e802a7b748a7050038c04ed4fba05e962e542e6186a3a00c4a17239fecc7d360b50c45457d728f8ee77dd0caad6075576c9ec64c30dd2b04943208c8964acd0af8fb1fde5c76b634d4bff091f5ba2319d4c846c67ad75b09a1b443c80373ec253021dbbe1db29366511b7663e3eee8ca9f864a016ae2789fc98763cb7788d9f944ac553c5d6dcd098ee79acd63f278e7304c3fee12ea2d05cca8eace3510abed0ed509dca15fc0a16d57a4482741c7121cafa7581296a3b2594f0503356171aa3224d94c6c4d5c1412163047c33954a485c1efb21d19318901b14a4c5a8a3bfe1fc7caa9cc2b083008b53d03a69ac0038419d67e9f7106a0f304c059f08c2b66deb26b7a00ac9f2a87781f0952722a54a78e2debb56ea03c05c0d5aaefbb652cafd38d10696f0baa8f2446d668c7772d3930beeacbc249912729e3c634651e18e458b63bb4ee2a4d019162209d32e8936fe9b6466d1fd1980a8407bd5855758901a4235f18c53f7d11f20035713e2813fa17677617797017fdc3ad641a24cb77dd686d10760bf8a4130a217158d76742829b6477a94826dd436cfa081ec92338076d77c135bad0207e3cd0ee65d02f6b4b717afe4b34e77719bb5557dd2ffeff7f94794575d26637c705e88cb37df59412f7606b9aa6703c835d728d5b9eec31149192be560e227c4a33f975a13dab8ffc98a404792eb11d459320509c577f31f9aeddd2a5156446a833735fe5c7b9bcd35dc5294ff25cb63a9baa2d61d6c952b2d00f74fe44daf9ebd1bc9bfd804c42691742ba57e7d5e3f01b07f0f4fcaa3d10dbff6643e1e44eab79e778012698f156577f4b69fe0a5f85719a06576b93d09616a1ffee72200a585958035eb7eba4dd2f06aa03b8d28a943592ecfd449edd1f3f5ce4e8a7085895ce8e5ac48f7b3716a3b49eeda20f8dd71bd3b7bb25e1603da27ac1ed607dfa9d34fdf0c242e2f8004d34f19891c371d5c104d36252f55f8c263098b1df9a3993901e3946c6f99d85ca96e428ee7230be2ad05f158d773a406734bed868afff231e2ad67fd3851c7d537fa4a98314ee2434012e854c2bb9650574466339cf1e74eadc4791646a9be0a107ef6948c7be96ad36a8c05672ebe0ada93276ab076ecc6be36e66b57b4e14a1822c8d2fcddbaa351e1625397e6b0a34c00fe55f18dd992e1ead8bb5ff2e57e7599fd84982d7526cd2d8052d8c76a4c2d280f7082892d7a47bed7882c03a5ec401576d8eaf25cb2e0348bec3e39b776b406f190e6361afdb0bfab47472d80edd2927a631382f817894c2c0e2a8608fccdf688c17f0111e393c70e9a4b9504af4e8e7e0bef8877fa5f1564538cbe49d24ad4cb6d80ed564d5f676128a65ef77f39c471121f798fc40f4395d113dd706f3da0def2092853adf9c29367ccff9d5a4dede07ff46f26b1e26499fa30c8d8af415b45e79a4922bf42367ffb5b8762bdf03c07a4bb1e9d9ca41b9778f63ea305ae67cc2cf7f8fc37e39ea26b5ea84e3411844d9e6e78bcc3ff83e0c53e78fe0a65fd93bafab180ea3abbf53d0c97a03af39393d967d5d71ba7eba050ae7f9dd34b9feb43c8f2a0ac6cbb7a0beea60d46aeb217354bf632d81d1dcc442d4720a6d38ff9b47889af787c901c80a064db3ba259757eef2537cb6cb00f65eb283b40d446d098a80e4a869f196e859d4ffb80e17486796777582b94094dc7d745066ebf3d75a00c951e1d8a84f0d31dca914a3ceb0048863a30af6c2f4bbb168842fd3d885ef1a7a8c678a9bb9c9d948547bba91c8afffad69a10e97584e18dd0d9b5065cb3e84fae327690ee88b829c0cdbbfe5ae4522eb79542fc885b9f514459d5b78b49f15854479f803877f702de9b5c63e0e6a34ff3eba94dd4e779df02aeb1700f1ac88e50baaf7167712927064e25f4b085c4f9ed04c10d2310c7f8a2f8078f59d730cb5f1474d020f1f70a5c79ae42422477cfb25d7416e8b0e12a9ca0d7e9c62cd7bc38cce10ef38923f91e8138d9ac52f692333d0159dee3b4676108173c90bf76fcc8c829b6456b6f58d096a0dac1cb68b62d3507b41f7c475cf79c18a8e0f5190284e19fda6b8169db8d314684261650a25947fe4206713f1cc54145412e8bf68ea127e16f076682e89766258fb7eb72749fb05fc4d5c9c7139d7205a231de09f10cca3dd7f81fc086927018438458a370c798918c0542157673930880c9c8754f7504e4ba6da101ee58b3839a38ad696ae81856d326198bd4833dc90d32e2ffcba3a1e56bd14cb4696c6cfc9f507f0f27b5129d040b51b1e1ffa59f814a98201e1c9c47077d2e6c4f5b60f833870e825f58fbb8907799f825bd5228161e6f2c70bbea4102b9541f8968d0b25c27548b4068fcbc64ffc8b79ce718f7366d675db8132d77cd5f1bf05c179c0bbad06a274cd3e46005669619def6a3d240c605946b56c991b33e1b5aed5a4e3acac016410f356cfebda6bfbeb0fc3414c67dea8eda51c1b49e6e872193e7f0e39ec6ad7b2bc66c94a16e7d51ab13d83a6c60409370cf264f79235b57170f1e638a28ab357159385e3715cff7058d013f55b93465388ed513168cd85fe007bddff391024eaf70246103f618c78a2145f11bf92a45023150c2027fb3ae112c3ee6d58832ddd665c49b6ae0c2ca95332163595348bebd6a2bb38b9cc38b82bfaba3fa65acc6d7a36f98cf530c7fb0992118738d8856e6a6f88be1187e9cc6b109c618fcb1bf205c552815fa232312281a40c166ffe2ec0b187e13e628ffcdeb1d0da7cc32513abce42aaaee1704a3441f1b55821135766158c480f75da06658a4f624654dc546c8cae08a741f35f78e3227f0e797c279cc267bf246caa8cd32350dc129647cc217632b938222ee82ac0f3d845e4daa43e3e022da1cddd62231c4b30c37c8f6b0a5c6ea5ee56ab84ea327c7448f41adca52e912c9c88f9b7446d385657c19d6ce808d271997bbf515214d0f0e7f9790efd76183787a79016ef046d5b9076baed4c2911597cc36d73b8321e118a39223ea90939c837aa1496d155b74e7b1f6b976460bb7b8cda239ff15b83c6db2daec3bec8819f67064fad8742ccb5110f6f33efefdcba20aa45310047a06f8fbfc8d52d241c10952be9c9f7f24b9a1307627a80e981c8975a80aef737a9e584fec507dd6f3fba7c94a5660043c52a25404709e7219e93c1aff735dc870bb148391be812109dd99de93a89ec8409e4f5572e83b76889b7bcafe578fd6297b7b28772c9fef8f207abf827f061ea7ba1dfe758a7e2843e5897026acccd614058901cc345d8a478a287a4048129cddf2876ac040e33751a6b979773097a85baa034ffaf43880352b95a0b95fdd0614ebd5abeab3575c6c02e1e5cc1415472ab335f99adc6e0b120a48f3134de659e6bc19c3e9138d22eecab25361b6d66e44a12e2c173f484b691234911d8241bcf5abcd70018a6c504d9c001f47ff1c2e6538b47b5609249fc1003b65a8b57f5eeb5f9f2bd9c2e3176daca1cc2d43cfc0e27e0cf9ef2391d3b223a95cf12aba9b177503f506c3f3dd7fc34eb448faff812cafe02abaeb1786fe0af1bab7b634578e89a7d642b21ae6592fc7cd01b5c0b91902054f386ee343e4ac8194bacc42ace3d137bd79b1d9841a2a0e81c425c3153a0d3c3f23ebfbc6ecd4ecd7108d0561dc386ad6d7030d186ac1fe47a037d644b4deea2f3d4a1d19a353ed84124472cca61cc377ccbd0b9bbbd8bdb88f3bfbec43a93a13463ea7377f461fcfbbfe55da0a26eb0ef05b8234e560ffb3ab61e10e113b4b5b71b3767635b88341eee5fda9f3aa1d47f2d5bfd57282b9f08632b38ebbf42b5500f161cde3c6168910a6ef62f42e30102a3adbb5b558cc723ce438a13ff3f3215fb45386b3f11753159a592b35da2003b365799d8b7ae15b86f04072c77537dee142a08be76643b3af117f2c5c7dc0e71df9ea05529005a60dd7cabe5e8785a45395945ca7628286599124f562ca327b66e07d8b607e12299faa3fbd3b3c11240de788dd7fb1f358e82439ff77dc6140afc25e05b028efec5a6e55761ce0cc0c95683406e604a081e04f0026e304245d0778b095a51f2eebdba21aac4821354a946cac8acc26883037955aa3a65197afadc456eb2d08b6367c88c479df9338a7434dd5c9bf0deb300bcdfecef0a8a61bac64ead81cff220a72768e4943f6ea183c2b65f501082363405338d87a91901618584dddd0c5bbd2ad35fe1a263a17dafc9835edcffe5befb0233e2f6d49b7ec44dcd7424176448909ebf8addc63f63742fbb0e2bfc00c0eedd8ad362e94e539695da2fe17f7858ba2cb3fd45500f916e04289ab059df5be5b7d26a60dfdb35f6746bd0209492ebfca295217637fb421aef8b42faf19cb13545a4547323f3117f7f1c4f8a0ce763c53e7b566af58071c3bb7495c00a1d397a28ec5e40fc4b70eceb04e9d36bdc1b247b0f82928e8436ccbfacca54236b3e9a81e4f0e7d7fdebf0c6de0b6b4dab85c65faaa94a0d280cb9b998b43b019dfd6c371ea90b24a6a1fba4066409bbd558b77d212b39ddac7d355b97e8e2bfa73444ee5433466176eb6d537c711cdbeb0b2af4c4f8c71a4a4e644bf9fcd13f09577c0f30ff841014918267ecd2b5ebfa20751a1315f6aa895399fbb431cfad4b8336ef785ec47e9abe90d02d1236569b08231a157692a49e9f62adb2b86c43e70a632823e33f295211351bc083f03d2003292942e66aa012f0303bacd710320ac344a234497e19383679718863faa9065421394dd1ccc6a1e226aa88dac6ee472255dc30401e4703f251625ccabec1657d17f6d3d246b85691aa4530ce5ffb9442b436ca66ae36b63ba4d39762d1354505383d7db8a4a8ea3eca6954b6078a823a0709ffa22710223308df9af3b6caff62a4518e807817e46ff77fe475c454c4f35da77f8f5b7b237df5c165f23ad5ae65ee669818b55ab51f31371c2833855eee84809efe5de195452aa9b9abcc"}, 0x100a, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = memfd_create(&(0x7f0000000000)='+\x00', 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="26bc3a8735d7e3da1bcf8f455f77c773", 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x100013, r0, 0x0) 09:20:39 executing program 4: 09:20:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:39 executing program 1: 09:20:39 executing program 2: io_setup(0x1, &(0x7f0000000080)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:39 executing program 5: 09:20:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000000c0)={0x9, 0x400000000000800, 0xb389, 0x8, [], [], [], 0x8, 0x80, 0x4, 0xdc, "09c647e1a601dbb97a9c83d5fc1c055d"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000200)=""/61}, 0xf) 09:20:39 executing program 4: 09:20:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:40 executing program 1: 09:20:40 executing program 5: 09:20:40 executing program 4: 09:20:40 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x200007fffe, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) io_submit(r0, 0x2000000000000091, &(0x7f0000000640)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, &(0x7f0000000b40)="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", 0x0, 0x3f, 0x0, 0x3, r2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x9, r1, &(0x7f0000000200)="a7908c950d9688ce74613f882b1d1b3e49674647989cac3b8753090246", 0x0, 0x6, 0x0, 0x4, r2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x2, r1, &(0x7f0000000300)="d664dc656c89d6abf2d8628dd0435ee964f7e8c49920d3940f6ce84a180dad759055cabd1f88a2e68f4aab494004c3650cebe6e8a8c99f7cb875d86be051215af8bfc21efcadd1b293500434e8905095e7b2f581e7e7a9237b41c68db270fe484e6e565fcc7c0ae1f8405b06e2f2cae76a6235d7ccb8399b8eac6e30ad0688b5aa42287048516668ddfd64f856df1e4fa7323a73", 0x0, 0x2, 0x0, 0x3}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0x1000000, r2, &(0x7f0000000400)="676e95fce076231dd83c8f0265f9344c437ace1ce84ef38a06c3fc4940ff4eaa97c68ed5342df66256cc28ad9a444a08bd2faf06b25faa12a6729aed17b5c810c0a7d88ace7ae411370c723626ec3081e2e4fd35c1179d03cfe6a5bd4f35ad4563bdc120c0af40208d96874539caa52639c1f11b729b272696358836abdd6bb87b1b4d7ea14f198122f4a52346596156766a35420410a5b91fa05c3bf4ca41cc9fca7356a0efe425", 0x0, 0x0, 0x0, 0x2, r2}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x81, r1, &(0x7f0000000500)="ae1c4d3c9456dc96a3c1268334a03584026c635b6016d3bac8e47290ce5ce2162374b85e8050f140292d38440b308eb8dc46ae4b3760174caaef8b5325b1414b7ed78321001c30d369dbbd823ca15ffa062370513574d2bea989d3f2588ee1db3ce9c17b6c02b7ec3b7eadaa156494451b694ac915bd418ef8d60625446c03d2a610ca740bb9b544e0017200786c3ca446ecc82b22e4ba026cb479fc6d0be50fde4b5b14c5e03952234c5354d5f052ceb7487eb582cd1fb2625408ef8d7f0889b81fd6", 0x0, 0x17fc600000, 0x0, 0x0, r2}]) fchdir(r2) close(r1) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040), 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) readahead(r0, 0x0, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000000c0)={0x2, [0x1dd, 0xa9d]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:40 executing program 1: 09:20:40 executing program 5: 09:20:40 executing program 4: 09:20:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 09:20:40 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x800000008000900, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) r2 = dup3(r1, r1, 0x80000) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:40 executing program 5: 09:20:40 executing program 0: 09:20:41 executing program 1: 09:20:41 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000040), 0x1c) 09:20:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x0, 0x100) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000540)=0x8, 0x4) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x141001) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000400)={&(0x7f0000000140), 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x34, r3, 0x210, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffa}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}]}, 0x34}}, 0x20000080) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="90000000", @ANYRES16=r4, @ANYBLOB="00012dbd7000fedbdf25030000000c00040001000080000000002c00070008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="0c00060001000000000000000c000300090600000000000008000100000000000c000400ffffff7fe4ffffff0c0003007f0000000000000038d3d9490c00060002000000000000007477cfcbd5c3121e88b2ee25836db62b331a93d65ad6e1f242b393103c5ac208b497ae5eb77d7ae01346c180cc0b114324a8c37eb19b9ad3484b47331c63511b6f5f62f787d3553316"], 0x90}, 0x1, 0x0, 0x0, 0x4040090}, 0x4000000) 09:20:41 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x8000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000000)) 09:20:41 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x28000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)}}, 0x5e3ce453b11d7097) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 09:20:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf617732743e397b89f26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d5c6070") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @dev}], 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x801c581f, &(0x7f0000000000)) 09:20:41 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 487.685718] NFS: bad mount option value specified: vmnet0wlan1 09:20:41 executing program 4 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:42 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x28000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)}}, 0x5e3ce453b11d7097) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 09:20:42 executing program 0 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 488.024577] FAULT_INJECTION: forcing a failure. [ 488.024577] name failslab, interval 1, probability 0, space 0, times 0 [ 488.036122] CPU: 1 PID: 12486 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 488.043441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.052838] Call Trace: [ 488.055506] dump_stack+0x306/0x460 [ 488.059230] should_fail+0x1170/0x1350 [ 488.063204] __should_failslab+0x278/0x2a0 [ 488.067573] should_failslab+0x29/0x70 09:20:42 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x20000) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000040)={0x3, 0xfff, 0x5}, 0xc) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 488.071530] kmem_cache_alloc+0x146/0xd50 [ 488.075737] ? __nf_conntrack_alloc+0x2f7/0xaa0 [ 488.080489] __nf_conntrack_alloc+0x2f7/0xaa0 [ 488.085078] init_conntrack+0x770/0x2620 [ 488.089260] ? hash_conntrack_raw+0x65e/0x930 [ 488.093876] nf_conntrack_in+0x1363/0x1d90 [ 488.098255] ipv4_conntrack_local+0x256/0x4f0 [ 488.102856] ? ipv4_conntrack_in+0xf0/0xf0 [ 488.107146] nf_hook_slow+0x15c/0x3d0 [ 488.111028] __ip_local_out+0x6f2/0x810 [ 488.115081] ? __ip_local_out+0x810/0x810 [ 488.119287] ip_send_skb+0xb3/0x350 [ 488.122986] udp_send_skb+0x10b9/0x18d0 [ 488.127090] udp_sendmsg+0x149a/0x4170 [ 488.131072] ? ip_copy_metadata+0x16a0/0x16a0 [ 488.135749] ? kmsan_set_origin_inline+0x6b/0x120 [ 488.140692] ? kmsan_set_origin+0x83/0x140 [ 488.145002] udpv6_sendmsg+0x124d/0x48f0 [ 488.149227] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 488.154698] ? __msan_poison_alloca+0x17a/0x210 [ 488.159455] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 488.163871] inet_sendmsg+0x4d8/0x7f0 [ 488.167777] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 488.173251] ? security_socket_sendmsg+0x1bd/0x200 [ 488.178241] ? inet_getname+0x490/0x490 [ 488.182275] __sys_sendto+0x975/0xb70 [ 488.186216] ? syscall_return_slowpath+0x112/0x880 [ 488.191256] __se_sys_sendto+0x107/0x130 [ 488.195438] __x64_sys_sendto+0x6e/0x90 [ 488.199473] do_syscall_64+0xbe/0x100 [ 488.203370] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 488.208612] RIP: 0033:0x457569 09:20:42 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 488.211876] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.230838] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 488.238618] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 488.245939] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 488.253257] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 488.260575] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 488.267889] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 488.392855] NFS: bad mount option value specified: vmnet0wlan1 09:20:42 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x28000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)}}, 0x5e3ce453b11d7097) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 488.480141] FAULT_INJECTION: forcing a failure. [ 488.480141] name failslab, interval 1, probability 0, space 0, times 0 [ 488.491683] CPU: 0 PID: 12502 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #69 [ 488.498998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.508388] Call Trace: [ 488.511057] dump_stack+0x306/0x460 [ 488.514756] should_fail+0x1170/0x1350 [ 488.518763] __should_failslab+0x278/0x2a0 [ 488.523080] should_failslab+0x29/0x70 [ 488.527034] __kmalloc+0xcf/0x440 [ 488.530543] ? sock_kmalloc+0x2a6/0x560 [ 488.534581] sock_kmalloc+0x2a6/0x560 [ 488.538486] af_alg_alloc_areq+0x85/0x310 [ 488.542704] skcipher_recvmsg+0x32a/0x18a0 [ 488.547041] sock_recvmsg+0x1d6/0x230 [ 488.550904] ? skcipher_sendmsg+0x160/0x160 [ 488.555293] ___sys_recvmsg+0x459/0xae0 [ 488.559416] ? __fdget+0x318/0x430 [ 488.563029] __se_sys_recvmsg+0x2fc/0x450 [ 488.567294] __x64_sys_recvmsg+0x4a/0x70 [ 488.571405] do_syscall_64+0xbe/0x100 [ 488.575266] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 488.580500] RIP: 0033:0x457569 [ 488.583757] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 488.587280] NFS: bad mount option value specified: vmnet0wlan1 [ 488.602739] RSP: 002b:00007f13d260cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 488.602789] RAX: ffffffffffffffda RBX: 00007f13d260cc90 RCX: 0000000000457569 [ 488.602815] RDX: 0000000000000000 RSI: 0000000020000c00 RDI: 0000000000000004 09:20:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e20, @loopback}}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1, @ANYRESHEX, @ANYBLOB="03e9f7ddebd181a8094451fceb10389a5b92e95c713c9ac6f774f907468b1fd88a55556d7902bc31740a5865e35ee23f698959ffde39ff74d63ceac3deedaf9fb55760890f89e3b31e68f028b96ed7660556090daf6cabab50efcc122ce874f9cc9bc2620effe3cfb48c13afcc7668108aee26a6c4ab6847f4"], @ANYBLOB="4a695d25e63e4eb9aadec454dee4672193c74d89537085ab38257af3f0a22dae762b149c28b07b0738713572be388ad241f985ac379dae858a942b201e951d8921f1b787d15cac3c5fdf19edb5cc677687683e6050e5f1492e10ca0857ca846a1b3b280f2e1f329bd07f9fc2faf1e60358b9880e79f3de5fc90e19267541a868429aaf356b41bb8743af3af0990b978e346a483f7d0a3c2bf9b0f9558fa9f61906db7e1be62f7cb254cf0de123e30e95cc7fa3da0a4a412527b816deb8faa6284a3733c951844bf0be8ab23635829496ecbf1919cf97e401d01cac412a05df66c6a3e9eafc587277009c"]], 0xffffffffffffff21) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 488.602863] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 488.638414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13d260d6d4 [ 488.645731] R13: 00000000004c324d R14: 00000000004d4e00 R15: 0000000000000005 09:20:42 executing program 4 (fault-call:7 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) splice(r0, &(0x7f0000000000), r1, &(0x7f00000000c0)=0xc83, 0x0, 0xa) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x2, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x31b) fcntl$dupfd(r0, 0x0, r1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x77, 0x0, 0x0, r3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r4, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 489.120501] FAULT_INJECTION: forcing a failure. [ 489.120501] name failslab, interval 1, probability 0, space 0, times 0 [ 489.132104] CPU: 1 PID: 12516 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 489.139417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.148806] Call Trace: [ 489.151478] dump_stack+0x306/0x460 [ 489.155234] should_fail+0x1170/0x1350 [ 489.159205] __should_failslab+0x278/0x2a0 [ 489.163510] should_failslab+0x29/0x70 [ 489.167466] __kmalloc_track_caller+0x20c/0xe60 [ 489.172187] ? nf_ct_ext_add+0x364/0x610 [ 489.176348] __krealloc+0x145/0x2f0 [ 489.180077] nf_ct_ext_add+0x364/0x610 [ 489.184052] init_conntrack+0x104b/0x2620 [ 489.188331] nf_conntrack_in+0x1363/0x1d90 [ 489.192702] ipv4_conntrack_local+0x256/0x4f0 [ 489.197296] ? ipv4_conntrack_in+0xf0/0xf0 [ 489.201599] nf_hook_slow+0x15c/0x3d0 [ 489.205526] __ip_local_out+0x6f2/0x810 [ 489.209601] ? __ip_local_out+0x810/0x810 [ 489.213840] ip_send_skb+0xb3/0x350 09:20:43 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) getgroups(0x1, &(0x7f0000000000)=[0xee01]) r2 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000200)=[0xee01, 0xffffffffffffffff]) setgroups(0x5, &(0x7f0000000240)=[r1, r2, r3, r4, r5]) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e21, 0x2, @loopback, 0x6}}, 0x7fffffff, 0x5}, &(0x7f00000001c0)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f00000003c0)={r8, 0xffffffffffffff7f}, &(0x7f0000000500)=0x8) close(r6) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r10, 0x12, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r11 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x80000, 0x0) write$FUSE_STATFS(r11, &(0x7f0000000340)={0x60, 0x0, 0x8, {{0x0, 0x7, 0x9, 0x1f, 0x44, 0x80, 0x8, 0x9fbf}}}, 0x60) [ 489.217538] udp_send_skb+0x10b9/0x18d0 [ 489.221633] udp_sendmsg+0x149a/0x4170 [ 489.225627] ? ip_copy_metadata+0x16a0/0x16a0 [ 489.230264] ? kmsan_set_origin_inline+0x6b/0x120 [ 489.235209] ? kmsan_set_origin+0x83/0x140 [ 489.239525] udpv6_sendmsg+0x124d/0x48f0 [ 489.243761] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 489.249243] ? __msan_poison_alloca+0x17a/0x210 [ 489.253991] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 489.258411] inet_sendmsg+0x4d8/0x7f0 [ 489.262346] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 489.267835] ? security_socket_sendmsg+0x1bd/0x200 [ 489.272831] ? inet_getname+0x490/0x490 [ 489.276878] __sys_sendto+0x975/0xb70 [ 489.280858] ? syscall_return_slowpath+0x112/0x880 [ 489.285908] __se_sys_sendto+0x107/0x130 [ 489.290100] __x64_sys_sendto+0x6e/0x90 [ 489.294139] do_syscall_64+0xbe/0x100 [ 489.298010] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 489.303250] RIP: 0033:0x457569 [ 489.306506] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 489.325458] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 489.333261] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 489.340573] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 489.347885] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 489.355202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 489.362526] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0xb) r2 = accept$alg(r0, 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[0x8, 0x4d30, 0x95d, 0x8, 0x6]}) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00), 0x1, &(0x7f0000000100)=""/45, 0xffffffffffffff06}, 0x0) 09:20:43 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000)="904d45576bd13824ae8705d093131874205b4a2cdc2dbb9906c96e77797283c2a44586d96757cbd6d6f5281914a873a4efb4e8c42658566693e343", &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:43 executing program 4 (fault-call:7 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:44 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000040)='/dev/md0\x00', 0xffffffffffffffff}, 0x30) write$P9_RGETLOCK(r3, &(0x7f00000000c0)={0x23, 0x37, 0x1, {0x2, 0x7fff, 0x2, r4, 0x5, 'wlan1'}}, 0x23) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 490.236167] FAULT_INJECTION: forcing a failure. [ 490.236167] name failslab, interval 1, probability 0, space 0, times 0 [ 490.247672] CPU: 1 PID: 12541 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #69 [ 490.254986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.264382] Call Trace: [ 490.267045] dump_stack+0x306/0x460 [ 490.270744] should_fail+0x1170/0x1350 [ 490.274744] __should_failslab+0x278/0x2a0 [ 490.279041] should_failslab+0x29/0x70 [ 490.282986] __kmalloc+0xcf/0x440 [ 490.286495] ? sock_kmalloc+0x2a6/0x560 [ 490.290524] sock_kmalloc+0x2a6/0x560 [ 490.294398] skcipher_recvmsg+0x984/0x18a0 [ 490.298729] sock_recvmsg+0x1d6/0x230 [ 490.302582] ? skcipher_sendmsg+0x160/0x160 [ 490.306967] ___sys_recvmsg+0x459/0xae0 [ 490.311083] ? __fdget+0x318/0x430 [ 490.314692] __se_sys_recvmsg+0x2fc/0x450 [ 490.318960] __x64_sys_recvmsg+0x4a/0x70 [ 490.323074] do_syscall_64+0xbe/0x100 [ 490.326948] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.332195] RIP: 0033:0x457569 [ 490.335456] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.354415] RSP: 002b:00007f13d260cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 490.362187] RAX: ffffffffffffffda RBX: 00007f13d260cc90 RCX: 0000000000457569 [ 490.369499] RDX: 0000000000000000 RSI: 0000000020000c00 RDI: 0000000000000004 [ 490.376807] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 490.384161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13d260d6d4 [ 490.391484] R13: 00000000004c324d R14: 00000000004d4e00 R15: 0000000000000005 09:20:44 executing program 1 (fault-call:0 fault-nth:0): add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 490.535099] FAULT_INJECTION: forcing a failure. [ 490.535099] name failslab, interval 1, probability 0, space 0, times 0 [ 490.546634] CPU: 0 PID: 12544 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 490.553944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.563346] Call Trace: [ 490.566029] dump_stack+0x306/0x460 [ 490.569727] should_fail+0x1170/0x1350 [ 490.573687] __should_failslab+0x278/0x2a0 [ 490.578019] should_failslab+0x29/0x70 [ 490.581970] kmem_cache_alloc+0x146/0xd50 [ 490.586187] ? skb_clone+0x4d2/0x7b0 [ 490.589959] ? __msan_poison_alloca+0x17a/0x210 [ 490.594703] skb_clone+0x4d2/0x7b0 [ 490.598325] br_flood+0xbee/0x10b0 [ 490.601963] br_dev_xmit+0x1441/0x1690 [ 490.605934] ? br_net_exit+0x230/0x230 [ 490.609894] dev_hard_start_xmit+0x6b8/0xdb0 [ 490.614388] __dev_queue_xmit+0x2e62/0x3d90 [ 490.618814] dev_queue_xmit+0x4b/0x60 [ 490.622701] ip_finish_output2+0x1308/0x14f0 [ 490.627195] ip_do_fragment+0x3810/0x3e90 [ 490.631397] ? ip_fragment+0x3f0/0x3f0 [ 490.635422] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 490.640948] ip_fragment+0x247/0x3f0 [ 490.644730] ip_finish_output+0xff3/0x10e0 [ 490.649045] ip_output+0x534/0x600 [ 490.652661] ? ip_mc_finish_output+0x440/0x440 [ 490.657342] ? ip_finish_output+0x10e0/0x10e0 [ 490.661903] ip_send_skb+0x178/0x350 [ 490.665688] udp_send_skb+0x10b9/0x18d0 [ 490.669832] udp_sendmsg+0x149a/0x4170 [ 490.673830] ? ip_copy_metadata+0x16a0/0x16a0 [ 490.678495] ? kmsan_set_origin_inline+0x6b/0x120 [ 490.683469] ? kmsan_set_origin+0x83/0x140 [ 490.687782] udpv6_sendmsg+0x124d/0x48f0 [ 490.692014] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 490.697483] ? __msan_poison_alloca+0x17a/0x210 [ 490.702257] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 490.703910] FAULT_INJECTION: forcing a failure. [ 490.703910] name failslab, interval 1, probability 0, space 0, times 0 [ 490.706665] inet_sendmsg+0x4d8/0x7f0 [ 490.706751] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 490.706883] ? security_socket_sendmsg+0x1bd/0x200 [ 490.732131] ? inet_getname+0x490/0x490 [ 490.736155] __sys_sendto+0x975/0xb70 [ 490.740082] ? syscall_return_slowpath+0x112/0x880 [ 490.745106] __se_sys_sendto+0x107/0x130 [ 490.749283] __x64_sys_sendto+0x6e/0x90 [ 490.753326] do_syscall_64+0xbe/0x100 [ 490.757200] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.762427] RIP: 0033:0x457569 [ 490.765665] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.784630] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 490.792390] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 490.799696] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 490.807000] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 490.814305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 490.821624] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 490.828963] CPU: 1 PID: 12549 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #69 09:20:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, [], [{0xc588, 0x7, 0xffffffffffffffff, 0x8, 0x9, 0x8001}, {0x81, 0x5, 0x5, 0x1ff}], [[], []]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 490.836284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.845707] Call Trace: [ 490.848363] dump_stack+0x306/0x460 [ 490.852088] should_fail+0x1170/0x1350 [ 490.856105] __should_failslab+0x278/0x2a0 [ 490.860425] should_failslab+0x29/0x70 [ 490.864387] __kmalloc_track_caller+0x20c/0xe60 [ 490.869124] ? __se_sys_add_key+0x27d/0x980 [ 490.873532] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 490.878991] ? strnlen_user+0x384/0x4a0 [ 490.883069] strndup_user+0x154/0x350 [ 490.886935] __se_sys_add_key+0x27d/0x980 [ 490.891191] __x64_sys_add_key+0x62/0x80 [ 490.895310] do_syscall_64+0xbe/0x100 [ 490.899178] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 490.904408] RIP: 0033:0x457569 [ 490.907651] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 490.926596] RSP: 002b:00007f56c5d90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 09:20:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x210800, 0x0) write$eventfd(r2, &(0x7f0000000040)=0x7, 0x8) [ 490.934396] RAX: ffffffffffffffda RBX: 00007f56c5d90c90 RCX: 0000000000457569 [ 490.941702] RDX: 0000000020000440 RSI: 0000000020000400 RDI: 00000000200003c0 [ 490.949013] RBP: 000000000072bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 490.956319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56c5d916d4 [ 490.963660] R13: 00000000004bd65b R14: 00000000004cbe60 R15: 0000000000000003 09:20:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@ethernet={0x0, @local}, &(0x7f0000000000)=0x80) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000140)=0x400, 0x4) 09:20:45 executing program 4 (fault-call:7 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:45 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 491.319137] FAULT_INJECTION: forcing a failure. [ 491.319137] name failslab, interval 1, probability 0, space 0, times 0 [ 491.330708] CPU: 0 PID: 12563 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 491.338022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.347430] Call Trace: [ 491.350101] dump_stack+0x306/0x460 [ 491.353799] should_fail+0x1170/0x1350 [ 491.357787] __should_failslab+0x278/0x2a0 [ 491.362097] should_failslab+0x29/0x70 [ 491.366054] kmem_cache_alloc+0x146/0xd50 [ 491.370268] ? skb_clone+0x4d2/0x7b0 [ 491.374044] ? __msan_poison_alloca+0x17a/0x210 [ 491.378791] skb_clone+0x4d2/0x7b0 [ 491.382428] br_flood+0xbee/0x10b0 [ 491.386064] br_dev_xmit+0x1441/0x1690 [ 491.390079] ? br_net_exit+0x230/0x230 [ 491.394037] dev_hard_start_xmit+0x6b8/0xdb0 [ 491.398541] __dev_queue_xmit+0x2e62/0x3d90 [ 491.402973] dev_queue_xmit+0x4b/0x60 [ 491.406876] ip_finish_output2+0x1308/0x14f0 [ 491.411370] ip_do_fragment+0x3810/0x3e90 [ 491.416014] ? ip_fragment+0x3f0/0x3f0 [ 491.419980] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 491.425474] ip_fragment+0x247/0x3f0 [ 491.429302] ip_finish_output+0xff3/0x10e0 [ 491.433651] ip_output+0x534/0x600 [ 491.437269] ? ip_mc_finish_output+0x440/0x440 [ 491.441962] ? ip_finish_output+0x10e0/0x10e0 [ 491.446514] ip_send_skb+0x178/0x350 [ 491.450302] udp_send_skb+0x10b9/0x18d0 [ 491.454401] udp_sendmsg+0x149a/0x4170 [ 491.458392] ? ip_copy_metadata+0x16a0/0x16a0 [ 491.463064] ? kmsan_set_origin_inline+0x6b/0x120 [ 491.468006] ? kmsan_set_origin+0x83/0x140 [ 491.472319] udpv6_sendmsg+0x124d/0x48f0 [ 491.476532] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 491.482007] ? __msan_poison_alloca+0x17a/0x210 [ 491.486753] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 491.491131] inet_sendmsg+0x4d8/0x7f0 [ 491.495002] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 491.500478] ? security_socket_sendmsg+0x1bd/0x200 [ 491.505475] ? inet_getname+0x490/0x490 [ 491.508312] FAULT_INJECTION: forcing a failure. [ 491.508312] name failslab, interval 1, probability 0, space 0, times 0 [ 491.509507] __sys_sendto+0x975/0xb70 [ 491.509629] ? syscall_return_slowpath+0x112/0x880 [ 491.509718] __se_sys_sendto+0x107/0x130 [ 491.509829] __x64_sys_sendto+0x6e/0x90 [ 491.537769] do_syscall_64+0xbe/0x100 [ 491.541635] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 491.546872] RIP: 0033:0x457569 [ 491.550114] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.569067] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 491.576839] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 491.584149] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 491.591454] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 491.598769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 491.606113] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 491.613452] CPU: 1 PID: 12570 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #69 09:20:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)) io_setup(0x48, &(0x7f0000000100)=0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) close(r2) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'ip6gretap0\x00', @local}) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r1, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:45 executing program 1 (fault-call:0 fault-nth:1): add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 491.620760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.630150] Call Trace: [ 491.632808] dump_stack+0x306/0x460 [ 491.636517] should_fail+0x1170/0x1350 [ 491.640491] __should_failslab+0x278/0x2a0 [ 491.644837] should_failslab+0x29/0x70 [ 491.648827] kmem_cache_alloc+0x146/0xd50 [ 491.653038] ? prepare_creds+0xc6/0x810 [ 491.657064] ? __msan_poison_alloca+0x17a/0x210 [ 491.661873] prepare_creds+0xc6/0x810 [ 491.665727] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 491.671166] lookup_user_key+0x3e8/0x2410 [ 491.675399] ? kmsan_set_origin+0x83/0x140 [ 491.679742] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 491.685200] ? search_process_keyrings+0x6e0/0x6e0 [ 491.690226] __se_sys_add_key+0x63b/0x980 [ 491.694548] __x64_sys_add_key+0x62/0x80 [ 491.698666] do_syscall_64+0xbe/0x100 [ 491.702531] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 491.707771] RIP: 0033:0x457569 [ 491.711075] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 491.730024] RSP: 002b:00007f56c5d90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 491.737814] RAX: ffffffffffffffda RBX: 00007f56c5d90c90 RCX: 0000000000457569 [ 491.745155] RDX: 0000000020000440 RSI: 0000000020000400 RDI: 00000000200003c0 [ 491.752479] RBP: 000000000072bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 491.759802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56c5d916d4 [ 491.767129] R13: 00000000004bd65b R14: 00000000004cbe60 R15: 0000000000000003 09:20:45 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/61}, 0x18) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x103000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000200)={0x2482, 0xfff, r1, 0x9, r2, 0x8, 0x0, 0x4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000240)=""/177, &(0x7f0000000300)=0xb1) 09:20:46 executing program 1 (fault-call:0 fault-nth:2): add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:20:46 executing program 4 (fault-call:7 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x6c025756) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 492.105911] FAULT_INJECTION: forcing a failure. [ 492.105911] name failslab, interval 1, probability 0, space 0, times 0 [ 492.117552] CPU: 1 PID: 12583 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #69 [ 492.124876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.134284] Call Trace: [ 492.136949] dump_stack+0x306/0x460 [ 492.140679] should_fail+0x1170/0x1350 [ 492.144680] __should_failslab+0x278/0x2a0 [ 492.149009] should_failslab+0x29/0x70 [ 492.152961] kmem_cache_alloc+0x146/0xd50 [ 492.157159] ? key_alloc+0x87a/0x20e0 [ 492.161017] ? __msan_get_context_state+0x9/0x30 [ 492.165850] key_alloc+0x87a/0x20e0 [ 492.169605] keyring_alloc+0x154/0x290 [ 492.173569] lookup_user_key+0xac1/0x2410 [ 492.177777] ? kmsan_set_origin+0x83/0x140 [ 492.182096] ? search_process_keyrings+0x6e0/0x6e0 [ 492.187089] __se_sys_add_key+0x63b/0x980 [ 492.191364] __x64_sys_add_key+0x62/0x80 [ 492.195491] do_syscall_64+0xbe/0x100 [ 492.199393] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 492.204635] RIP: 0033:0x457569 [ 492.207888] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.226851] RSP: 002b:00007f56c5d90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 492.234627] RAX: ffffffffffffffda RBX: 00007f56c5d90c90 RCX: 0000000000457569 [ 492.241976] RDX: 0000000020000440 RSI: 0000000020000400 RDI: 00000000200003c0 [ 492.249293] RBP: 000000000072bf00 R08: fffffffffffffffe R09: 0000000000000000 09:20:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)=')\x00') 09:20:46 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r2, &(0x7f0000003240)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/243, 0xf3}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000140)=""/65, 0x41}, {&(0x7f0000000200)=""/68, 0x44}], 0x4, &(0x7f0000000400)=""/46, 0x2e, 0x5}, 0x2}, {{&(0x7f0000000440)=@xdp, 0x80, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/10, 0xa}], 0x1, &(0x7f0000000540)=""/166, 0xa6, 0x1e}, 0x10001}, {{&(0x7f0000000600)=@ipx, 0x80, &(0x7f0000000900)=[{&(0x7f0000000680)=""/70, 0x46}, {&(0x7f0000000700)=""/213, 0xd5}, {&(0x7f0000000800)=""/46, 0x2e}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000000840)=""/89, 0x59}, {&(0x7f00000008c0)=""/45, 0x2d}], 0x6, &(0x7f0000000980)=""/156, 0x9c, 0x9}, 0x1f}, {{&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002b40)=""/207, 0xcf}, {&(0x7f0000002c40)=""/128, 0x80}, {&(0x7f0000000ac0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0xfffffffffffffffd}, 0xff}, {{&(0x7f0000002d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002d80)=""/160, 0xa0}, {&(0x7f0000002e40)=""/175, 0xaf}, {&(0x7f0000002f00)=""/92, 0x5c}, {&(0x7f0000002f80)=""/42, 0x2a}], 0x4, &(0x7f0000003000)=""/191, 0xbf, 0xd1}, 0xfff}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f00000030c0)=""/14, 0xe}], 0x1, &(0x7f0000003140)=""/210, 0xd2, 0x1}}], 0x6, 0x1, &(0x7f00000033c0)) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000003400)='/dev/hwrng\x00', 0x8002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000003440)={r4, r5}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r6, 0xae47, 0xd000) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 492.256613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56c5d916d4 [ 492.263930] R13: 00000000004bd65b R14: 00000000004cbe60 R15: 0000000000000003 09:20:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x100) fanotify_mark(r1, 0x24, 0x18, r2, &(0x7f0000000100)='./file0\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$P9_RLERROR(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1d00000007010014007b70726f63d5a14fd644d1475647504c7365637572697479656d302d"], 0x4) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000180)=0x6) lookup_dcookie(0x7, &(0x7f0000000000)=""/22, 0x249) [ 492.543384] FAULT_INJECTION: forcing a failure. [ 492.543384] name failslab, interval 1, probability 0, space 0, times 0 [ 492.554947] CPU: 0 PID: 12598 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 492.562263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.571673] Call Trace: [ 492.574360] dump_stack+0x306/0x460 [ 492.578068] should_fail+0x1170/0x1350 [ 492.582041] __should_failslab+0x278/0x2a0 [ 492.586369] should_failslab+0x29/0x70 [ 492.590321] kmem_cache_alloc+0x146/0xd50 [ 492.594521] ? skb_clone+0x4d2/0x7b0 [ 492.598285] ? __msan_poison_alloca+0x17a/0x210 [ 492.603059] skb_clone+0x4d2/0x7b0 [ 492.606691] br_flood+0xbee/0x10b0 [ 492.610353] br_dev_xmit+0x1441/0x1690 [ 492.614334] ? br_net_exit+0x230/0x230 [ 492.618328] dev_hard_start_xmit+0x6b8/0xdb0 [ 492.622897] __dev_queue_xmit+0x2e62/0x3d90 [ 492.627342] dev_queue_xmit+0x4b/0x60 [ 492.631226] ip_finish_output2+0x1308/0x14f0 [ 492.635725] ip_do_fragment+0x3810/0x3e90 [ 492.639959] ? ip_fragment+0x3f0/0x3f0 [ 492.643930] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 492.649515] ip_fragment+0x247/0x3f0 [ 492.649653] FAULT_INJECTION: forcing a failure. [ 492.649653] name failslab, interval 1, probability 0, space 0, times 0 [ 492.653364] ip_finish_output+0xff3/0x10e0 [ 492.653429] ip_output+0x534/0x600 [ 492.653488] ? ip_mc_finish_output+0x440/0x440 [ 492.653577] ? ip_finish_output+0x10e0/0x10e0 [ 492.653640] ip_send_skb+0x178/0x350 [ 492.685458] udp_send_skb+0x10b9/0x18d0 [ 492.689542] udp_sendmsg+0x149a/0x4170 [ 492.693542] ? ip_copy_metadata+0x16a0/0x16a0 [ 492.698206] ? kmsan_set_origin_inline+0x6b/0x120 [ 492.703134] ? kmsan_set_origin+0x83/0x140 [ 492.707462] udpv6_sendmsg+0x124d/0x48f0 [ 492.711696] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.717173] ? __msan_poison_alloca+0x17a/0x210 [ 492.721908] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 492.726377] inet_sendmsg+0x4d8/0x7f0 [ 492.730275] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 492.735828] ? security_socket_sendmsg+0x1bd/0x200 [ 492.740812] ? inet_getname+0x490/0x490 [ 492.744872] __sys_sendto+0x975/0xb70 [ 492.748848] ? syscall_return_slowpath+0x112/0x880 [ 492.753890] __se_sys_sendto+0x107/0x130 [ 492.758058] __x64_sys_sendto+0x6e/0x90 [ 492.762081] do_syscall_64+0xbe/0x100 [ 492.765954] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 492.771184] RIP: 0033:0x457569 [ 492.774421] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:20:46 executing program 1 (fault-call:0 fault-nth:3): add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 492.793360] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 492.801127] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 492.808453] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 492.815756] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 492.823061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 492.830367] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 492.837725] CPU: 1 PID: 12602 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #69 [ 492.845036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.854418] Call Trace: [ 492.857081] dump_stack+0x306/0x460 [ 492.860775] should_fail+0x1170/0x1350 [ 492.864752] __should_failslab+0x278/0x2a0 [ 492.869060] should_failslab+0x29/0x70 [ 492.873050] __kmalloc_track_caller+0x20c/0xe60 [ 492.877804] ? key_alloc+0x955/0x20e0 [ 492.881684] kmemdup+0x7a/0xf0 [ 492.884983] key_alloc+0x955/0x20e0 [ 492.888735] keyring_alloc+0x154/0x290 [ 492.892725] lookup_user_key+0xac1/0x2410 [ 492.896923] ? kmsan_set_origin+0x83/0x140 [ 492.901226] ? search_process_keyrings+0x6e0/0x6e0 [ 492.906225] __se_sys_add_key+0x63b/0x980 [ 492.910516] __x64_sys_add_key+0x62/0x80 [ 492.914662] do_syscall_64+0xbe/0x100 [ 492.918563] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 492.923793] RIP: 0033:0x457569 09:20:47 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 492.927058] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 492.946000] RSP: 002b:00007f56c5d90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 492.953769] RAX: ffffffffffffffda RBX: 00007f56c5d90c90 RCX: 0000000000457569 [ 492.961094] RDX: 0000000020000440 RSI: 0000000020000400 RDI: 00000000200003c0 [ 492.968408] RBP: 000000000072bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 492.975724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56c5d916d4 [ 492.983053] R13: 00000000004bd65b R14: 00000000004cbe60 R15: 0000000000000003 09:20:47 executing program 4 (fault-call:7 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:47 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xffffffffffffffc0, 0x20000) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r3) io_submit(r0, 0x0, &(0x7f0000000600)) openat$cgroup_ro(r2, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0xa000, 0x0) close(r1) r4 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000300)={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x1a}, 0x100000000}, 0x1c) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x98000) ioctl$SG_GET_SG_TABLESIZE(r5, 0x227f, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x420082, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:47 executing program 1 (fault-call:0 fault-nth:4): add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:20:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x1, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1df, &(0x7f0000000bc0)=""/45, 0x2d}, 0x2140) [ 493.446050] FAULT_INJECTION: forcing a failure. [ 493.446050] name failslab, interval 1, probability 0, space 0, times 0 [ 493.457683] CPU: 0 PID: 12613 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 493.464999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.474386] Call Trace: [ 493.477057] dump_stack+0x306/0x460 [ 493.480764] should_fail+0x1170/0x1350 [ 493.484746] __should_failslab+0x278/0x2a0 [ 493.489058] should_failslab+0x29/0x70 [ 493.493016] kmem_cache_alloc+0x146/0xd50 [ 493.497222] ? skb_clone+0x4d2/0x7b0 [ 493.501019] ? __msan_poison_alloca+0x17a/0x210 [ 493.505832] skb_clone+0x4d2/0x7b0 [ 493.509459] br_flood+0xbee/0x10b0 [ 493.513095] br_dev_xmit+0x1441/0x1690 [ 493.517073] ? br_net_exit+0x230/0x230 [ 493.521040] dev_hard_start_xmit+0x6b8/0xdb0 [ 493.525549] __dev_queue_xmit+0x2e62/0x3d90 [ 493.529983] dev_queue_xmit+0x4b/0x60 [ 493.533869] ip_finish_output2+0x1308/0x14f0 [ 493.538388] ip_do_fragment+0x3810/0x3e90 [ 493.542593] ? ip_fragment+0x3f0/0x3f0 [ 493.546624] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 493.552118] ip_fragment+0x247/0x3f0 [ 493.555956] ip_finish_output+0xff3/0x10e0 [ 493.560280] ip_output+0x534/0x600 [ 493.563918] ? ip_mc_finish_output+0x440/0x440 [ 493.568605] ? ip_finish_output+0x10e0/0x10e0 [ 493.573164] ip_send_skb+0x178/0x350 [ 493.576954] udp_send_skb+0x10b9/0x18d0 [ 493.581064] udp_sendmsg+0x149a/0x4170 [ 493.585055] ? ip_copy_metadata+0x16a0/0x16a0 [ 493.589723] ? kmsan_set_origin_inline+0x6b/0x120 [ 493.594667] ? kmsan_set_origin+0x83/0x140 [ 493.598981] udpv6_sendmsg+0x124d/0x48f0 [ 493.603209] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 493.608720] ? __msan_poison_alloca+0x17a/0x210 [ 493.613470] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 493.617900] inet_sendmsg+0x4d8/0x7f0 [ 493.621828] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 493.627331] ? security_socket_sendmsg+0x1bd/0x200 [ 493.632322] ? inet_getname+0x490/0x490 [ 493.636353] __sys_sendto+0x975/0xb70 [ 493.640279] ? syscall_return_slowpath+0x112/0x880 [ 493.645322] __se_sys_sendto+0x107/0x130 [ 493.649586] __x64_sys_sendto+0x6e/0x90 [ 493.653613] do_syscall_64+0xbe/0x100 [ 493.657537] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 493.662776] RIP: 0033:0x457569 [ 493.666037] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 493.685001] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = getpid() ptrace(0x11, r1) 09:20:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x9, 0x1ff, 0x2, 0x8000000000, r0, 0x3800000}, 0x2c) ioctl$NBD_CLEAR_QUE(r1, 0xab05) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000001c0)=0x5, 0x4) [ 493.692784] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 493.700116] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 493.707433] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 493.714752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 493.722070] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:47 executing program 4 (fault-call:7 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:48 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x4, 0x1ad1, 0x6, 0x1ff, 0x4, 0x7, 0x7, 0x100, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e22, 0x9, @mcast2, 0x7}}, 0x3de9e4ef, 0x4}, 0x90) 09:20:48 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40000, 0x0) [ 494.143543] FAULT_INJECTION: forcing a failure. [ 494.143543] name failslab, interval 1, probability 0, space 0, times 0 [ 494.155108] CPU: 0 PID: 12634 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 494.162458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.171870] Call Trace: [ 494.174547] dump_stack+0x306/0x460 [ 494.178316] should_fail+0x1170/0x1350 [ 494.182293] __should_failslab+0x278/0x2a0 [ 494.186591] should_failslab+0x29/0x70 [ 494.190548] kmem_cache_alloc+0x146/0xd50 [ 494.194785] ? skb_clone+0x4d2/0x7b0 [ 494.198562] ? __msan_poison_alloca+0x17a/0x210 [ 494.203308] skb_clone+0x4d2/0x7b0 [ 494.206948] br_flood+0xbee/0x10b0 [ 494.210599] br_dev_xmit+0x1441/0x1690 [ 494.214602] ? br_net_exit+0x230/0x230 [ 494.218554] dev_hard_start_xmit+0x6b8/0xdb0 [ 494.223061] __dev_queue_xmit+0x2e62/0x3d90 [ 494.227489] dev_queue_xmit+0x4b/0x60 [ 494.231399] ip_finish_output2+0x1308/0x14f0 [ 494.235910] ip_do_fragment+0x3810/0x3e90 [ 494.240121] ? ip_fragment+0x3f0/0x3f0 [ 494.244105] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 494.249619] ip_fragment+0x247/0x3f0 [ 494.253471] ip_finish_output+0xff3/0x10e0 [ 494.257775] ip_output+0x534/0x600 [ 494.261409] ? ip_mc_finish_output+0x440/0x440 [ 494.266109] ? ip_finish_output+0x10e0/0x10e0 [ 494.270692] ip_send_skb+0x178/0x350 [ 494.274491] udp_send_skb+0x10b9/0x18d0 [ 494.278607] udp_sendmsg+0x149a/0x4170 [ 494.282605] ? ip_copy_metadata+0x16a0/0x16a0 [ 494.287191] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 494.292515] ? kmsan_set_origin_inline+0x6b/0x120 [ 494.297457] ? kmsan_set_origin+0x83/0x140 [ 494.301766] udpv6_sendmsg+0x124d/0x48f0 [ 494.305994] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 494.311482] ? __msan_poison_alloca+0x17a/0x210 [ 494.316233] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 494.320645] inet_sendmsg+0x4d8/0x7f0 [ 494.324569] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 494.330036] ? security_socket_sendmsg+0x1bd/0x200 [ 494.335028] ? inet_getname+0x490/0x490 [ 494.339065] __sys_sendto+0x975/0xb70 [ 494.343027] ? syscall_return_slowpath+0x112/0x880 [ 494.348081] __se_sys_sendto+0x107/0x130 [ 494.352256] __x64_sys_sendto+0x6e/0x90 [ 494.356291] do_syscall_64+0xbe/0x100 [ 494.360180] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 494.365431] RIP: 0033:0x457569 [ 494.368692] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 494.387644] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 494.395424] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 494.402742] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 494.410055] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 494.417415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 494.424734] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x2a1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:20:48 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x90000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x904e, 0x0, 0x0, 0x0, @sint={0x4, 0x8}}]}) 09:20:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) sendto$inet6(r3, &(0x7f00009a9000)="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", 0x6b1, 0x0, &(0x7f000011b000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}, 0x1}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x7, &(0x7f00006a7ffc), 0x4) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x8080) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x7fffffff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={r5, 0x100000001, 0x3, 0xd7, 0x6, 0x80}, 0x14) 09:20:48 executing program 4 (fault-call:7 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 494.764853] FAULT_INJECTION: forcing a failure. [ 494.764853] name failslab, interval 1, probability 0, space 0, times 0 [ 494.776258] CPU: 1 PID: 12647 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 494.783580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.792982] Call Trace: [ 494.795657] dump_stack+0x306/0x460 [ 494.799371] should_fail+0x1170/0x1350 [ 494.803344] __should_failslab+0x278/0x2a0 [ 494.807655] should_failslab+0x29/0x70 [ 494.811619] kmem_cache_alloc+0x146/0xd50 [ 494.815845] ? skb_clone+0x4d2/0x7b0 [ 494.819619] ? __msan_poison_alloca+0x17a/0x210 [ 494.824406] skb_clone+0x4d2/0x7b0 [ 494.828022] br_flood+0xbee/0x10b0 [ 494.831657] br_dev_xmit+0x1441/0x1690 [ 494.835624] ? br_net_exit+0x230/0x230 [ 494.839601] dev_hard_start_xmit+0x6b8/0xdb0 [ 494.844153] __dev_queue_xmit+0x2e62/0x3d90 [ 494.848644] dev_queue_xmit+0x4b/0x60 [ 494.852576] ip_finish_output2+0x1308/0x14f0 [ 494.857071] ip_do_fragment+0x3810/0x3e90 [ 494.861278] ? ip_fragment+0x3f0/0x3f0 [ 494.865257] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 494.870756] ip_fragment+0x247/0x3f0 [ 494.874624] ip_finish_output+0xff3/0x10e0 [ 494.878936] ip_output+0x534/0x600 [ 494.882548] ? ip_mc_finish_output+0x440/0x440 [ 494.887232] ? ip_finish_output+0x10e0/0x10e0 [ 494.891792] ip_send_skb+0x178/0x350 [ 494.895592] udp_send_skb+0x10b9/0x18d0 [ 494.899695] udp_sendmsg+0x149a/0x4170 [ 494.903694] ? ip_copy_metadata+0x16a0/0x16a0 [ 494.908343] ? kmsan_set_origin_inline+0x6b/0x120 [ 494.913309] ? kmsan_set_origin+0x83/0x140 [ 494.917620] udpv6_sendmsg+0x124d/0x48f0 [ 494.921867] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 494.927348] ? __msan_poison_alloca+0x17a/0x210 [ 494.932098] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 494.936509] inet_sendmsg+0x4d8/0x7f0 [ 494.940413] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 494.945884] ? security_socket_sendmsg+0x1bd/0x200 [ 494.950887] ? inet_getname+0x490/0x490 [ 494.954924] __sys_sendto+0x975/0xb70 [ 494.958868] ? syscall_return_slowpath+0x112/0x880 [ 494.963912] __se_sys_sendto+0x107/0x130 [ 494.968093] __x64_sys_sendto+0x6e/0x90 [ 494.972123] do_syscall_64+0xbe/0x100 [ 494.975994] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 494.981235] RIP: 0033:0x457569 [ 494.984499] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.003452] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000040), 0x34c, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:49 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xffa0, 0x22000) recvfrom$unix(r2, &(0x7f0000000300)=""/244, 0xf4, 0x2002, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) close(r1) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r4, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r6 = shmget(0x1, 0x1000, 0x54000800, &(0x7f0000ffd000/0x1000)=nil) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000600)=[0xee01, 0x0, 0xee01, 0xee00, 0x0, 0x0, 0xee01, 0xee01]) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r5, 0x10, &(0x7f0000000840)={0x0, 0x0}) fcntl$getownex(r3, 0x10, &(0x7f0000000880)={0x0, 0x0}) shmctl$IPC_SET(r6, 0x1, &(0x7f00000008c0)={{0x81, r7, r8, r9, r10, 0x20, 0x2}, 0x80000001, 0xfffffffffffff122, 0x900000000000000, 0xffffffffffffffff, r11, r12, 0x3}) r13 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x12) sendmsg$key(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x128}}, 0x0) [ 495.011232] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 495.018543] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 495.025871] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 495.033182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 495.040506] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:49 executing program 1: add_key(&(0x7f0000000200)="727855adff010000e4415016887f307f220320d3571cb28f778cde0a24fe541d9fbcd0a5db8cd6925ac4a2d99625f3e2c55ef63b27f8a9280adc68c95ddd618b4cc489e0673c98930e57947a264a70ea8585b44832a27c38809659ed46c65c9ae46f7bb00af1d618b0bcbdf33acb8908cfc64b487e2e593cea8c42000000000000000000000000000000000000000000000000000000", &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000040)="3ac91c62b171a60ea7b16f4fb74dff64ae4c4e50d0fb0d5e4e803d6475d17d479f085c8621c732ce1ac4dc9656172f1c682f7c1086eb9c850000193c1d7de6c978292467b04d46f225d6bdc3875b8d3a713b935e8311796a23db46cdf2d0b729e37a6b9719151abe5a0775f3ba9de1f21321da1e5f85c05d0000000000000000", 0x196, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000340)={'ah\x00'}, &(0x7f0000000380)=0x1e) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @local}}, 0x9f, 0x38, 0x7f, 0x0, 0x80}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r1, 0x8, 0x1000}, &(0x7f0000000300)=0x8) 09:20:49 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x70000000000000, 0x2c8000) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4, 0x400000) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x201) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x2, 0x5, 0x401, 0x20000000000001, 0x100000002, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:49 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x8700, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000440)={"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"}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x2) dup2(r1, r2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000080)=0xf, 0x4) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:20:49 executing program 4 (fault-call:7 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:49 executing program 2: io_setup(0x48, &(0x7f0000000080)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 495.644502] FAULT_INJECTION: forcing a failure. [ 495.644502] name failslab, interval 1, probability 0, space 0, times 0 [ 495.655967] CPU: 0 PID: 12681 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 495.663286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.672675] Call Trace: [ 495.675343] dump_stack+0x306/0x460 [ 495.679049] should_fail+0x1170/0x1350 [ 495.683018] __should_failslab+0x278/0x2a0 [ 495.687320] should_failslab+0x29/0x70 [ 495.691278] kmem_cache_alloc+0x146/0xd50 [ 495.695478] ? skb_clone+0x4d2/0x7b0 [ 495.699260] ? __msan_poison_alloca+0x17a/0x210 [ 495.704045] skb_clone+0x4d2/0x7b0 [ 495.707686] br_flood+0xbee/0x10b0 [ 495.711321] br_dev_xmit+0x1441/0x1690 [ 495.715348] ? br_net_exit+0x230/0x230 [ 495.719315] dev_hard_start_xmit+0x6b8/0xdb0 [ 495.723832] __dev_queue_xmit+0x2e62/0x3d90 [ 495.728267] dev_queue_xmit+0x4b/0x60 [ 495.732149] ip_finish_output2+0x1308/0x14f0 [ 495.736660] ip_do_fragment+0x3810/0x3e90 [ 495.740877] ? ip_fragment+0x3f0/0x3f0 09:20:49 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)="11619b9e39a74a87b86aac88a3b19a93869c26321376abab15771eba1b630153aa980b5c4099839d03e85455f6f05e65fab25c8e1f50208dae98b0a4fc209361fba1fd53b8ea87d7adfce7af873a55523a468ae397"}, 0xfffffffffffffeb0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, 0x0, &(0x7f00000003c0)=""/61}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='proc\x00', 0xffffffffffffffff}, 0x30) ptrace$setregset(0x4205, r0, 0x202, &(0x7f00000001c0)={&(0x7f0000000100)="736fe8b4de76cbb0a1a6d93625432f980addc1fd96952e7f0d357f86eacbf0f290cd874a21d2fa037d5fbe6aad6e01272d341b4077053011b9da7fc97c17e8a48db16bead5eed61bc7e9c1ba02b3de4c93d6aeb83d32df77dbdaba25d48045e9cc0b17637b65a1466475dcc005be8d6ccb7fd57ae95247d66938b1dda7bdb940137c8a63", 0x84}) 09:20:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x800) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) [ 495.744869] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 495.750375] ip_fragment+0x247/0x3f0 [ 495.754202] ip_finish_output+0xff3/0x10e0 [ 495.758534] ip_output+0x534/0x600 [ 495.762144] ? ip_mc_finish_output+0x440/0x440 [ 495.766838] ? ip_finish_output+0x10e0/0x10e0 [ 495.771397] ip_send_skb+0x178/0x350 [ 495.775187] udp_send_skb+0x10b9/0x18d0 [ 495.779285] udp_sendmsg+0x149a/0x4170 [ 495.783290] ? ip_copy_metadata+0x16a0/0x16a0 [ 495.787921] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 495.793233] ? kmsan_set_origin_inline+0x6b/0x120 [ 495.798175] ? kmsan_set_origin+0x83/0x140 [ 495.802492] udpv6_sendmsg+0x124d/0x48f0 [ 495.806713] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 495.812205] ? __msan_poison_alloca+0x17a/0x210 [ 495.816951] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 495.821372] inet_sendmsg+0x4d8/0x7f0 [ 495.825272] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 495.830739] ? security_socket_sendmsg+0x1bd/0x200 [ 495.835733] ? inet_getname+0x490/0x490 [ 495.839775] __sys_sendto+0x975/0xb70 [ 495.843721] ? syscall_return_slowpath+0x112/0x880 [ 495.848759] __se_sys_sendto+0x107/0x130 [ 495.852956] __x64_sys_sendto+0x6e/0x90 [ 495.856992] do_syscall_64+0xbe/0x100 [ 495.860875] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 495.866117] RIP: 0033:0x457569 [ 495.869369] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 495.888346] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 495.896161] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 495.903473] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 495.910788] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 495.918174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 495.925486] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:50 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) ftruncate(0xffffffffffffffff, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/61}, 0x18) r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000908202cf74cacab62b1296a8b4787070afa1c9f8c1b000f89e276c71c47c4df04ce981f89c0a8c5fb2ce65b21fd68af196340a4447439e1caeaf390ffe9b96f07ca8e885224a362c61abd6b43d4a936a1f7dd685b3e1bdd5b2d3f33abf27cdf02827201ca5aff54646bd9a8fc5924affddb03b574faf93a478df82d5528e6b2341ec6850a249"], 0xb8}}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0xb4d02708049dbfe7, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f00000001c0)) write$binfmt_misc(r2, &(0x7f00000002c0)={'syz1', "e4b37809f716b2bed0ba96cd9132938fc218e84f0c1223cc71262ffd25e1b19e47509bda50d6194dbf264709aa4576aa36168e7893a2367c817e788d0e20b2b44a081a2c8b404dd6fdaa9eb881555f96baa8bbe01df2d64a6a742d0188626f1e0120cb5b87b23c817e0205c400c1182275034080d09cf5c4610d5e1dcbff4af67c694186e8c83cce766857"}, 0x8f) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000080), 0x4) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0xc0001, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r4, 0x40087705, &(0x7f0000000180)={0x1, 0x9}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000000140)) 09:20:50 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) fcntl$dupfd(r3, 0x406, r3) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x240, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @multicast2}}, [0x9, 0x8, 0x2, 0x4, 0x4, 0x0, 0x354, 0x1, 0x81, 0x1, 0x1, 0x9ec, 0x2, 0x2, 0x6]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x2}, 0x7) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x21, &(0x7f0000000080), 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000380), &(0x7f00000003c0)=0x8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000400)=0xfffffffffffffffd) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000240)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000300)=""/45, 0x2d, 0x1ff}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x20140, 0x0) 09:20:50 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x1, 0x100000001, 0x9, 0xffffffff, 0x1ff}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xffffffffc0000001, 0x412300) 09:20:50 executing program 4 (fault-call:7 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 496.588496] FAULT_INJECTION: forcing a failure. [ 496.588496] name failslab, interval 1, probability 0, space 0, times 0 [ 496.599887] CPU: 1 PID: 12715 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 496.607197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 496.616586] Call Trace: [ 496.619268] dump_stack+0x306/0x460 [ 496.623011] should_fail+0x1170/0x1350 [ 496.626984] __should_failslab+0x278/0x2a0 [ 496.631285] should_failslab+0x29/0x70 [ 496.635243] kmem_cache_alloc+0x146/0xd50 [ 496.639453] ? skb_clone+0x4d2/0x7b0 [ 496.643247] ? __msan_poison_alloca+0x17a/0x210 [ 496.647999] skb_clone+0x4d2/0x7b0 [ 496.651620] br_flood+0xbee/0x10b0 [ 496.655252] br_dev_xmit+0x1441/0x1690 [ 496.659224] ? br_net_exit+0x230/0x230 [ 496.663183] dev_hard_start_xmit+0x6b8/0xdb0 [ 496.667814] __dev_queue_xmit+0x2e62/0x3d90 [ 496.672257] dev_queue_xmit+0x4b/0x60 [ 496.676168] ip_finish_output2+0x1308/0x14f0 [ 496.680664] ip_do_fragment+0x3810/0x3e90 [ 496.684897] ? ip_fragment+0x3f0/0x3f0 [ 496.688870] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 496.694417] ip_fragment+0x247/0x3f0 [ 496.698212] ip_finish_output+0xff3/0x10e0 [ 496.702541] ip_output+0x534/0x600 [ 496.706155] ? ip_mc_finish_output+0x440/0x440 [ 496.710850] ? ip_finish_output+0x10e0/0x10e0 [ 496.715453] ip_send_skb+0x178/0x350 [ 496.719263] udp_send_skb+0x10b9/0x18d0 [ 496.723418] udp_sendmsg+0x149a/0x4170 [ 496.727439] ? ip_copy_metadata+0x16a0/0x16a0 [ 496.732113] ? kmsan_set_origin_inline+0x6b/0x120 [ 496.737086] ? kmsan_set_origin+0x83/0x140 [ 496.741424] udpv6_sendmsg+0x124d/0x48f0 [ 496.745654] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.751128] ? __msan_poison_alloca+0x17a/0x210 [ 496.755897] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 496.760309] inet_sendmsg+0x4d8/0x7f0 [ 496.764216] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 496.769687] ? security_socket_sendmsg+0x1bd/0x200 [ 496.774681] ? inet_getname+0x490/0x490 [ 496.778713] __sys_sendto+0x975/0xb70 [ 496.782648] ? syscall_return_slowpath+0x112/0x880 [ 496.787688] __se_sys_sendto+0x107/0x130 [ 496.791880] __x64_sys_sendto+0x6e/0x90 [ 496.795913] do_syscall_64+0xbe/0x100 [ 496.799786] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 496.805059] RIP: 0033:0x457569 [ 496.808315] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 496.827277] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) modify_ldt$read(0x0, &(0x7f00000000c0)=""/195, 0xc3) 09:20:50 executing program 1: r0 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="b47e616ef49267e985ecf2d5f5d6671200f7a039bd10c56ac1ecd98f8e65d150fc78420d4501dabd727ef45c81bc430ea03749211a91422a324156254dd2772165b1a8434cc82a08088af3f1067f1c1a112f60e1f961f430487d297b5eba6acc3bf68e40f95ad5fe69d8f14b0c18dd35494d4b24fbb757814106bd3480cc0f178246ee03ee05ca4b89f7b315bd6bebf08a0737eb60796b8df828c1a28a9f3d5dd12aefafee7a5a8225df08fff838ba0a07312fcadb7f78631dc214d7bd75fa9dc91eaa294b4a55ecf14085d1fdad390e0e6c42", 0xd3, r0) 09:20:50 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 496.835078] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 496.842396] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 496.849725] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 496.857039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 496.864373] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40, 0x0) syz_open_pts(r1, 0x800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) 09:20:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab7505000000", 0x6) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xfff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000100)={r3, 0x40, 0x6, [0x6, 0x14, 0x5, 0x5, 0x81, 0x9]}, &(0x7f0000000140)=0x14) 09:20:51 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) io_setup(0x4, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x40, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={0x3}, 0x8}) 09:20:51 executing program 4 (fault-call:7 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 497.458605] FAULT_INJECTION: forcing a failure. [ 497.458605] name failslab, interval 1, probability 0, space 0, times 0 [ 497.470024] CPU: 0 PID: 12745 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 497.477332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 497.486717] Call Trace: [ 497.489381] dump_stack+0x306/0x460 [ 497.493081] should_fail+0x1170/0x1350 [ 497.497054] __should_failslab+0x278/0x2a0 [ 497.501393] should_failslab+0x29/0x70 09:20:51 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x5, 0x200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x11d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 497.505338] kmem_cache_alloc+0x146/0xd50 [ 497.509542] ? skb_clone+0x4d2/0x7b0 [ 497.513312] ? __msan_poison_alloca+0x17a/0x210 [ 497.518058] skb_clone+0x4d2/0x7b0 [ 497.521687] br_flood+0xbee/0x10b0 [ 497.525316] br_dev_xmit+0x1441/0x1690 [ 497.529281] ? br_net_exit+0x230/0x230 [ 497.533230] dev_hard_start_xmit+0x6b8/0xdb0 [ 497.537738] __dev_queue_xmit+0x2e62/0x3d90 [ 497.542169] dev_queue_xmit+0x4b/0x60 [ 497.546035] ip_finish_output2+0x1308/0x14f0 [ 497.550530] ip_do_fragment+0x3810/0x3e90 [ 497.554755] ? ip_fragment+0x3f0/0x3f0 [ 497.558748] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 497.564245] ip_fragment+0x247/0x3f0 [ 497.568073] ip_finish_output+0xff3/0x10e0 [ 497.572396] ip_output+0x534/0x600 [ 497.576009] ? ip_mc_finish_output+0x440/0x440 [ 497.580721] ? ip_finish_output+0x10e0/0x10e0 [ 497.585300] ip_send_skb+0x178/0x350 [ 497.589087] udp_send_skb+0x10b9/0x18d0 [ 497.593195] udp_sendmsg+0x149a/0x4170 [ 497.597187] ? ip_copy_metadata+0x16a0/0x16a0 [ 497.601909] ? kmsan_set_origin_inline+0x6b/0x120 [ 497.606872] ? kmsan_set_origin+0x83/0x140 [ 497.611180] udpv6_sendmsg+0x124d/0x48f0 [ 497.615390] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.620890] ? __msan_poison_alloca+0x17a/0x210 [ 497.625672] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 497.630076] inet_sendmsg+0x4d8/0x7f0 [ 497.633979] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 497.639473] ? security_socket_sendmsg+0x1bd/0x200 [ 497.644475] ? inet_getname+0x490/0x490 [ 497.648529] __sys_sendto+0x975/0xb70 [ 497.652515] ? syscall_return_slowpath+0x112/0x880 09:20:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x40d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000140)="50d251639907c2fede7991b05fb87e5007603a54974637c00939dd0e644768b3ec412dc579", &(0x7f0000000000)="0b6883fbaf2df2dc2402ed3e79df9addd5"}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000180)={0xe, 0x6, 0x8, 0x4, 0x66, "5ff86a26f76d74adf68eacd76a66882a60d57a7cb46346b23e71aef01745029ac7fe4889fcdc86ac1f7dec0c5afb7e0076ec5381d8768e670ac57616efe6bf2f711b1c28aa51c075f5f25b4bb6ae3dc65517c454dd27e980c7ddbfbad33a27191667d2d12a94"}, 0x72) ioctl$BLKROGET(r1, 0x125e, &(0x7f00000000c0)) [ 497.657592] __se_sys_sendto+0x107/0x130 [ 497.661772] __x64_sys_sendto+0x6e/0x90 [ 497.665809] do_syscall_64+0xbe/0x100 [ 497.669702] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 497.674940] RIP: 0033:0x457569 [ 497.678187] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 497.697132] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:51 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x80000000007, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = open(&(0x7f0000000540)='./file0\x00', 0x400002, 0x76) write$cgroup_subtree(r2, &(0x7f0000000580)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'pids'}, {0x2d, 'memory'}, {0x0, 'io'}, {0x2b, 'pids'}]}, 0x24) rt_sigreturn() r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="6d15948df929b740cfbe3db6273ff16f81cda7545f7b9509a6f51a2474f89909b3c17c8529be21672081fa26873cee51038bb39dbd079123b9593c4f28340fa8fb3d95606e089f63b4a016f841cfc823c972baba555e8870fd51066074c1bb55fa70897c189c5540d295a9a7f3b0a77d6d67702312bcdd3d9785397b56", 0x7d, 0xfffffffffffffff8) r4 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\\\}%systemtrustedvboxnet0#@', 0xfffffffffffffffa) r5 = add_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="4d42d5a96111a98529081db12253a56afd232036ab0c0dce115ed06b06bde28dd5f42d4f755f82e3f84c9e39fd83474aada33da3ed01722cb00a825bc4d1679505691029469b2d886326217c3756b2cc8cf2425079a9ee7c5d2b9005b2c2875bbd97fd1ce683f15bf858015b9565b053f349f4a058ae25343489a60c0c09e81e3351d7df40fd0663f2ea4cf02b27897b6e1662edbd19bfb7a09b758e283f375828ff6f3b97824629a570f05db63909b23d3260eed2a4711cfb1c52522ad18ceb3e03b09529239b40730d814a3095e83a2f", 0xd1, 0xfffffffffffffffc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000640)="4b713767eec665f9b2d3d6bf11849fa490c815701962e0aecf6a45da8bfdd6035d78f905472927b241267f4e27566ba622190770008b2fb9e1626124723ac201c2f7205a1277b8bcfe5a35ded6e1f99099224185ab3a3e228ace079cc2fac0c171697a45e16000e17d255040bb3dd5a0a3e459b12621691de387bbcc61cff5895f0c7bdf3258316ce2e0f72b195db35b145ae0606dffa805efe7d81d0ef75cece45258aae86f4a16aa9f9e889ee3895b22227afad846dff92481ea8d64fedd69d143de8ab0ab77600bab88cedb6633f167f63efee0ce71a5856983506353f4fb", 0xe0) keyctl$dh_compute(0x17, &(0x7f0000000400)={r3, r4, r5}, &(0x7f0000000440)=""/49, 0x31, &(0x7f0000000500)={&(0x7f0000000480)={'crct10dif\x00'}, &(0x7f00000004c0)="f4018b6271", 0x5}) [ 497.704912] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 497.712241] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 497.719571] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 497.726890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 497.734200] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) socketpair(0xa, 0x800, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000023c0)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x7ff, 0x3, 0x8, 0x4, 0xffffffff, 0x1, 0x7ff, 0x2, r2}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) syncfs(r3) 09:20:52 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x5, r0}, {0x2, 0x3, r1}, {0x2, 0x7, r2}, {0x2, 0x4, r3}], {0x4, 0x3}, [{0x8, 0x1, r4}, {0x8, 0x0, r5}, {0x8, 0x4, r6}], {0x10, 0x1}, {0x20, 0x2}}, 0x5c, 0x2) 09:20:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x5f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000001c0)="4e322948f839040074", &(0x7f00000000c0)="5485b63a141e19541a330ea3634c285cb4c0bf51cab22751ca77966c074c4bc6767416ba0501861f8f7b9e26afc88ed892ef715380d14ee291f2dc3588a2798b945140f1df736c31d7b80db6997f5f8607531dbca428062c1bbdf8ad80b5c4cb1bda69ef3181372ebfccf641d10f53d54015d651685cf064c222f8bfc689ff9411"}, 0x20) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000200)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40040, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:52 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000080)={0x5, 0x6, 0x0, 0x8, 0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r4, 0xc008551c, &(0x7f0000000040)={0x3, 0x8, [0x8, 0x3]}) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:52 executing program 4 (fault-call:7 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:52 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x80) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) [ 498.585039] FAULT_INJECTION: forcing a failure. [ 498.585039] name failslab, interval 1, probability 0, space 0, times 0 [ 498.596543] CPU: 1 PID: 12787 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 498.603861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 498.613255] Call Trace: [ 498.615938] dump_stack+0x306/0x460 [ 498.619640] should_fail+0x1170/0x1350 [ 498.623624] __should_failslab+0x278/0x2a0 [ 498.627941] should_failslab+0x29/0x70 [ 498.631917] kmem_cache_alloc+0x146/0xd50 [ 498.636125] ? skb_clone+0x4d2/0x7b0 [ 498.639898] ? __msan_poison_alloca+0x17a/0x210 [ 498.644644] skb_clone+0x4d2/0x7b0 [ 498.648284] br_flood+0xbee/0x10b0 [ 498.651924] br_dev_xmit+0x1441/0x1690 [ 498.655910] ? br_net_exit+0x230/0x230 [ 498.659871] dev_hard_start_xmit+0x6b8/0xdb0 [ 498.664388] __dev_queue_xmit+0x2e62/0x3d90 [ 498.668834] dev_queue_xmit+0x4b/0x60 [ 498.672706] ip_finish_output2+0x1308/0x14f0 [ 498.677211] ip_do_fragment+0x3810/0x3e90 [ 498.681428] ? ip_fragment+0x3f0/0x3f0 [ 498.685428] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 498.690926] ip_fragment+0x247/0x3f0 [ 498.694744] ip_finish_output+0xff3/0x10e0 [ 498.699054] ip_output+0x534/0x600 [ 498.702669] ? ip_mc_finish_output+0x440/0x440 [ 498.707347] ? ip_finish_output+0x10e0/0x10e0 [ 498.711902] ip_send_skb+0x178/0x350 [ 498.715702] udp_send_skb+0x10b9/0x18d0 [ 498.719796] udp_sendmsg+0x149a/0x4170 [ 498.723786] ? ip_copy_metadata+0x16a0/0x16a0 [ 498.728436] ? kmsan_set_origin_inline+0x6b/0x120 [ 498.733394] ? kmsan_set_origin+0x83/0x140 [ 498.737705] udpv6_sendmsg+0x124d/0x48f0 [ 498.741955] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 498.747438] ? __msan_poison_alloca+0x17a/0x210 [ 498.752189] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 498.756585] inet_sendmsg+0x4d8/0x7f0 [ 498.760504] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 498.765978] ? security_socket_sendmsg+0x1bd/0x200 [ 498.770969] ? inet_getname+0x490/0x490 [ 498.775008] __sys_sendto+0x975/0xb70 [ 498.778955] ? syscall_return_slowpath+0x112/0x880 [ 498.783997] __se_sys_sendto+0x107/0x130 [ 498.788181] __x64_sys_sendto+0x6e/0x90 [ 498.792233] do_syscall_64+0xbe/0x100 [ 498.796109] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 498.801359] RIP: 0033:0x457569 [ 498.804608] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 498.823562] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:52 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000180)="976ae587883a929908600d0057bd1648d31c8ec0143cb97ac8cce3094c4526ac80b61c83538bb6d0ce86cab7cc4c12d0650678183a637b474c38dce7451fa390afe862b2a7da8e55a817aab2b5fd8399270962829a83ee5e434670e11b80585252b91b72f59a81e8c6a4fbf3f1e68c04ec153901a1defcc916ddc329cb66a4de5cc1e88af3cf89949adcaab36ca50cf0c3e69724c81de3293679166e29727de343f6ceac670bb219d821fe7d01d984875227c744011ed4c810fc3440af24ef7d9b4939498ab5876c92df6614990750c201d42005af2a11b7a29b9c71063ce9dfc3ba", 0xe2, 0xfffffffffffffffe) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x7) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xd) 09:20:52 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x280081, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x80, 0x9}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000240)={r2, 0x3}, &(0x7f0000000280)=0x8) r3 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000100)={r4, 0xab4a000, 0x1, 0xfffffffffffffffb}, &(0x7f0000000140)=0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 498.831343] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 498.838690] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 498.846016] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 498.853337] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 498.860660] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:53 executing program 2: io_setup(0x7, &(0x7f0000000000)=0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x4, 0xf0, [], 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f0000000300)=""/240}, &(0x7f0000000180)=0x78) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r2) socket$inet6(0xa, 0x1, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000400)={0x7, 0x0, [{0xbff, 0x0, 0x99}, {0x953, 0x0, 0xcb}, {0xb53, 0x0, 0x4}, {0x60c, 0x0, 0x1d0}, {0xb4f, 0x0, 0x80000000}, {0xb26, 0x0, 0x200}, {0x87a, 0x0, 0x4}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)={0x96, 0x56, "054e2a2bbe63d85f8362d2acc44b68e1ec7ecc0ee35848f41d3b21f028459bc7041ee57af4541449ce792c13f43e79813ae919aa9eb0ee3fd6460e11667dec44eaf5269e4b2492bf61a7c9b82d65217708b1be546dd9"}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x40000) setsockopt$inet6_udp_int(r2, 0x11, 0x6e, &(0x7f00000000c0)=0x4, 0x268) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x2100) ioctl$LOOP_CLR_FD(r2, 0x4c01) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000100)={0x1, 0x5}, 0x2) 09:20:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x84) ioctl$int_in(r1, 0x5421, &(0x7f0000000140)=0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x4000000027, &(0x7f0000000040)={@loopback, @loopback, @broadcast}, &(0x7f0000000080)=0xc) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) bind$vsock_dgram(r0, &(0x7f00000000c0)={0x28, 0x0, 0xfffffffd}, 0x10) 09:20:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000100), 0xffffffffffffffde}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5000800}, 0xc, &(0x7f0000000040)={&(0x7f0000003540)=ANY=[@ANYBLOB="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"], 0x10c8}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x4) ioctl(r1, 0x8912, &(0x7f0000000300)="153f6234488dd25d766070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={"657267c71ac977ead9c300"}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$FUSE_POLL(r2, &(0x7f0000000340)={0x18, 0x0, 0x4, {0xfc7}}, 0x18) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x1, 0x4) setsockopt$sock_int(r2, 0x1, 0x14, &(0x7f0000000040), 0x50) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYRES16=r0], 0x2) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="eda18bd55b84dc2c252ac334ebc852ef3291af50e86dc3759c042b9f402584d5c732dd6a08ccb7a07aa346b7ade9dc555bac01bfa6d47e7652825331635adf96eea664cffe4b964dc69a8db24170e1d6b75c2d31fe648292e513f8c6c13aed8bd7da35602b91677e17a98b85d20a5f50e9aa33a65706591aecf57aea4e498cd6dc675bc52abbfb2e8c14e47f5c32accfb9828af0a24de8668221f2ca9b3e10aff8f62e", 0xa3) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40000) 09:20:53 executing program 1: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440), 0xfffffffffffffdd5, r0) 09:20:53 executing program 4 (fault-call:7 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:53 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x4, 0x5, 0x4, 0x10000}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, r0}, 0x14a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80001}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x10b1280bb939fa6a}, 0x20008804) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x30100, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, 0x0, &(0x7f00000001c0)=""/61}, 0x3fe) 09:20:53 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x341240, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x100, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000100)={0x4}, 0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) [ 499.900370] FAULT_INJECTION: forcing a failure. [ 499.900370] name failslab, interval 1, probability 0, space 0, times 0 [ 499.911807] CPU: 1 PID: 12833 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 499.919142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 499.928529] Call Trace: [ 499.931208] dump_stack+0x306/0x460 [ 499.934911] should_fail+0x1170/0x1350 [ 499.938888] __should_failslab+0x278/0x2a0 [ 499.943190] should_failslab+0x29/0x70 [ 499.947152] kmem_cache_alloc+0x146/0xd50 [ 499.951367] ? skb_clone+0x4d2/0x7b0 [ 499.955145] ? __msan_poison_alloca+0x17a/0x210 [ 499.959938] skb_clone+0x4d2/0x7b0 [ 499.963753] br_flood+0xbee/0x10b0 [ 499.967394] br_dev_xmit+0x1441/0x1690 [ 499.971406] ? br_net_exit+0x230/0x230 [ 499.975394] dev_hard_start_xmit+0x6b8/0xdb0 [ 499.979915] __dev_queue_xmit+0x2e62/0x3d90 [ 499.984347] dev_queue_xmit+0x4b/0x60 [ 499.988254] ip_finish_output2+0x1308/0x14f0 [ 499.992755] ip_do_fragment+0x3810/0x3e90 [ 499.996968] ? ip_fragment+0x3f0/0x3f0 [ 500.000932] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 500.006428] ip_fragment+0x247/0x3f0 [ 500.010265] ip_finish_output+0xff3/0x10e0 [ 500.014583] ip_output+0x534/0x600 [ 500.018201] ? ip_mc_finish_output+0x440/0x440 [ 500.022893] ? ip_finish_output+0x10e0/0x10e0 [ 500.027446] ip_send_skb+0x178/0x350 [ 500.031228] udp_send_skb+0x10b9/0x18d0 [ 500.035326] udp_sendmsg+0x149a/0x4170 [ 500.039319] ? ip_copy_metadata+0x16a0/0x16a0 [ 500.043920] ? kmsan_save_stack_with_flags+0xd0/0x100 09:20:54 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x5, 0x7}}, 0x28) 09:20:54 executing program 3: eventfd2(0x2, 0x1) r0 = dup(0xffffffffffffff9c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="0cf90d49638a03361ded8cfbb5d24abc65282730f2f47571f00a615ddd3420737a633549d0eb4e0e727d0870a05fe5e8d15272fea185104cff9f98d0c59812870ba312deed6cec3176a3c43a03c4555fe1394d1ff534e35d291b0f73a8d99a95f1b249fc727cd8804ed57ff0d15289c2306840a8c686bf4f90015596db78d9a76b3759760ad602b9fbe5f5f4c6c5d0df12a5b842dff9b35263423e9fcea196106187f8988407e7395eee90937ecaa323ca737dc76423e6a78bf901fd2bcfff8207aad6b6432864960d13b58bb35cc2735933eedc17f5c63c3320d22517dc47f4825735ab223b4db8cf9b70c34658c33bf5cecc80"}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100), 0x800000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 500.049225] ? kmsan_set_origin_inline+0x6b/0x120 [ 500.054167] ? kmsan_set_origin+0x83/0x140 [ 500.058479] udpv6_sendmsg+0x124d/0x48f0 [ 500.062724] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 500.068193] ? __msan_poison_alloca+0x17a/0x210 [ 500.072938] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 500.077343] inet_sendmsg+0x4d8/0x7f0 [ 500.081248] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 500.086725] ? security_socket_sendmsg+0x1bd/0x200 [ 500.091715] ? inet_getname+0x490/0x490 [ 500.095753] __sys_sendto+0x975/0xb70 [ 500.099691] ? syscall_return_slowpath+0x112/0x880 [ 500.104734] __se_sys_sendto+0x107/0x130 [ 500.108928] __x64_sys_sendto+0x6e/0x90 [ 500.112960] do_syscall_64+0xbe/0x100 [ 500.116847] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 500.122092] RIP: 0033:0x457569 [ 500.125343] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 500.144302] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 500.152090] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 500.159410] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 500.166729] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 500.174045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 500.181391] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) sched_yield() 09:20:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec96248c6c9fb5ea86befeb5c2460000f5a57796dc7b22d556440a72ecf173803a4b8a0000000000000000000000", 0x31) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:54 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x40) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x44) 09:20:54 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x80000, 0x0) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:54 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = getegid() r1 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x100, 0x400) write$apparmor_current(r3, &(0x7f00000001c0)=@profile={'changeprofile ', '*\x00'}, 0x10) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f0000000140)=[r0, r1, r2, r4]) 09:20:54 executing program 4 (fault-call:7 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '+-securitymd5sumsecurity]'}], 0xa, "5b34263aa6cfd4b5b599d9208283e7d770dbec81683faa92128dc62b06b028c6e19630301455a440a3dfbcb7053a7c7d216916419449d8a17db08e9cecba4aaf5448fc57140a64fd9b79c2676f187f22cd8534b209bce3667d10f4beca1488b7e5de700a832ede900647fff8e0ebb274ca70e2cad0616eeb542175345848a0f612a887d55e38b4da4e482249d82fee4c701e1b6672a74d64453baf22a0b6886152d506c12e3d801f98453db6e65c4a3fdc709c4809e9ec7af66c827a1b8a0dc62a9b"}, 0xe7) [ 501.058177] FAULT_INJECTION: forcing a failure. [ 501.058177] name failslab, interval 1, probability 0, space 0, times 0 [ 501.069584] CPU: 0 PID: 12871 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 501.076902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 501.086289] Call Trace: [ 501.088956] dump_stack+0x306/0x460 [ 501.092797] should_fail+0x1170/0x1350 [ 501.096789] __should_failslab+0x278/0x2a0 [ 501.101118] should_failslab+0x29/0x70 [ 501.105080] kmem_cache_alloc+0x146/0xd50 [ 501.109287] ? skb_clone+0x4d2/0x7b0 [ 501.113061] ? __msan_poison_alloca+0x17a/0x210 [ 501.117805] skb_clone+0x4d2/0x7b0 [ 501.121438] br_flood+0xbee/0x10b0 [ 501.125076] br_dev_xmit+0x1441/0x1690 [ 501.129050] ? br_net_exit+0x230/0x230 [ 501.133014] dev_hard_start_xmit+0x6b8/0xdb0 [ 501.137521] __dev_queue_xmit+0x2e62/0x3d90 [ 501.141950] dev_queue_xmit+0x4b/0x60 [ 501.145831] ip_finish_output2+0x1308/0x14f0 [ 501.150335] ip_do_fragment+0x3810/0x3e90 [ 501.154549] ? ip_fragment+0x3f0/0x3f0 [ 501.158520] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 501.164015] ip_fragment+0x247/0x3f0 [ 501.167863] ip_finish_output+0xff3/0x10e0 [ 501.172186] ip_output+0x534/0x600 [ 501.175808] ? ip_mc_finish_output+0x440/0x440 [ 501.180509] ? ip_finish_output+0x10e0/0x10e0 [ 501.185069] ip_send_skb+0x178/0x350 [ 501.188871] udp_send_skb+0x10b9/0x18d0 [ 501.192979] udp_sendmsg+0x149a/0x4170 [ 501.196966] ? ip_copy_metadata+0x16a0/0x16a0 [ 501.201619] ? kmsan_set_origin_inline+0x6b/0x120 [ 501.206570] ? kmsan_set_origin+0x83/0x140 [ 501.210897] udpv6_sendmsg+0x124d/0x48f0 [ 501.215114] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 501.220587] ? __msan_poison_alloca+0x17a/0x210 [ 501.225336] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 501.229739] inet_sendmsg+0x4d8/0x7f0 [ 501.233641] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 501.239110] ? security_socket_sendmsg+0x1bd/0x200 [ 501.244106] ? inet_getname+0x490/0x490 [ 501.248169] __sys_sendto+0x975/0xb70 [ 501.252109] ? syscall_return_slowpath+0x112/0x880 [ 501.257158] __se_sys_sendto+0x107/0x130 [ 501.261335] __x64_sys_sendto+0x6e/0x90 [ 501.265367] do_syscall_64+0xbe/0x100 [ 501.269248] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 501.274502] RIP: 0033:0x457569 [ 501.277751] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 501.296706] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = geteuid() getgroups(0x3, &(0x7f00000000c0)=[0xee00, 0xee01, 0xee00]) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000100)={0xa0, 0x0, 0x1, {{0x5, 0x3, 0xb1, 0x5d, 0x1000, 0x2, {0x2, 0x7, 0x2, 0x5, 0xca, 0x7fffffff, 0xffffffff, 0x0, 0x4dfb, 0x7, 0x8dc, r2, r3, 0x2, 0x40}}, {0x0, 0x2}}}, 0xa0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:55 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000000)={0x100000000, 0x7, 0x1}) 09:20:55 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r2, 0x80, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x5, @empty, 0x1}, @in6={0xa, 0x4e22, 0xee4a, @empty, 0x3fd}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e23, 0x10001, @mcast2, 0x5}, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x6}]}, &(0x7f00000001c0)=0x10) prctl$setptracer(0x59616d61, r0) [ 501.304483] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 501.311797] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 501.319134] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 501.326448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 501.333765] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0x23, "845c2d0eaa3977553aa4d791361f239ae09f5de2f97fdce784a1e5de0ecda19b251651"}, &(0x7f00000001c0)=0x2b) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={r2, 0x4a, "0023d252481c880d3694b462da02ab468548bf73c3438730bf88efe18e6437cb61d20024ce6aa3e4b6a8da3ab12e5ad7d42ee9fc8aa64de557916cdba495175356a599f72a0000000000"}, &(0x7f0000000040)=0x52) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e22, 0xdb, @dev={0xfe, 0x80, [], 0xc}, 0x2}}, [0x7, 0x9, 0xde, 0x7, 0x101, 0x5, 0x7, 0x8, 0x1000, 0xfffffffffffffff9, 0x0, 0x9, 0x8, 0x4, 0x98b]}, &(0x7f0000000140)=0x100) 09:20:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 09:20:55 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="df", 0x1, 0xfffffffffffffffe, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000000)="5a43f51d53ec2f113d8d4c996e981945740f28f7513e", 0xf, 0xfffffffffffffffe) 09:20:55 executing program 4 (fault-call:7 fault-nth:14): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:55 executing program 2: io_setup(0x48, &(0x7f0000000600)=0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x10001, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x0, 0x80) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x2001, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x8, 0x16000) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x200000, 0x0) io_submit(r0, 0x3, &(0x7f00000005c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x1, r1, &(0x7f0000000300)="ae5c7683389a37953467b6d08cb025997d45e0510cc1f07cd5846f72ba091bf3d172bc77d21259d7bec9f14491f6635e7d03be650902ca051f6d8ca22c8c50d9f9212943774b2d9c8c0670bbb5cf00b7e6fb81ebca266815dfd7a910b174fc35c069904c683b864a439ef48fee58af0b8e981a2514b3772f249d4d291f8f9f7cd08f43e66535537b76e48ccfbf842b01eb9c682604d44d014385869f78562dc9", 0xa0, 0x0, 0x0, 0x2, r2}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x7, r3, &(0x7f00000003c0)="4fd6a5bd46a7c8be1f3ead57d05582675e8ba2297d8558f559fae283041bf01ef402d5b8a29ffa1ab15073fbe55f7484c09c87e4a9dc5aa23fe39750c16ece12a958fa295d3ab68953f13ce35e9274336510a9fb50f1a49c75a3ddfba19252cb02fe392ef362e5bc6dda5df6a343e698a63f31d7a916", 0x76, 0x8, 0x0, 0x0, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x6, 0x7, r5, &(0x7f0000000500)="c293ad8b81cd8ad2e677229a41bf88e67f081eb547152d38f5422127f73170", 0x1f, 0xffffffffffffffc1, 0x0, 0x0, r6}]) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r7) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = memfd_create(&(0x7f0000000000)='[\\loem1systemem1.%selinux.\x00', 0x0) ioctl$KVM_GET_REGS(r9, 0x8090ae81, &(0x7f0000000040)) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:56 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x101) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x41f) r3 = shmget$private(0x0, 0x3000, 0x1, &(0x7f0000ffb000/0x3000)=nil) shmat(r3, &(0x7f0000ffc000/0x3000)=nil, 0x1000) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x721ee6ab, 0x4) r4 = socket$inet6(0xa, 0x6, 0x20e) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0x16, @empty, 0x4e21, 0x1, 'sh\x00', 0x24, 0x800, 0xa}, 0x2c) write$binfmt_misc(r2, &(0x7f0000000140)={'syz1', "905e17e27da3fc7ca9150ddde39293fa17430e6af1672b1ffb584f145d2e188dc1ba1035e1d744bd3bdf6cbc1834d3900e927d5b9f65a484965a91112d957a55d75a3cf04b42c05415c4e77453d122f1129b0a08db2d88a00b34697500774b98b6bd9cf2c10ce3513798bd68b931e052c18efa14d2dacbeba9ba1bd1e3bb55c70f01c850c0b665b8fb77761e33472ac00f19da945b9231840c5273ba79a41d50685d35e41b07fa08d327e2cf8be762ab237711c8f712dd"}, 0xbb) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)=0x10001) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000200)=0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000240)={0x0, 0x0}) kcmp(r5, r6, 0x0, r4, r2) 09:20:56 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240)=0x5, 0x4) r2 = getpid() r3 = dup(r0) r4 = perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x7, 0x4000000000000000, 0x2, 0x1338, 0x0, 0x8, 0x80, 0x4, 0x10000, 0x282, 0x7, 0x2, 0x7fffffff, 0xffffffffffff0000, 0x80, 0x1, 0x1ff, 0x6, 0x5e, 0x1, 0xd660000000000000, 0x401, 0x9, 0x101, 0x3, 0xd, 0x2, 0x1, 0x4, 0x4, 0x7fffffff, 0xffffffff8ae8bee8, 0x86, 0x0, 0x7, 0xf063, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x10, 0x5, 0x5b2d, 0x2, 0x20, 0x2, 0x20}, r2, 0xc, r3, 0xa) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000080000000000a004e220600000000000000000000000000000000000000ff0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000030000000a00000900000000fe80000000000000000000000000001805000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e220000000000000000000000000000ffffe000000104000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000a004e203d9a0000000000000000000000000000000000007c60ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x210) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000300)=[@in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e22, 0x4, @mcast1, 0x1}, @in6={0xa, 0x4e23, 0x5, @mcast1, 0x401}, @in={0x2, 0x4e22}], 0x58) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r5, &(0x7f0000000240), &(0x7f0000000100)}, 0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0xe, "fa6ff7988e078158d40a88148ae6"}, &(0x7f0000000200)=0x16) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r5, 0x0, &(0x7f0000000380)=""/61}, 0x18) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r5, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x4e21, 0x1, @loopback, 0x7}, {0xa, 0x4e23, 0x3, @mcast1, 0x4ffd}, 0xffffffffffffcdfd, [0x800, 0x16, 0x6, 0x1, 0x70, 0x5, 0x7fffffff, 0x3ff]}, 0x5c) [ 502.029591] FAULT_INJECTION: forcing a failure. [ 502.029591] name failslab, interval 1, probability 0, space 0, times 0 [ 502.040995] CPU: 0 PID: 12903 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 502.048313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.057704] Call Trace: [ 502.061274] dump_stack+0x306/0x460 [ 502.064979] should_fail+0x1170/0x1350 [ 502.068985] __should_failslab+0x278/0x2a0 [ 502.073290] should_failslab+0x29/0x70 09:20:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={"74000000000000000000f4ffffff00", &(0x7f0000000340)=@ethtool_flash={0x33, 0x2d9, "4afaff1a6b7e532f63646837ae1456996dc0f4774389b496f4bc7ff5c47568363209bde010836bdc917fb49410b4df86f1469b06feb58a660547046c55501f258b2ff612c8595afa4f171d5619d45e8f715630422bc3f0c5e8d50e1b4bd52e18770b65ade20e86d03bb3c8060542f8916242aeed860ff27bcd6bbeb56dcc73e0"}}) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x7) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x9, 0x4, 0x3}}, 0x14) [ 502.077242] kmem_cache_alloc+0x146/0xd50 [ 502.081474] ? skb_clone+0x4d2/0x7b0 [ 502.085263] ? __msan_poison_alloca+0x17a/0x210 [ 502.090013] skb_clone+0x4d2/0x7b0 [ 502.093633] br_flood+0xbee/0x10b0 [ 502.097282] br_dev_xmit+0x1441/0x1690 [ 502.101291] ? br_net_exit+0x230/0x230 [ 502.105266] dev_hard_start_xmit+0x6b8/0xdb0 [ 502.109815] __dev_queue_xmit+0x2e62/0x3d90 [ 502.114317] dev_queue_xmit+0x4b/0x60 [ 502.118242] ip_finish_output2+0x1308/0x14f0 [ 502.122738] ip_do_fragment+0x3810/0x3e90 [ 502.126955] ? ip_fragment+0x3f0/0x3f0 [ 502.130926] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 502.136419] ip_fragment+0x247/0x3f0 [ 502.140243] ip_finish_output+0xff3/0x10e0 [ 502.144562] ip_output+0x534/0x600 [ 502.148174] ? ip_mc_finish_output+0x440/0x440 [ 502.152884] ? ip_finish_output+0x10e0/0x10e0 [ 502.157437] ip_send_skb+0x178/0x350 [ 502.161219] udp_send_skb+0x10b9/0x18d0 [ 502.165321] udp_sendmsg+0x149a/0x4170 [ 502.169304] ? ip_copy_metadata+0x16a0/0x16a0 [ 502.173904] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 502.179216] ? kmsan_set_origin_inline+0x6b/0x120 [ 502.184157] ? kmsan_set_origin+0x83/0x140 [ 502.188467] udpv6_sendmsg+0x124d/0x48f0 [ 502.192683] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 502.198158] ? __msan_poison_alloca+0x17a/0x210 [ 502.202914] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 502.207321] inet_sendmsg+0x4d8/0x7f0 [ 502.211224] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 502.216706] ? security_socket_sendmsg+0x1bd/0x200 [ 502.221698] ? inet_getname+0x490/0x490 [ 502.225743] __sys_sendto+0x975/0xb70 [ 502.229741] ? syscall_return_slowpath+0x112/0x880 [ 502.234834] __se_sys_sendto+0x107/0x130 [ 502.239017] __x64_sys_sendto+0x6e/0x90 [ 502.243051] do_syscall_64+0xbe/0x100 [ 502.246930] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 502.252166] RIP: 0033:0x457569 [ 502.255415] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 502.274375] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 502.282162] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 502.289478] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 502.296799] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 502.304129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 502.311449] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:56 executing program 1: seccomp(0x1fc9afb3148b103c, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80000001, 0x5, 0x8, 0x1}, {0x3ff, 0x1ff, 0x80000001, 0x5}, {0x3, 0x5, 0x3, 0x5}, {0xffffffffffffff40, 0x20, 0x1, 0xffffffffffff0000}]}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:20:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r3, 0x30, 0x1, @in6={0xa, 0x4e21, 0x6da, @empty, 0x9}}}, 0xa0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:56 executing program 4 (fault-call:7 fault-nth:15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:56 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) write$binfmt_misc(r2, &(0x7f0000000040)={'syz0', "ed30a0716c6e266c2aabaae96c8b9af0ee878946afd68aa9c2706a3dfcdfa301c830bf6a260eb117c005ef8abf6fb8888242e9c4e503d00abe0e091171eabbbcfd5219aa284b81a2d2f00d4b99b64537222fec3ae1"}, 0x59) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, r4}]) 09:20:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000000c0)="7d7f8d22587ddaaa48f256c67cc397e20aa9eb53b486fadef4fa7d0ddb724bfcb6d8ebeebda1fe025082376e58a16161f6abe302b1a424cb9fe4bc5bb94f24c3b40d9a35a903bce1e8994b0c7f4a79f2c615da0239559717f6b65340", &(0x7f0000000200)="40390b8269945971192899725165e1d29b9e06dfdd2838c23ffa0b4a4a9a8e0446586255ac548f4982584b9423d56cafe1b1ed102fb6ec65050517b8458b47d85d5a28e40d2bb719bd16d8de6cb2076536f9e9cef3a6f2c9185003958934e39597895f82a2c78e7225626be431768803f90703fc42bc91e08682572a075e1735a8fc944b0499aecf473c5df6db65a9221eced08a8077f665d51a58f4f7fa"}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0xfffffffffffffdc5) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x128) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000140)=0x200, 0x4) 09:20:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100)='[\x00', 0xfffffffffffffffd) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) keyctl$assume_authority(0x10, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 502.965055] FAULT_INJECTION: forcing a failure. [ 502.965055] name failslab, interval 1, probability 0, space 0, times 0 [ 502.976443] CPU: 1 PID: 12935 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 502.983759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.993165] Call Trace: [ 502.995865] dump_stack+0x306/0x460 [ 502.999624] should_fail+0x1170/0x1350 [ 503.003608] __should_failslab+0x278/0x2a0 [ 503.007945] should_failslab+0x29/0x70 [ 503.011898] kmem_cache_alloc+0x146/0xd50 [ 503.016120] ? skb_clone+0x4d2/0x7b0 [ 503.019892] ? __msan_poison_alloca+0x17a/0x210 [ 503.024638] skb_clone+0x4d2/0x7b0 [ 503.028256] br_flood+0xbee/0x10b0 [ 503.031913] br_dev_xmit+0x1441/0x1690 [ 503.035895] ? br_net_exit+0x230/0x230 [ 503.039863] dev_hard_start_xmit+0x6b8/0xdb0 [ 503.044388] __dev_queue_xmit+0x2e62/0x3d90 [ 503.048833] dev_queue_xmit+0x4b/0x60 [ 503.052752] ip_finish_output2+0x1308/0x14f0 [ 503.057246] ip_do_fragment+0x3810/0x3e90 [ 503.061455] ? ip_fragment+0x3f0/0x3f0 [ 503.065432] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 503.070978] ip_fragment+0x247/0x3f0 [ 503.074835] ip_finish_output+0xff3/0x10e0 [ 503.079151] ip_output+0x534/0x600 [ 503.082773] ? ip_mc_finish_output+0x440/0x440 [ 503.087476] ? ip_finish_output+0x10e0/0x10e0 [ 503.092078] ip_send_skb+0x178/0x350 [ 503.095875] udp_send_skb+0x10b9/0x18d0 [ 503.100020] udp_sendmsg+0x149a/0x4170 [ 503.104004] ? ip_copy_metadata+0x16a0/0x16a0 [ 503.108669] ? kmsan_set_origin_inline+0x6b/0x120 09:20:57 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x1000000003) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) recvmmsg(r3, &(0x7f0000001a40)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)=""/185, 0xb9}}], 0x1, 0x7, &(0x7f0000001ac0)) close(r3) r5 = accept4(r2, 0x0, &(0x7f0000000340)=0xff92, 0x0) write$binfmt_misc(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="89"], 0x1) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 503.113622] ? kmsan_set_origin+0x83/0x140 [ 503.117928] udpv6_sendmsg+0x124d/0x48f0 [ 503.122144] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 503.127625] ? __msan_poison_alloca+0x17a/0x210 [ 503.132380] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 503.136787] inet_sendmsg+0x4d8/0x7f0 [ 503.140698] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 503.146176] ? security_socket_sendmsg+0x1bd/0x200 [ 503.151173] ? inet_getname+0x490/0x490 [ 503.155207] __sys_sendto+0x975/0xb70 [ 503.159146] ? syscall_return_slowpath+0x112/0x880 [ 503.164187] __se_sys_sendto+0x107/0x130 [ 503.168379] __x64_sys_sendto+0x6e/0x90 [ 503.172412] do_syscall_64+0xbe/0x100 [ 503.176279] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 503.181518] RIP: 0033:0x457569 [ 503.184768] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 503.203725] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:20:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8400, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x40000, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000001c0)={0x1, r2, 0x1}) r3 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1d}}, 0x5, 0x3, 0xff, 0xd, 0x3, 0x4c5c, 0x1000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) [ 503.211500] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 503.218812] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 503.226134] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 503.233446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 503.240760] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhci\x00', 0x404080, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa0000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0xa}, 0x5}}, 0x1, 0x7, 0xffffffffffffff7f, "8288ba7e31a7e9e107ecc3da0f74806243153109b062d3f5c0177a45e1c1733e2a90017251ba5acf3ad58fbd463c3a3bf904752afb73397558a89f1fd3e98c54c966027d95e3f77e7e594b349e6c9b2c"}, 0xd8) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$P9_RLOCK(r3, &(0x7f0000000040)={0x8, 0x35, 0x2, 0x3}, 0x8) [ 503.479895] QAT: Invalid ioctl [ 503.517248] QAT: Invalid ioctl 09:20:57 executing program 1: add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x178, 0xfffffffffffffffe) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8000004000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x4, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7fff, 0x201, 0x84, 0x101, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x3f, 0x8}, &(0x7f0000000180)=0x8) 09:20:57 executing program 4 (fault-call:7 fault-nth:16): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) 09:20:57 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) prctl$getreaper(0x9, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x2) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0xa5}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000340)={r4, @in={{0x2, 0x4e20}}, 0x732f, 0x3f}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = getegid() getgroups(0x1, &(0x7f0000000000)=[r5]) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101000, 0x0) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$KDGKBLED(r7, 0x4b64, &(0x7f00000000c0)) [ 503.830833] FAULT_INJECTION: forcing a failure. [ 503.830833] name failslab, interval 1, probability 0, space 0, times 0 [ 503.842214] CPU: 1 PID: 12963 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 503.849526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 503.858926] Call Trace: [ 503.861593] dump_stack+0x306/0x460 [ 503.865337] should_fail+0x1170/0x1350 [ 503.869329] __should_failslab+0x278/0x2a0 [ 503.873668] should_failslab+0x29/0x70 [ 503.877618] kmem_cache_alloc+0x146/0xd50 [ 503.881853] ? skb_clone+0x4d2/0x7b0 [ 503.885649] ? __msan_poison_alloca+0x17a/0x210 [ 503.890399] skb_clone+0x4d2/0x7b0 [ 503.894018] br_flood+0xbee/0x10b0 [ 503.897644] br_dev_xmit+0x1441/0x1690 [ 503.901606] ? br_net_exit+0x230/0x230 [ 503.905559] dev_hard_start_xmit+0x6b8/0xdb0 [ 503.910065] __dev_queue_xmit+0x2e62/0x3d90 [ 503.914498] dev_queue_xmit+0x4b/0x60 [ 503.918387] ip_finish_output2+0x1308/0x14f0 [ 503.922891] ip_do_fragment+0x3810/0x3e90 [ 503.927096] ? ip_fragment+0x3f0/0x3f0 [ 503.931058] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 503.936559] ip_fragment+0x247/0x3f0 [ 503.940349] ip_finish_output+0xff3/0x10e0 [ 503.944671] ip_output+0x534/0x600 [ 503.948286] ? ip_mc_finish_output+0x440/0x440 [ 503.952967] ? ip_finish_output+0x10e0/0x10e0 [ 503.957524] ip_send_skb+0x178/0x350 [ 503.961505] udp_send_skb+0x10b9/0x18d0 [ 503.965601] udp_sendmsg+0x149a/0x4170 [ 503.969589] ? ip_copy_metadata+0x16a0/0x16a0 [ 503.974237] ? kmsan_set_origin_inline+0x6b/0x120 [ 503.979180] ? kmsan_set_origin+0x83/0x140 [ 503.983495] udpv6_sendmsg+0x124d/0x48f0 [ 503.987714] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 503.993184] ? __msan_poison_alloca+0x17a/0x210 [ 503.997935] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 504.002384] inet_sendmsg+0x4d8/0x7f0 [ 504.006284] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.011765] ? security_socket_sendmsg+0x1bd/0x200 [ 504.016764] ? inet_getname+0x490/0x490 [ 504.020831] __sys_sendto+0x975/0xb70 [ 504.024776] ? syscall_return_slowpath+0x112/0x880 [ 504.029833] __se_sys_sendto+0x107/0x130 [ 504.034006] __x64_sys_sendto+0x6e/0x90 [ 504.038041] do_syscall_64+0xbe/0x100 [ 504.041909] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 504.047147] RIP: 0033:0x457569 [ 504.050398] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 504.069385] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 504.077215] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 504.084533] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 504.091858] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 504.099686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 504.107007] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) syncfs(r0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) fsetxattr(r0, &(0x7f00000000c0)=@random={'osx.', 'wlan1}*\x00'}, &(0x7f0000000100)='ecb(twofish)\x00', 0xd, 0x3) ptrace$getenv(0x4201, r1, 0xffffffffffffff3a, &(0x7f0000000040)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:20:58 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x100, 0x0) write$P9_RAUTH(r0, &(0x7f0000000040)={0xffffffeb, 0x67, 0x2, {0x40, 0xfffffffffffffffe, 0x4}}, 0x14) 09:20:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000000)=""/61}, 0x324) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffffffff18d2, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000100)) r2 = getuid() getgroups(0xa, &(0x7f0000000180)=[0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0x0, 0x0, 0xffffffffffffffff]) lchown(&(0x7f0000000140)='./file0\x00', r2, r3) 09:20:58 executing program 4 (fault-call:7 fault-nth:17): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:58 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0xaf, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/4, &(0x7f0000000040)=0x4) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 504.677289] FAULT_INJECTION: forcing a failure. [ 504.677289] name failslab, interval 1, probability 0, space 0, times 0 [ 504.688708] CPU: 0 PID: 12983 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 504.696022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.705411] Call Trace: [ 504.708076] dump_stack+0x306/0x460 [ 504.711777] should_fail+0x1170/0x1350 [ 504.715751] __should_failslab+0x278/0x2a0 [ 504.720048] should_failslab+0x29/0x70 [ 504.724001] kmem_cache_alloc+0x146/0xd50 [ 504.728212] ? skb_clone+0x4d2/0x7b0 [ 504.731983] ? __msan_poison_alloca+0x17a/0x210 [ 504.736725] skb_clone+0x4d2/0x7b0 [ 504.740340] br_flood+0xbee/0x10b0 [ 504.743975] br_dev_xmit+0x1441/0x1690 [ 504.747992] ? br_net_exit+0x230/0x230 [ 504.751956] dev_hard_start_xmit+0x6b8/0xdb0 [ 504.756498] __dev_queue_xmit+0x2e62/0x3d90 [ 504.760976] dev_queue_xmit+0x4b/0x60 [ 504.764901] ip_finish_output2+0x1308/0x14f0 [ 504.769391] ip_do_fragment+0x3810/0x3e90 [ 504.773597] ? ip_fragment+0x3f0/0x3f0 [ 504.777560] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 504.783062] ip_fragment+0x247/0x3f0 [ 504.786907] ip_finish_output+0xff3/0x10e0 [ 504.791228] ip_output+0x534/0x600 [ 504.794851] ? ip_mc_finish_output+0x440/0x440 [ 504.799539] ? ip_finish_output+0x10e0/0x10e0 [ 504.804087] ip_send_skb+0x178/0x350 [ 504.807883] udp_send_skb+0x10b9/0x18d0 [ 504.811993] udp_sendmsg+0x149a/0x4170 [ 504.815977] ? ip_copy_metadata+0x16a0/0x16a0 [ 504.820566] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 504.825895] ? kmsan_set_origin_inline+0x6b/0x120 [ 504.830865] ? kmsan_set_origin+0x83/0x140 [ 504.835181] udpv6_sendmsg+0x124d/0x48f0 [ 504.839392] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.844887] ? __msan_poison_alloca+0x17a/0x210 [ 504.849635] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 504.854046] inet_sendmsg+0x4d8/0x7f0 [ 504.857949] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 504.863380] ? security_socket_sendmsg+0x1bd/0x200 [ 504.868378] ? inet_getname+0x490/0x490 [ 504.872411] __sys_sendto+0x975/0xb70 [ 504.876341] ? syscall_return_slowpath+0x112/0x880 [ 504.881467] __se_sys_sendto+0x107/0x130 [ 504.885644] __x64_sys_sendto+0x6e/0x90 [ 504.889672] do_syscall_64+0xbe/0x100 [ 504.893549] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 504.898797] RIP: 0033:0x457569 [ 504.902059] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:20:58 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x108) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0xfffffffffffffffd, r0}, 0x2c) r2 = msgget(0x1, 0x85) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000440)={{0x1, r3, r4, r5, r6, 0x20, 0x4dc7048b}, 0xe73, 0x101, 0x431e, 0xad, 0x9, 0x7, r7, r8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:58 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 09:20:59 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x7) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="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", 0xffffffffffffffde) r3 = accept$alg(r1, 0x0, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000000c0)=0x8001, 0x1) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 504.921019] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 504.928787] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 504.936115] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 504.943428] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 504.950737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 504.958047] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:20:59 executing program 2: io_setup(0x1000048, &(0x7f0000000080)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:20:59 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x45, 0x100) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r2 = dup(0xffffffffffffffff) bind$xdp(r0, &(0x7f00000000c0)={0x2c, 0x5, r1, 0x24, r2}, 0x10) 09:20:59 executing program 4 (fault-call:7 fault-nth:18): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:20:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x0) keyctl$join(0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x1001}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x3, {0xa, 0x4e21, 0x0, @remote, 0x800}, r2}}, 0x38) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='cubic\x00', 0x6) [ 505.534261] FAULT_INJECTION: forcing a failure. [ 505.534261] name failslab, interval 1, probability 0, space 0, times 0 [ 505.545650] CPU: 0 PID: 13017 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 505.552969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.562357] Call Trace: [ 505.565037] dump_stack+0x306/0x460 [ 505.568738] should_fail+0x1170/0x1350 [ 505.572713] __should_failslab+0x278/0x2a0 [ 505.577015] should_failslab+0x29/0x70 [ 505.580971] kmem_cache_alloc+0x146/0xd50 [ 505.585180] ? skb_clone+0x4d2/0x7b0 [ 505.588959] ? __msan_poison_alloca+0x17a/0x210 [ 505.593706] skb_clone+0x4d2/0x7b0 [ 505.597318] br_flood+0xbee/0x10b0 [ 505.600953] br_dev_xmit+0x1441/0x1690 [ 505.604923] ? br_net_exit+0x230/0x230 [ 505.608893] dev_hard_start_xmit+0x6b8/0xdb0 [ 505.613401] __dev_queue_xmit+0x2e62/0x3d90 [ 505.617911] dev_queue_xmit+0x4b/0x60 [ 505.621836] ip_finish_output2+0x1308/0x14f0 [ 505.626332] ip_do_fragment+0x3810/0x3e90 [ 505.630539] ? ip_fragment+0x3f0/0x3f0 [ 505.634504] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 505.639998] ip_fragment+0x247/0x3f0 [ 505.643829] ip_finish_output+0xff3/0x10e0 [ 505.648153] ip_output+0x534/0x600 [ 505.651764] ? ip_mc_finish_output+0x440/0x440 [ 505.656442] ? ip_finish_output+0x10e0/0x10e0 [ 505.660998] ip_send_skb+0x178/0x350 [ 505.664788] udp_send_skb+0x10b9/0x18d0 [ 505.668904] udp_sendmsg+0x149a/0x4170 [ 505.672898] ? ip_copy_metadata+0x16a0/0x16a0 [ 505.677480] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 505.682789] ? kmsan_set_origin_inline+0x6b/0x120 [ 505.687732] ? kmsan_set_origin+0x83/0x140 [ 505.692042] udpv6_sendmsg+0x124d/0x48f0 [ 505.696258] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 505.701740] ? __msan_poison_alloca+0x17a/0x210 [ 505.706486] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 505.710909] inet_sendmsg+0x4d8/0x7f0 [ 505.714838] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 505.720315] ? security_socket_sendmsg+0x1bd/0x200 [ 505.725308] ? inet_getname+0x490/0x490 [ 505.729346] __sys_sendto+0x975/0xb70 [ 505.733284] ? syscall_return_slowpath+0x112/0x880 [ 505.738330] __se_sys_sendto+0x107/0x130 [ 505.742506] __x64_sys_sendto+0x6e/0x90 [ 505.746534] do_syscall_64+0xbe/0x100 [ 505.750409] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 505.755653] RIP: 0033:0x457569 [ 505.758922] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:20:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x9, 0x100000000, 0xfffffffefffffffd, 0x0, 0x4c6}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x454, 0x40000) ioctl$RTC_AIE_OFF(r1, 0x7002) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000100)="ec4f9b6837c96f1a6a018c3a2e3cff8aadee008097d94c7bd10a37d1b6b07f223ce742", &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:20:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0xfffffffffffffe7a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) close(r0) 09:20:59 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000000), 0x0, 0xfffffffffffffffe) [ 505.777886] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 505.785671] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 505.792987] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 505.800300] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 505.807645] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 505.814988] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) r1 = dup(r0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0x1125) 09:21:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x40000) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000140)={0x9, 0x2, 0xfffffffffffffff9, 0x3}) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x40800) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f00000000c0)={[{0x4c, 0x5, 0x7, 0x0, 0x1, 0x7, 0x8, 0xfffffffffffffffb, 0x9, 0x10001, 0x3, 0x7, 0x8}, {0x0, 0x827f, 0x4, 0x4d6, 0x1, 0xffffffff00000001, 0x3, 0x3, 0x2, 0x3, 0x8, 0x1f, 0x7fff}, {0xfffffffffffffffb, 0x8, 0xfffffffffffffffd, 0x3, 0x3, 0x6, 0x0, 0x3f, 0x2457202d, 0x20, 0x1000, 0x8000, 0x9}], 0x1}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000180)={0x3e, @multicast1, 0x4e24, 0x4, 'sh\x00', 0x8, 0x4, 0x6}, 0x2c) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:00 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000000)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x1, @loopback, 0x20}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x2, 0x9, 0x9, r4}, &(0x7f0000000240)=0x10) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:00 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x604900) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0xfffffffffffffffe, 0x1, 0x4}) 09:21:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) process_vm_writev(r2, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/188, 0xbc}, {&(0x7f0000000280)=""/220, 0xdc}, {&(0x7f0000000180)=""/104, 0x68}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/149, 0x95}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x7, &(0x7f0000000700)=[{&(0x7f0000000040)=""/26, 0x1a}, {&(0x7f0000000580)=""/19, 0x13}, {&(0x7f0000000640)=""/187, 0xbb}, {&(0x7f00000043c0)=""/4096, 0x1000}], 0x4, 0x0) write$binfmt_script(r1, &(0x7f0000000a00)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f00000009c0)={0x3f, 0x81, 0x7, 0xb8, &(0x7f0000000780)=""/184, 0x5c, &(0x7f0000000840)=""/92, 0xc4, &(0x7f00000008c0)=""/196}) openat$cgroup(r3, &(0x7f0000000a80)='syz1\x00', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) 09:21:00 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socketpair(0x1f, 0x2, 0x93, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000040)={'raw\x00', 0x95, "a3ce4657dad78dd7ab8e6ea531f696da2cd30db62e70256d6d99f2180e8ae6f6989a5cca01866fd974366340ad11cc54dfaef14c904d39e9bab1394d2750dc250dadeedb4a4c2ab0a809b80e746c03a1a8cb1aff32bb61ac0893526fe35cd7ee48ca4e2688e3fd071ff89f34a49bdf8b2034847ff073aadefbca465ba2d7c5d2dd1f34bd10a3a8f3fa47613be6ca029548ce10470a"}, &(0x7f0000000140)=0xb9) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x10001, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0)="12d9760ea0f09cee8f568493e44f0e00eb7aec075e0a7fc8a7715d16e58d5cfb84a79d304554d6292df6", &(0x7f0000000100), 0x4}, 0xfffffebe) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x2c80) ioctl$RTC_UIE_ON(r1, 0x7003) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xfff, 0x3, 0x6, 0x100, 0x3, 0x6, 0x20000000000000, 0x135, 0x40, 0x209, 0xce, 0x1f, 0x38, 0x2, 0x8000, 0x5, 0xf727}, [{0x60000005, 0x1, 0x7ff, 0x8, 0xfffffffffffffffa, 0x9, 0xd2}], "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", [[], [], [], [], [], [], [], [], [], []]}, 0x1a78) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:21:00 executing program 4 (fault-call:7 fault-nth:19): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:00 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x3, 0xc3, "18d0b224fedc9054a6cbac71463a589635ec9483b7cd443e5fbeb8146fa44a9cca80482cee3a09bbf8e2a5f74e286e37dd4b9d4f633a71a4053bfd8ae5a3b35a00f515fbc06cbb11944a20b4692c2b41743789264a84778d3102f0afc43e8f861be42506a01906706a77a07ee7ac7f2329218331312606594007bacf8ee1d35bbc6b0465d0af661222460ad06e9533fc22f788bcb8b897abcf90439719be11c6433e405112d3508755507eec455d6ecf611de7eba3c7b519437b1ee00b7c5ba30e5bf9"}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 506.732134] FAULT_INJECTION: forcing a failure. [ 506.732134] name failslab, interval 1, probability 0, space 0, times 0 [ 506.743548] CPU: 0 PID: 13061 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 506.750875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 506.760272] Call Trace: [ 506.762942] dump_stack+0x306/0x460 [ 506.766639] should_fail+0x1170/0x1350 [ 506.770606] __should_failslab+0x278/0x2a0 [ 506.774922] should_failslab+0x29/0x70 [ 506.778887] kmem_cache_alloc+0x146/0xd50 [ 506.783087] ? skb_clone+0x4d2/0x7b0 [ 506.786873] ? __msan_poison_alloca+0x17a/0x210 [ 506.791623] skb_clone+0x4d2/0x7b0 [ 506.795242] br_flood+0xbee/0x10b0 [ 506.798894] br_dev_xmit+0x1441/0x1690 [ 506.802916] ? br_net_exit+0x230/0x230 [ 506.806896] dev_hard_start_xmit+0x6b8/0xdb0 [ 506.811411] __dev_queue_xmit+0x2e62/0x3d90 [ 506.815863] dev_queue_xmit+0x4b/0x60 [ 506.819746] ip_finish_output2+0x1308/0x14f0 [ 506.824241] ip_do_fragment+0x3810/0x3e90 [ 506.828455] ? ip_fragment+0x3f0/0x3f0 [ 506.832422] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 506.837937] ip_fragment+0x247/0x3f0 [ 506.841763] ip_finish_output+0xff3/0x10e0 [ 506.846125] ip_output+0x534/0x600 [ 506.849737] ? ip_mc_finish_output+0x440/0x440 [ 506.854419] ? ip_finish_output+0x10e0/0x10e0 [ 506.858980] ip_send_skb+0x178/0x350 [ 506.862761] udp_send_skb+0x10b9/0x18d0 [ 506.866902] udp_sendmsg+0x149a/0x4170 [ 506.870925] ? ip_copy_metadata+0x16a0/0x16a0 [ 506.875588] ? kmsan_set_origin_inline+0x6b/0x120 [ 506.880534] ? kmsan_set_origin+0x83/0x140 [ 506.884864] udpv6_sendmsg+0x124d/0x48f0 [ 506.889081] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 506.894562] ? __msan_poison_alloca+0x17a/0x210 [ 506.899314] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 506.903725] inet_sendmsg+0x4d8/0x7f0 [ 506.907623] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 506.913091] ? security_socket_sendmsg+0x1bd/0x200 [ 506.918082] ? inet_getname+0x490/0x490 [ 506.922117] __sys_sendto+0x975/0xb70 [ 506.926055] ? syscall_return_slowpath+0x112/0x880 [ 506.931101] __se_sys_sendto+0x107/0x130 [ 506.935280] __x64_sys_sendto+0x6e/0x90 [ 506.939318] do_syscall_64+0xbe/0x100 [ 506.943188] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 506.948459] RIP: 0033:0x457569 [ 506.951714] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 506.970664] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{&(0x7f0000000000), 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/175, 0xaf}, {&(0x7f0000000280)=""/247, 0xf7}, {&(0x7f0000000180)=""/110, 0x6e}, {&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/143, 0x8f}], 0x6, &(0x7f0000000640)=""/131, 0x83, 0x100000000}, 0xffff}], 0x1, 0x21, &(0x7f0000000740)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dsp\x00', 0x500, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x14, &(0x7f00000007c0), &(0x7f0000000840)=0x4) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:00 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x80000000) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/llc\x00') openat$cgroup_type(r3, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 506.978441] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 506.985755] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 506.993066] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 507.000382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 507.007699] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x4000) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:21:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) dup2(r0, r0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:01 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x4) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x1, 0x1, 0x8}, 0x7ff}}, 0x18) 09:21:01 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000000)={0x1f, 0x437b75c1, 0x8200, 0x9, 0x79, 0x7fffffff, 0x5, 0x3ff, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e20, 0x0, @mcast1, 0x80000001}}, 0x9, 0x1, 0x8, 0x80000000, 0x80}, &(0x7f0000000080)=0x98) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r3) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x7f, 0x20000000000001, 0x0, 0x1}, 0x2c) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000100)}, 0x10) 09:21:01 executing program 4 (fault-call:7 fault-nth:20): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:01 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)="b9c9b77f2cfa8072615dfb8bd555880d23e83d7edb7e1c51ad8fbadfbd14345dbf5e9c33861befc33b89f1d0b08c0f46d42df793b54d000000000004000000", 0xfd84, 0xfffffffffffffffe) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x4a, "f89d9bcf412da44012180fe0e462fd8d16aad5e58a95ac15c660fd50c77cc58c7f127d950e5596d38309f5cddc759984b5356b40c10dbf1494a6640a5c711fcf050d78958c37b21975db"}, &(0x7f0000000100)=0x52) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1, 0x8000}, 0x8) [ 507.834143] FAULT_INJECTION: forcing a failure. [ 507.834143] name failslab, interval 1, probability 0, space 0, times 0 [ 507.845527] CPU: 1 PID: 13098 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 507.852848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 507.862324] Call Trace: [ 507.865003] dump_stack+0x306/0x460 [ 507.868718] should_fail+0x1170/0x1350 [ 507.872706] __should_failslab+0x278/0x2a0 [ 507.877013] should_failslab+0x29/0x70 [ 507.880961] kmem_cache_alloc+0x146/0xd50 [ 507.885168] ? skb_clone+0x4d2/0x7b0 [ 507.888935] ? __msan_poison_alloca+0x17a/0x210 [ 507.893679] skb_clone+0x4d2/0x7b0 [ 507.897298] br_flood+0xbee/0x10b0 [ 507.900935] br_dev_xmit+0x1441/0x1690 [ 507.904912] ? br_net_exit+0x230/0x230 [ 507.908868] dev_hard_start_xmit+0x6b8/0xdb0 [ 507.913372] __dev_queue_xmit+0x2e62/0x3d90 [ 507.917811] dev_queue_xmit+0x4b/0x60 [ 507.921730] ip_finish_output2+0x1308/0x14f0 [ 507.926224] ip_do_fragment+0x3810/0x3e90 [ 507.930432] ? ip_fragment+0x3f0/0x3f0 [ 507.934406] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 507.939911] ip_fragment+0x247/0x3f0 [ 507.943749] ip_finish_output+0xff3/0x10e0 [ 507.948061] ip_output+0x534/0x600 [ 507.951671] ? ip_mc_finish_output+0x440/0x440 [ 507.956361] ? ip_finish_output+0x10e0/0x10e0 [ 507.961112] ip_send_skb+0x178/0x350 [ 507.964930] udp_send_skb+0x10b9/0x18d0 [ 507.969037] udp_sendmsg+0x149a/0x4170 [ 507.973017] ? ip_copy_metadata+0x16a0/0x16a0 [ 507.977593] ? kmsan_save_stack_with_flags+0xd0/0x100 09:21:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x101, 0x301400) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0xd4, 0x10000, 0xa3, 0x8, 0x3, 0x3f, 0x6, 0x130, 0x38, 0x23b, 0x80000000, 0x0, 0x20, 0x1, 0x800, 0x3f, 0x7}, [{0x60000005, 0x2, 0x3, 0x5, 0x46015664, 0x4, 0x8, 0x4}], "a7b91fc990890d683b217a8a879df3cb1af7993f22bbf9a5789af2749400a6afafa027c1ed087548eb65af90780f7397a30397236eb6ba73c6ab831e7c37aa750bbda4c3cd8d9bb3a0672e423d13a552bd8eecb5242f557449fba9068eb6f129e26444a325ba3a3a96b27a89e8b68ad1fd6e0a08e0f96077a1bf82f937e1cca39615e6989ddc8269778a4984198f4786ed55aee3e40fe1c9d0d3573b0c5de072fc82f32eff517f1fb48c9112a683e2bc68febd0395858b21e2cffec0955b6cea3d2eb801eee0032c99fa0c756f6128a369b8f33033a821abc1c1557e8663f02203526a5eb6", [[]]}, 0x23d) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000040)={0x1, r1}) 09:21:02 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 09:21:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0xfffffffffffffc35) [ 507.982912] ? kmsan_set_origin_inline+0x6b/0x120 [ 507.987872] ? kmsan_set_origin+0x83/0x140 [ 507.992185] udpv6_sendmsg+0x124d/0x48f0 [ 507.996460] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 508.001948] ? __msan_poison_alloca+0x17a/0x210 [ 508.006712] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 508.011123] inet_sendmsg+0x4d8/0x7f0 [ 508.015019] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 508.020489] ? security_socket_sendmsg+0x1bd/0x200 [ 508.025480] ? inet_getname+0x490/0x490 [ 508.029519] __sys_sendto+0x975/0xb70 [ 508.033466] ? syscall_return_slowpath+0x112/0x880 [ 508.038515] __se_sys_sendto+0x107/0x130 [ 508.042697] __x64_sys_sendto+0x6e/0x90 [ 508.046735] do_syscall_64+0xbe/0x100 [ 508.050610] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 508.055871] RIP: 0033:0x457569 [ 508.059138] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 508.078093] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 508.085882] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 508.093198] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 508.100514] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 508.107840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 508.116200] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:02 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) close(r2) 09:21:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) r1 = memfd_create(&(0x7f0000000100)='mime_type-!\x00', 0x5) ioctl$TIOCEXCL(r1, 0x540c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) 09:21:02 executing program 1: uname(&(0x7f0000000000)=""/113) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = dup(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) 09:21:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x10000, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:02 executing program 4 (fault-call:7 fault-nth:21): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:02 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x100, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) io_setup(0x48, &(0x7f0000000100)=0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r1, 0x0, &(0x7f0000000600)) close(r2) socket$inet6(0xa, 0xa, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) io_submit(r1, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r4 = geteuid() fstat(r1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f00000019c0)={0x4, 0x4b631e6f, 0x2, 0x6}, 0x10) write$FUSE_ENTRY(r3, &(0x7f0000000780)={0x90, 0x0, 0x2, {0x3, 0x3, 0x4, 0x3, 0x8, 0xffff, {0x2, 0xfff, 0x0, 0x1d7, 0x7fffffff, 0x9ae, 0x4, 0xbbc, 0xb6ed, 0xffffffff, 0x48, r4, r5, 0x100000001, 0x2e15770b}}}, 0x90) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000001a00)=ANY=[@ANYBLOB="180100001b4b9a278cd5f0650f54f9f61ac3bfbfb2e9867c6d125e55cc2b8b99bffcd3e3f1d8230f13dc7537b54f85c5539889a40e2d4f06f521c1d838df20b0035f2cb4a8082f0399aff3536e36d298d03f1c51738a2588f40b3fae86a9f423d30f43bb5edd53d832cc7dc3441da0824ec1cb74491faa336543d6dd33d32b8857e7908b8b09cef269e2083069b36d500959ff81852f387aa4ba5a3074ab25fcabf7e2063a13acc6e647f872e2732f981a1bcff8a1731e50bf1b66f9a0f43a829ecb50e5273dc4225e0d44aa47fbfa4fa888b0f2d14ad3d01ef172f8ecc74207a71fadc93ea0e52296772bcf7291c174db05ec84b7672f1dbb71f0f955ac9b77043758d2f111bed79d", @ANYRES16=r2, @ANYBLOB="00082cbd7000fbdbdf250d000000080004007f0000004000030014000600ff020000000000000000000000000001080004007f000000080008000200000008000500ac1414110800030003000000080007004e20000030000300080008000100000008ff000000000000080005000000000014000600fe8000000000000000000000000000bb480001000c00070002000000010000000c000700100000001400000008000100020000000c00070008000000100000000c00070020000000100000000c00070009000000200000000800040001ffffff34000200080004000800000008000800030000000800080092e90000080008000800000008000800f72d0000080002004e230000080005000000000068fe70ff56a092f5e329547a15494f45560202287d36fa9b51940e66bcfbbbd5f132a8cc9cdfee75dbbf11401dff45e711eef8418c84af7d8d67d6c1993c67fa830000"], 0x118}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000000c0)="58871df22dadf75e2164f3a06bac6b4dfd9169730e6ee2bfd02a66ec8275a0250c2ff661fb035d5d684854ac620f29de74061a7d1981082ba1f40ca80e58aa7ac0fa49b3e53267d55211c66c1c3da971f261cf8d122a7d403695dfd3f440b8f6aa33e7166a8b4d53384cc0298afb4b91212e759be2e557b13466fa27bd537cbf74c8e97d6e28f4f49804dd9207464041de70d94f87828c52a51cc5a1a26b6e382d5b0761df466c8673bf1d73", &(0x7f0000000180), 0x1}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x6}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000500)={r6, @in={{0x2, 0x4e24}}, [0x1000, 0x2, 0xef, 0x1f, 0x8, 0x7fff, 0x1000, 0x6, 0x0, 0xa96, 0x1, 0x9, 0xffffffffffffff01, 0xffffffffffff8000, 0x3]}, &(0x7f00000003c0)=0x100) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000700)={r0, &(0x7f00000001c0)="50decc1fc11e9b1c6d381402cf0fc01c9bd38c6b9e5dfbe3142174d769a02c5089e7bb949ca250572ede60dab4cae073af534082df3a88c22ca12a344ff5e841f0a1315365394a026c8dbefbb0a9ff702e13ca8792477c5d5426b0ed80a4c95d27caccdfff6aac", &(0x7f0000000240)="4bd06f4be7e3d5527b2f8b7bb3f01ac3749f392e1deeaf658646bfe14296d0e3c30536d4aa1e128ddb0a9cc014a6f79be1fb2d71231f117691dfa5ff1c64b2d1e8334fe011212139701887017a8f766056f08ade1770562deeefef87e58bc746fc88ecc37f3828c0a778840019639baf9842769f736199d977913edf4ab4871609684965e0ad6b9b5d87ab15fc1cd8b503f9e5a786500b0330", 0x1}, 0x20) setsockopt$inet_dccp_buf(r1, 0x21, 0xc0, &(0x7f00000009c0)="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", 0x1000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x1f3) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000640)={0x40000000000001d6, &(0x7f0000000600)=[0x0]}) 09:21:02 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x5, 0x0, 0x6, 0x400, 0x101}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 508.930494] FAULT_INJECTION: forcing a failure. [ 508.930494] name failslab, interval 1, probability 0, space 0, times 0 [ 508.941975] CPU: 0 PID: 13137 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 508.949292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 508.958685] Call Trace: [ 508.961350] dump_stack+0x306/0x460 [ 508.965047] should_fail+0x1170/0x1350 [ 508.969019] __should_failslab+0x278/0x2a0 [ 508.973319] should_failslab+0x29/0x70 [ 508.977275] kmem_cache_alloc+0x146/0xd50 [ 508.981485] ? skb_clone+0x4d2/0x7b0 [ 508.985260] ? __msan_poison_alloca+0x17a/0x210 [ 508.990008] skb_clone+0x4d2/0x7b0 [ 508.993628] br_flood+0xbee/0x10b0 [ 508.997268] br_dev_xmit+0x1441/0x1690 [ 509.001245] ? br_net_exit+0x230/0x230 [ 509.005214] dev_hard_start_xmit+0x6b8/0xdb0 [ 509.009727] __dev_queue_xmit+0x2e62/0x3d90 [ 509.014148] dev_queue_xmit+0x4b/0x60 [ 509.018036] ip_finish_output2+0x1308/0x14f0 [ 509.022621] ip_do_fragment+0x3810/0x3e90 [ 509.026842] ? ip_fragment+0x3f0/0x3f0 [ 509.030832] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 509.036338] ip_fragment+0x247/0x3f0 [ 509.040173] ip_finish_output+0xff3/0x10e0 [ 509.044493] ip_output+0x534/0x600 [ 509.048138] ? ip_mc_finish_output+0x440/0x440 [ 509.052844] ? ip_finish_output+0x10e0/0x10e0 [ 509.057422] ip_send_skb+0x178/0x350 [ 509.061213] udp_send_skb+0x10b9/0x18d0 [ 509.065316] udp_sendmsg+0x149a/0x4170 [ 509.069299] ? ip_copy_metadata+0x16a0/0x16a0 [ 509.073899] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 509.079216] ? kmsan_set_origin_inline+0x6b/0x120 [ 509.084173] ? kmsan_set_origin+0x83/0x140 [ 509.088488] udpv6_sendmsg+0x124d/0x48f0 [ 509.092893] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 509.098368] ? __msan_poison_alloca+0x17a/0x210 [ 509.103119] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 509.107524] inet_sendmsg+0x4d8/0x7f0 [ 509.111433] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 509.116926] ? security_socket_sendmsg+0x1bd/0x200 [ 509.121922] ? inet_getname+0x490/0x490 [ 509.125959] __sys_sendto+0x975/0xb70 [ 509.129914] ? syscall_return_slowpath+0x112/0x880 [ 509.134962] __se_sys_sendto+0x107/0x130 [ 509.139137] __x64_sys_sendto+0x6e/0x90 [ 509.143172] do_syscall_64+0xbe/0x100 [ 509.147039] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 509.152279] RIP: 0033:0x457569 [ 509.155525] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x40) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000000c0)={{0x3b, @dev={0xac, 0x14, 0x14, 0xf}, 0x4e24, 0x2, 'fo\x00', 0x2c, 0x80000001, 0x1b}, {@remote, 0x4e21, 0x10003, 0x400000, 0x833}}, 0x44) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 509.174476] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 509.182251] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 509.189565] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 509.196890] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 509.204205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 509.211524] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:03 executing program 1: add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000000c0)="5745bf632bc02f9b51f5cf36429f017fd421742f82b1f743d51759c11ed2604ad88a81ca6d7451bda103b1f37a9d739d0f65375415186c61b48f69e291f145baacbd4b642cee5de6e0d351f83c17ea2542028fdf270707953d3db2c07c9dfab5d2606e2a1a9311d2cfd1c1905a2e7a07332553eda55e5c9eb09b20ff35b1eceb15dcbeaf91067e6a51ffdfb924205e29c5133a2c9248bd1bd4bc54ba8eb906f6b84b7c213727f6953b", 0x26a, 0xfffffffffffffffe) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x81, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x80, 0x40) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000040)={0x1, [0x1]}) 09:21:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x100000000000, 0x7c, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000100)=""/61}, 0x18) semget$private(0x0, 0x0, 0x21) 09:21:03 executing program 4 (fault-call:7 fault-nth:22): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_int(r1, 0x0, 0x1b, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:03 executing program 2: io_setup(0x8000000000049, &(0x7f0000000080)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) close(r1) r3 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000000)={0x2, 0x8, 0x3, 0x0, 0x0, [{r3, 0x0, 0xcd36}, {r3, 0x0, 0x2}, {r2, 0x0, 0xa}]}) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:03 executing program 3: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) prctl$getreaper(0x9, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x8, 0x2) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={0x0, 0xa5}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000340)={r4, @in={{0x2, 0x4e20}}, 0x732f, 0x3f}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = getegid() getgroups(0x1, &(0x7f0000000000)=[r5]) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101000, 0x0) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000180)) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$KDGKBLED(r7, 0x4b64, &(0x7f00000000c0)) 09:21:03 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x11) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0xff, 0x8}) [ 509.900928] FAULT_INJECTION: forcing a failure. [ 509.900928] name failslab, interval 1, probability 0, space 0, times 0 [ 509.912313] CPU: 1 PID: 13174 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 509.919639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 509.929027] Call Trace: [ 509.931697] dump_stack+0x306/0x460 [ 509.935440] should_fail+0x1170/0x1350 [ 509.939420] __should_failslab+0x278/0x2a0 [ 509.943733] should_failslab+0x29/0x70 [ 509.947687] kmem_cache_alloc+0x146/0xd50 [ 509.951903] ? skb_clone+0x4d2/0x7b0 [ 509.955679] ? __msan_poison_alloca+0x17a/0x210 [ 509.960560] skb_clone+0x4d2/0x7b0 [ 509.964164] br_flood+0xbee/0x10b0 [ 509.967798] br_dev_xmit+0x1441/0x1690 [ 509.971780] ? br_net_exit+0x230/0x230 [ 509.975744] dev_hard_start_xmit+0x6b8/0xdb0 [ 509.980293] __dev_queue_xmit+0x2e62/0x3d90 [ 509.984735] dev_queue_xmit+0x4b/0x60 [ 509.988607] ip_finish_output2+0x1308/0x14f0 [ 509.993102] ip_do_fragment+0x3810/0x3e90 [ 509.997317] ? ip_fragment+0x3f0/0x3f0 [ 510.001289] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 510.006786] ip_fragment+0x247/0x3f0 [ 510.010623] ip_finish_output+0xff3/0x10e0 [ 510.014943] ip_output+0x534/0x600 [ 510.018557] ? ip_mc_finish_output+0x440/0x440 [ 510.023244] ? ip_finish_output+0x10e0/0x10e0 [ 510.027797] ip_send_skb+0x178/0x350 [ 510.031591] udp_send_skb+0x10b9/0x18d0 [ 510.035654] udp_sendmsg+0x149a/0x4170 [ 510.039602] ? ip_copy_metadata+0x16a0/0x16a0 [ 510.044254] ? kmsan_set_origin_inline+0x6b/0x120 [ 510.049202] ? kmsan_set_origin+0x83/0x140 [ 510.053519] udpv6_sendmsg+0x124d/0x48f0 [ 510.057749] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.063226] ? __msan_poison_alloca+0x17a/0x210 [ 510.067983] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 510.072373] inet_sendmsg+0x4d8/0x7f0 [ 510.076276] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.081748] ? security_socket_sendmsg+0x1bd/0x200 [ 510.086846] ? inet_getname+0x490/0x490 [ 510.090894] __sys_sendto+0x975/0xb70 [ 510.094847] ? syscall_return_slowpath+0x112/0x880 [ 510.099895] __se_sys_sendto+0x107/0x130 [ 510.104033] __x64_sys_sendto+0x6e/0x90 [ 510.108069] do_syscall_64+0xbe/0x100 [ 510.111940] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 510.117180] RIP: 0033:0x457569 [ 510.120428] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 510.139389] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 510.147169] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 510.154486] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 510.161799] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 510.169126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 510.176457] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:04 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) dup3(r0, r0, 0x80000) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000240)=""/124) add_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x7b0238d0a1ac0c8f, 0xfffffffffffffffe) [ 510.381695] Unknown ioctl -2143271643 [ 510.410181] Unknown ioctl -2143271643 09:21:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fd094258c42e27d06000000288a", 0xff8f) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0xdc92, 0x4800) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000002c0)=0x1562, &(0x7f0000000300)=0x1) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[@ANYRES32=r0], 0x4) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) fcntl$notify(r1, 0x402, 0x24) 09:21:04 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_setup(0x6757, &(0x7f0000000000)=0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) close(r0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x100, 0xffffffffffff561b}) socket$inet6(0xa, 0x1, 0x10001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r1, 0x200000000000010f, &(0x7f0000000b00)) 09:21:04 executing program 4 (fault-call:7 fault-nth:23): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:04 executing program 3: add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x178, 0xfffffffffffffffe) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8000004000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040)=0x4, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7fff, 0x201, 0x84, 0x101, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x3f, 0x8}, &(0x7f0000000180)=0x8) [ 510.789813] FAULT_INJECTION: forcing a failure. [ 510.789813] name failslab, interval 1, probability 0, space 0, times 0 [ 510.801252] CPU: 0 PID: 13201 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 510.808567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 510.817955] Call Trace: [ 510.820628] dump_stack+0x306/0x460 [ 510.824364] should_fail+0x1170/0x1350 [ 510.828341] __should_failslab+0x278/0x2a0 [ 510.832642] should_failslab+0x29/0x70 [ 510.836598] kmem_cache_alloc+0x146/0xd50 [ 510.840807] ? skb_clone+0x4d2/0x7b0 [ 510.844601] ? __msan_poison_alloca+0x17a/0x210 [ 510.849346] skb_clone+0x4d2/0x7b0 [ 510.852959] br_flood+0xbee/0x10b0 [ 510.856598] br_dev_xmit+0x1441/0x1690 [ 510.860567] ? br_net_exit+0x230/0x230 [ 510.864529] dev_hard_start_xmit+0x6b8/0xdb0 [ 510.869033] __dev_queue_xmit+0x2e62/0x3d90 [ 510.873460] dev_queue_xmit+0x4b/0x60 [ 510.877327] ip_finish_output2+0x1308/0x14f0 [ 510.881814] ip_do_fragment+0x3810/0x3e90 [ 510.886074] ? __msan_poison_alloca+0x17a/0x210 [ 510.890849] ? ip_fragment+0x3f0/0x3f0 [ 510.894834] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 510.900340] ip_fragment+0x247/0x3f0 [ 510.904165] ip_finish_output+0xff3/0x10e0 [ 510.908481] ip_output+0x534/0x600 [ 510.912094] ? ip_mc_finish_output+0x440/0x440 [ 510.916774] ? ip_finish_output+0x10e0/0x10e0 [ 510.921329] ip_send_skb+0x178/0x350 [ 510.925111] udp_send_skb+0x10b9/0x18d0 [ 510.929211] udp_sendmsg+0x149a/0x4170 [ 510.933190] ? ip_copy_metadata+0x16a0/0x16a0 [ 510.937772] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 510.943081] ? kmsan_set_origin_inline+0x6b/0x120 [ 510.948025] ? kmsan_set_origin+0x83/0x140 [ 510.952333] udpv6_sendmsg+0x124d/0x48f0 [ 510.956543] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.962450] ? __msan_poison_alloca+0x17a/0x210 [ 510.967201] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 510.971608] inet_sendmsg+0x4d8/0x7f0 [ 510.975501] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 510.980974] ? security_socket_sendmsg+0x1bd/0x200 [ 510.985972] ? inet_getname+0x490/0x490 [ 510.990015] __sys_sendto+0x975/0xb70 [ 510.993963] ? syscall_return_slowpath+0x112/0x880 [ 510.999005] __se_sys_sendto+0x107/0x130 [ 511.003185] __x64_sys_sendto+0x6e/0x90 [ 511.007227] do_syscall_64+0xbe/0x100 [ 511.011100] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 511.016337] RIP: 0033:0x457569 [ 511.019589] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:04 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="d6e674d4eb80ae248cf8b62200f5384e30fa0526648d6d3eb2dc7bc7d35ed642fef7059adc33b69aa58e68de265863de376fd4109aec725a93c8de71a8e013c95751f5724ede7e9614f600dd3691d399fb4e965e3072c59252feab9eb036fb8bf4bb95532278194b", 0xfffffffffffffdff, 0xfffffffffffffffe) 09:21:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=@gettaction={0x28, 0x32, 0x801, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8}}]}]}, 0x28}}, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) ioctl$sock_ifreq(r2, 0x8923, &(0x7f0000000000)={'bond0\x00', @ifru_mtu=0x9}) 09:21:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 511.038546] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 511.046325] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 511.053641] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 511.060956] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 511.068271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 511.075589] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 511.257624] netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. 09:21:05 executing program 1: mq_unlink(&(0x7f0000000000)='rxrpc_s\x00') add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:05 executing program 2: io_setup(0x48, &(0x7f0000000000)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec04000000288a000000000000", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0x69) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x40000000000000, 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x183, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000000)=""/45, 0x2d}, 0xfffffffffffffffc) 09:21:05 executing program 4 (fault-call:7 fault-nth:24): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x2002, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000000c0)={0x31, 0x6, 0x0, {0x2, 0x6, 0x8, 0x0, 'rxrpc_s\x00'}}, 0x31) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x100000001) [ 511.706614] FAULT_INJECTION: forcing a failure. [ 511.706614] name failslab, interval 1, probability 0, space 0, times 0 [ 511.718042] CPU: 0 PID: 13229 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 511.725369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 511.734763] Call Trace: [ 511.737430] dump_stack+0x306/0x460 [ 511.741130] should_fail+0x1170/0x1350 [ 511.745105] __should_failslab+0x278/0x2a0 [ 511.749410] should_failslab+0x29/0x70 [ 511.753371] kmem_cache_alloc+0x146/0xd50 [ 511.757582] ? skb_clone+0x4d2/0x7b0 [ 511.761359] ? __msan_poison_alloca+0x17a/0x210 [ 511.766108] skb_clone+0x4d2/0x7b0 [ 511.769725] br_flood+0xbee/0x10b0 [ 511.773360] br_dev_xmit+0x1441/0x1690 [ 511.777331] ? br_net_exit+0x230/0x230 [ 511.781281] dev_hard_start_xmit+0x6b8/0xdb0 [ 511.785778] __dev_queue_xmit+0x2e62/0x3d90 [ 511.790225] dev_queue_xmit+0x4b/0x60 [ 511.794092] ip_finish_output2+0x1308/0x14f0 [ 511.798580] ip_do_fragment+0x3810/0x3e90 [ 511.802785] ? ip_fragment+0x3f0/0x3f0 [ 511.806757] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 511.812263] ip_fragment+0x247/0x3f0 [ 511.816053] ip_finish_output+0xff3/0x10e0 [ 511.820365] ip_output+0x534/0x600 [ 511.823977] ? ip_mc_finish_output+0x440/0x440 [ 511.828665] ? ip_finish_output+0x10e0/0x10e0 [ 511.833215] ip_send_skb+0x178/0x350 [ 511.836996] udp_send_skb+0x10b9/0x18d0 [ 511.841062] udp_sendmsg+0x149a/0x4170 [ 511.845004] ? ip_copy_metadata+0x16a0/0x16a0 [ 511.849653] ? kmsan_set_origin_inline+0x6b/0x120 [ 511.854594] ? kmsan_set_origin+0x83/0x140 [ 511.858916] udpv6_sendmsg+0x124d/0x48f0 [ 511.863129] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 511.868600] ? __msan_poison_alloca+0x17a/0x210 [ 511.873346] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 511.877753] inet_sendmsg+0x4d8/0x7f0 [ 511.881650] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 511.887108] ? security_socket_sendmsg+0x1bd/0x200 [ 511.892102] ? inet_getname+0x490/0x490 [ 511.896132] __sys_sendto+0x975/0xb70 [ 511.900068] ? syscall_return_slowpath+0x112/0x880 [ 511.905107] __se_sys_sendto+0x107/0x130 [ 511.909284] __x64_sys_sendto+0x6e/0x90 [ 511.913313] do_syscall_64+0xbe/0x100 [ 511.917181] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 511.922420] RIP: 0033:0x457569 [ 511.925669] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 511.944625] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:06 executing program 2: io_setup(0x8000000000000002, &(0x7f0000000200)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r2, 0x140}], 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400081) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000140)) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES32=r2, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESOCT=r1, @ANYBLOB="a6735b66de7c7d5c960811c690680025a9b3ad2e18d5d09f0819458ca6c5a7f162c15eaa1f3946091117dae5c73890d0289b204543a7", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=0x0], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESDEC=r1, @ANYRES32=r2, @ANYRESOCT=r0, @ANYPTR, @ANYPTR, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYRESDEC=r2, @ANYPTR], @ANYRESOCT=r2, @ANYRESDEC=r0, @ANYRESHEX=r2, @ANYRESOCT=r0, @ANYRES64=r1]], 0x8dab62b9) write$P9_RLOCK(r1, &(0x7f00000000c0)={0x8, 0x35, 0x2}, 0x8) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000040)=0x1) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:06 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xffffffffffffffff) [ 511.952406] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 511.959718] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 511.967520] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 511.974846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 511.982173] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 512.014591] netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. 09:21:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}, {0x77359400}}) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:06 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xffffffffffffffff) timer_create(0x4, &(0x7f00000000c0)={0x0, 0xc, 0x5, @thr={&(0x7f0000000000)="978791e3", &(0x7f0000000040)="2d2c33371741debfdeee8559439539cd051b7956e63e658187f4d589f131378cd682866449a8085847921ad2a0f5d77c46d50b64b004debb4857475439d15984030e40d77acddc7df5ca51d572a9bdbe3d50263e587acc"}}, &(0x7f0000000100)) 09:21:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000380)=""/61}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:06 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200401, 0x0) r3 = getegid() getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000000200)=0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000280)=[r3, r4, r5]) openat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x7, 0x0, r6, 0x0, 0x0, 0x4000, 0x0, 0x0, r2}]) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0xc) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000300)=""/139, 0x8b}], 0x2) 09:21:06 executing program 4 (fault-call:7 fault-nth:25): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:06 executing program 1: [ 512.781455] FAULT_INJECTION: forcing a failure. [ 512.781455] name failslab, interval 1, probability 0, space 0, times 0 [ 512.792882] CPU: 1 PID: 13265 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 512.800205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.809604] Call Trace: [ 512.812282] dump_stack+0x306/0x460 [ 512.815993] should_fail+0x1170/0x1350 [ 512.819976] __should_failslab+0x278/0x2a0 [ 512.824280] should_failslab+0x29/0x70 [ 512.828237] kmem_cache_alloc+0x146/0xd50 [ 512.832443] ? skb_clone+0x4d2/0x7b0 [ 512.836222] ? __msan_poison_alloca+0x17a/0x210 [ 512.840975] skb_clone+0x4d2/0x7b0 [ 512.844599] br_flood+0xbee/0x10b0 [ 512.848230] br_dev_xmit+0x1441/0x1690 [ 512.852202] ? br_net_exit+0x230/0x230 [ 512.856159] dev_hard_start_xmit+0x6b8/0xdb0 [ 512.860676] __dev_queue_xmit+0x2e62/0x3d90 [ 512.865111] dev_queue_xmit+0x4b/0x60 [ 512.868979] ip_finish_output2+0x1308/0x14f0 [ 512.873472] ip_do_fragment+0x3810/0x3e90 [ 512.877680] ? ip_fragment+0x3f0/0x3f0 [ 512.881676] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 512.887177] ip_fragment+0x247/0x3f0 [ 512.891003] ip_finish_output+0xff3/0x10e0 [ 512.895326] ip_output+0x534/0x600 [ 512.898959] ? ip_mc_finish_output+0x440/0x440 [ 512.903637] ? ip_finish_output+0x10e0/0x10e0 [ 512.908195] ip_send_skb+0x178/0x350 [ 512.911982] udp_send_skb+0x10b9/0x18d0 [ 512.916086] udp_sendmsg+0x149a/0x4170 [ 512.920076] ? ip_copy_metadata+0x16a0/0x16a0 [ 512.924656] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 512.929965] ? kmsan_set_origin_inline+0x6b/0x120 [ 512.934914] ? kmsan_set_origin+0x83/0x140 [ 512.939238] udpv6_sendmsg+0x124d/0x48f0 [ 512.943477] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 512.948957] ? __msan_poison_alloca+0x17a/0x210 [ 512.953799] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 512.958220] inet_sendmsg+0x4d8/0x7f0 [ 512.962131] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 512.967603] ? security_socket_sendmsg+0x1bd/0x200 [ 512.972597] ? inet_getname+0x490/0x490 [ 512.976635] __sys_sendto+0x975/0xb70 [ 512.980576] ? syscall_return_slowpath+0x112/0x880 [ 512.985619] __se_sys_sendto+0x107/0x130 [ 512.989800] __x64_sys_sendto+0x6e/0x90 [ 512.993855] do_syscall_64+0xbe/0x100 [ 512.997728] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 513.002968] RIP: 0033:0x457569 [ 513.006221] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x20, 0x208080) 09:21:07 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x200c0) write$apparmor_exec(r2, &(0x7f00000000c0)={'exec ', '/dev/md0\x00'}, 0xe) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair(0x1, 0x6, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x80, 0x4, 0x6}, 0x7f}}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 513.025177] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 513.032962] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 513.040280] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 513.047598] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 513.054918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 513.062229] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:07 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000140)={0x7, 0x7b, 0x1}, 0x7) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x206002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000040)) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/4096, 0xfebb}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:07 executing program 4 (fault-call:7 fault-nth:26): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:07 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r3 = memfd_create(&(0x7f0000000000)='/dev/md0\x00', 0x4) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x2) 09:21:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:07 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) r1 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x783b59c17a8a994a}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xc0, r2, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000001}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xb9}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x25}, @NBD_ATTR_CLIENT_FLAGS={0xc}]}, 0xc0}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) write$P9_RREAD(r0, &(0x7f0000000040)={0x8d, 0x75, 0x1, {0x82, "47a5fb0ccc060058122c3eea0327d36e29c21ba1c4ee5f9a67fc6a215b96ea98d917309a82e072fdbcfe838548a069db63b9ad8625ce9f6027d16c7d1bf49e5095d843a0651f47ec14b916ad00b966ca462092d7385b83826c6e300307d6bc42ab8ab98d18411f7ad85211849f94d382a62a293a4fc30c1b62732cbfb3abd26b9032"}}, 0x8d) keyctl$negate(0xd, r1, 0x9, r1) [ 513.765940] FAULT_INJECTION: forcing a failure. [ 513.765940] name failslab, interval 1, probability 0, space 0, times 0 [ 513.777349] CPU: 0 PID: 13294 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 513.784667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.794069] Call Trace: [ 513.796737] dump_stack+0x306/0x460 [ 513.800441] should_fail+0x1170/0x1350 [ 513.804414] __should_failslab+0x278/0x2a0 [ 513.808718] should_failslab+0x29/0x70 [ 513.812676] kmem_cache_alloc+0x146/0xd50 [ 513.816907] ? skb_clone+0x4d2/0x7b0 [ 513.820684] ? __msan_poison_alloca+0x17a/0x210 [ 513.825429] skb_clone+0x4d2/0x7b0 [ 513.829055] br_flood+0xbee/0x10b0 [ 513.832695] br_dev_xmit+0x1441/0x1690 [ 513.836667] ? br_net_exit+0x230/0x230 [ 513.840633] dev_hard_start_xmit+0x6b8/0xdb0 [ 513.845147] __dev_queue_xmit+0x2e62/0x3d90 [ 513.849579] dev_queue_xmit+0x4b/0x60 [ 513.853494] ip_finish_output2+0x1308/0x14f0 [ 513.857990] ip_do_fragment+0x3810/0x3e90 [ 513.862277] ? ip_fragment+0x3f0/0x3f0 [ 513.866243] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 513.871742] ip_fragment+0x247/0x3f0 [ 513.875564] ip_finish_output+0xff3/0x10e0 [ 513.879894] ip_output+0x534/0x600 [ 513.883511] ? ip_mc_finish_output+0x440/0x440 [ 513.888194] ? ip_finish_output+0x10e0/0x10e0 [ 513.892749] ip_send_skb+0x178/0x350 [ 513.896538] udp_send_skb+0x10b9/0x18d0 [ 513.900636] udp_sendmsg+0x149a/0x4170 [ 513.904619] ? ip_copy_metadata+0x16a0/0x16a0 [ 513.909208] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 513.914513] ? kmsan_set_origin_inline+0x6b/0x120 [ 513.919455] ? kmsan_set_origin+0x83/0x140 [ 513.923768] udpv6_sendmsg+0x124d/0x48f0 [ 513.928000] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 513.933475] ? __msan_poison_alloca+0x17a/0x210 [ 513.938222] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 513.942629] inet_sendmsg+0x4d8/0x7f0 [ 513.946528] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 513.952003] ? security_socket_sendmsg+0x1bd/0x200 [ 513.956994] ? inet_getname+0x490/0x490 [ 513.961449] __sys_sendto+0x975/0xb70 09:21:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 513.965393] ? syscall_return_slowpath+0x112/0x880 [ 513.970437] __se_sys_sendto+0x107/0x130 [ 513.974608] __x64_sys_sendto+0x6e/0x90 [ 513.978646] do_syscall_64+0xbe/0x100 [ 513.982521] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 513.987765] RIP: 0033:0x457569 [ 513.991012] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.009963] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 514.017746] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 514.025076] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 514.032398] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 514.039719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 514.047040] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:08 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000), 0x0, 0xffffffffffffffff) 09:21:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xa3, 0x180) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r2, 0x0, 0x3b5, &(0x7f00000000c0)='ecb(twofish)\x00', 0xffffffffffffffff}, 0x30) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:08 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40100) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x6000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:08 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x400) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000180)=[0xee00]) write$FUSE_CREATE_OPEN(r0, &(0x7f00000001c0)={0xa0, 0x0, 0x4, {{0x3, 0x3, 0x3f, 0x2, 0x20, 0x6, {0x0, 0x1, 0x8, 0xffff, 0x80000001, 0x40, 0x7ff, 0x0, 0x7fffffff, 0x8, 0x68adfbf2, r1, r2, 0x1, 0xead}}, {0x0, 0x2}}}, 0xa0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x100000000}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x2}, 0x8) recvmmsg(r0, &(0x7f0000001980)=[{{&(0x7f0000000500)=@rc, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)=""/82, 0x52}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2, &(0x7f0000001600)=""/112, 0x70, 0xfffffffffffff800}, 0x9}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001680)=""/168, 0xa8}, {&(0x7f0000001740)=""/157, 0x9d}, {&(0x7f0000001800)=""/236, 0xec}], 0x3, &(0x7f0000001940)=""/49, 0x31, 0x8}, 0x100000001}], 0x2, 0x2000, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x27, 0x0) r5 = shmget(0x1, 0x2000, 0x78000840, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000001a00)=""/57) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000440)="6af6fce6d7d151a36d0b0574876105b971d5e1af2b39b92afdb6b66fcba158a7539c3e55ee209a9ac1b0a492d71686875ccaad259a92d921dc526c7cca6754ef7566cbec8b49986b7c946cd2c5619265c8c737aafa3e5185b346ee3d09743bd9e4ef2c77066f564efaa5beb8c4c991306ca32a26f3d4ae510dc3bacf5aed30b2cce7a7ef4fccf081edd2b2ba4ea1b44ea3e93bbfe2bb3027a112e41e4a227ec87429", 0xa2) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000040)=0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280)=0x4, 0x4) 09:21:08 executing program 4 (fault-call:7 fault-nth:27): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(cbc-twofish-avx,sha3-224)\x00'}, 0x3a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) sendto$packet(r2, &(0x7f00000000c0)="278ec0e3a02e0154df48f7211fc8c3adc21fb1b308a4c9e6e7e7afe5184af83d20ae0badf6445f41d19e25a5ebe82b2740508655bf1d217f2f4c4c9dff2cee1290b833399f2c046a84025584d8e0d80e71736b958f0823b36f0cc2a417ea3710e0552cddc947d2", 0x67, 0x40, &(0x7f0000000580)={0x11, 0x15, r3, 0x1, 0xb3e, 0x6, @random="fdc60be37e02"}, 0x14) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:08 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 514.833738] FAULT_INJECTION: forcing a failure. [ 514.833738] name failslab, interval 1, probability 0, space 0, times 0 [ 514.845144] CPU: 1 PID: 13334 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 514.852459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.861854] Call Trace: [ 514.864527] dump_stack+0x306/0x460 [ 514.868256] should_fail+0x1170/0x1350 [ 514.872229] __should_failslab+0x278/0x2a0 [ 514.876532] should_failslab+0x29/0x70 [ 514.880484] kmem_cache_alloc+0x146/0xd50 [ 514.884693] ? skb_clone+0x4d2/0x7b0 [ 514.888461] ? __msan_poison_alloca+0x17a/0x210 [ 514.893199] skb_clone+0x4d2/0x7b0 [ 514.896830] br_flood+0xbee/0x10b0 [ 514.900465] br_dev_xmit+0x1441/0x1690 [ 514.904438] ? br_net_exit+0x230/0x230 [ 514.908389] dev_hard_start_xmit+0x6b8/0xdb0 [ 514.912942] __dev_queue_xmit+0x2e62/0x3d90 [ 514.917387] dev_queue_xmit+0x4b/0x60 [ 514.921287] ip_finish_output2+0x1308/0x14f0 [ 514.925796] ip_do_fragment+0x3810/0x3e90 [ 514.930009] ? ip_fragment+0x3f0/0x3f0 [ 514.933972] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 514.939469] ip_fragment+0x247/0x3f0 [ 514.943291] ip_finish_output+0xff3/0x10e0 [ 514.947603] ip_output+0x534/0x600 [ 514.951216] ? ip_mc_finish_output+0x440/0x440 [ 514.955911] ? ip_finish_output+0x10e0/0x10e0 [ 514.960469] ip_send_skb+0x178/0x350 [ 514.964253] udp_send_skb+0x10b9/0x18d0 [ 514.968351] udp_sendmsg+0x149a/0x4170 [ 514.972338] ? ip_copy_metadata+0x16a0/0x16a0 [ 514.976995] ? kmsan_set_origin_inline+0x6b/0x120 [ 514.981933] ? kmsan_set_origin+0x83/0x140 [ 514.986251] udpv6_sendmsg+0x124d/0x48f0 [ 514.990471] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 514.995960] ? __msan_poison_alloca+0x17a/0x210 [ 515.000710] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 515.005121] inet_sendmsg+0x4d8/0x7f0 [ 515.009023] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 515.014489] ? security_socket_sendmsg+0x1bd/0x200 [ 515.019483] ? inet_getname+0x490/0x490 [ 515.023519] __sys_sendto+0x975/0xb70 [ 515.027462] ? syscall_return_slowpath+0x112/0x880 [ 515.032502] __se_sys_sendto+0x107/0x130 [ 515.036674] __x64_sys_sendto+0x6e/0x90 [ 515.040712] do_syscall_64+0xbe/0x100 [ 515.044580] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 515.049818] RIP: 0033:0x457569 [ 515.053087] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.072063] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000004c0)=r0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f0000000300)=""/230, &(0x7f0000000400)=0xe6) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000180)=0x1, 0x4) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000440)) ppoll(&(0x7f00000001c0)=[{r0, 0x108}, {r3, 0x4}, {r3, 0x400}, {r2, 0x400}, {r0, 0x8020}, {r1, 0x208}, {r1, 0x408}], 0x7, &(0x7f0000000280)={0x0, 0x989680}, &(0x7f00000002c0)={0x8b4}, 0x8) 09:21:09 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x80) setsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000440)="83ea59b63cd101cc52c67366ad51ecdd1d2da008056ffb173f07f989de9dcfdb8092d3a0a17dd18852e88731759c28a02c22b3b733518104b8362c5ec68346f6881159288dd289d7db499354152af2bdd176da822981fc54e29c83b52ee7cb9c9b1ed90176d6ac9e83041c06e819b2da90a2e78e87a317cabb5fd3d56ff496f25518cccbb419be39ca8159e7157ab7160b8decc063bf329406e33c5db46e69354d4d80ec14f1b55d449338057bb9bcd3071c2db6a8cda0e531151eca07b48b3b89011dcb8556a23a122c9da79009016ceeb1ac743cbf36d8a6693a3a0c33210c78cde496fcae17139c711518a10a1a", 0xef) io_submit(r0, 0x0, &(0x7f0000000600)) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x100000001, 0x7fff, 0x9, 0x9, 0x100000001, 0x2, 0x2, {0x0, @in6={{0xa, 0x4e24, 0x91ca24f, @empty, 0x1}}, 0x3, 0x7, 0x0, 0x6, 0x6}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e24, 0x5, @mcast2, 0x2}}, 0x0, 0x7, 0xfff, 0xb19, 0x7f}, &(0x7f0000000140)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000300)=""/102, &(0x7f0000000180)=0x66) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:09 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffe, 0x400) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000040)={0xffffffff, 0x800, 0x3, 0x2, 0x100000000}) [ 515.079849] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 515.087162] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 515.094961] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 515.102271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 515.109588] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:09 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:09 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$cont(0xffffffffffffffff, r0, 0x5, 0x0) 09:21:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:09 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:09 executing program 4 (fault-call:7 fault-nth:28): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:09 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:09 executing program 1: r0 = add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="e58c7c2253fef81326f9189e466d0b9952b594e3fb0a330bb86c8f407bde80a94cf40ce212", 0x25, 0xfffffffffffffffb) add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="02b99fdca5678ab0b27197758e0a99ea98c4a423f14edac05f84dea96b0456ba4831c0800cd5d3720bbd7bed87a596400ae07c2f46ea34fc47d1a387bcb5f3b36e1572a0fc1b7263a996ad13a802e2a030dd86777ff3370df1177a35beeb86a298fa0a4b76e50b900c70d9e121943b8c5060969259e674ae7430cfb70a0e78944fc5535d380e5c6894b64e79b15fff41390460f7cd589f3e", 0x98, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000040), 0x4) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 515.821109] FAULT_INJECTION: forcing a failure. [ 515.821109] name failslab, interval 1, probability 0, space 0, times 0 [ 515.832511] CPU: 1 PID: 13367 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 515.839840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.849232] Call Trace: [ 515.851909] dump_stack+0x306/0x460 [ 515.855666] should_fail+0x1170/0x1350 [ 515.859646] __should_failslab+0x278/0x2a0 [ 515.863951] should_failslab+0x29/0x70 [ 515.867904] kmem_cache_alloc+0x146/0xd50 [ 515.872110] ? skb_clone+0x4d2/0x7b0 [ 515.875895] ? __msan_poison_alloca+0x17a/0x210 [ 515.880639] skb_clone+0x4d2/0x7b0 [ 515.884260] br_flood+0xbee/0x10b0 [ 515.887918] br_dev_xmit+0x1441/0x1690 [ 515.891909] ? br_net_exit+0x230/0x230 [ 515.895873] dev_hard_start_xmit+0x6b8/0xdb0 [ 515.900390] __dev_queue_xmit+0x2e62/0x3d90 [ 515.904843] dev_queue_xmit+0x4b/0x60 [ 515.908719] ip_finish_output2+0x1308/0x14f0 [ 515.913228] ip_do_fragment+0x3810/0x3e90 [ 515.917450] ? ip_fragment+0x3f0/0x3f0 [ 515.921428] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 515.926931] ip_fragment+0x247/0x3f0 [ 515.930760] ip_finish_output+0xff3/0x10e0 [ 515.935091] ip_output+0x534/0x600 [ 515.938711] ? ip_mc_finish_output+0x440/0x440 [ 515.943405] ? ip_finish_output+0x10e0/0x10e0 [ 515.947975] ip_send_skb+0x178/0x350 [ 515.951762] udp_send_skb+0x10b9/0x18d0 [ 515.955852] udp_sendmsg+0x149a/0x4170 [ 515.959812] ? ip_copy_metadata+0x16a0/0x16a0 [ 515.964560] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 515.969890] ? kmsan_set_origin_inline+0x6b/0x120 [ 515.974850] ? kmsan_set_origin+0x83/0x140 [ 515.979165] udpv6_sendmsg+0x124d/0x48f0 [ 515.983434] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 515.988926] ? __msan_poison_alloca+0x17a/0x210 [ 515.993680] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 515.998083] inet_sendmsg+0x4d8/0x7f0 [ 516.001986] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 516.007470] ? security_socket_sendmsg+0x1bd/0x200 [ 516.012467] ? inet_getname+0x490/0x490 [ 516.016677] __sys_sendto+0x975/0xb70 [ 516.020610] ? syscall_return_slowpath+0x112/0x880 [ 516.025660] __se_sys_sendto+0x107/0x130 [ 516.029850] __x64_sys_sendto+0x6e/0x90 [ 516.033902] do_syscall_64+0xbe/0x100 [ 516.037774] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 516.043027] RIP: 0033:0x457569 [ 516.046275] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 516.065241] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 516.073026] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 516.080347] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 516.087680] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 516.094999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 516.102320] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:10 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x10000, 0x0) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) io_setup(0x800, &(0x7f0000000080)=0x0) io_submit(r3, 0x4, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0xf4f, r0, &(0x7f0000000140)="b7452cc93f59349a5fa80957ec86c11b5230c1a950d4f1df756de3651ea1d16955e8e58859e7e934cc967a359f8ff5f14356431bd8e657806d92440254d42072dcd18299c4e0e4a165fbb132b1095d05c1d28e3d688ab66a4f66b1107daee2bd03c44ac121ed0c73e1498aa70dade41d8844267415323c4cdd2acb75724a2ab5ca6f89c054b7", 0x86, 0x0, 0x0, 0x2, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000200)="63e85ee0e7fa58959c1f11ceb6b036924e0bfdb31b22960fa116c8fe7b244e4798eb36008ea3afb7e4505d62dffdcbde7d6f7b7d821def97d9dd6897cf446e4e830ff26e71b44d72cdebcdcfe97ca6c5700d1b15c75b5f9bcba20e73849d148879f70f1d76068ef5a5275a653abc9fd4ca463752029db165f1164c2faeed2d91a1978276acde4d1cc283fc299959d210e7dcf6e501fbbd907fe1e03e7d173fc0d278bbd63752e5d86efaa2502f88f66d1b7d274867a454ec547b46", 0xbb, 0x2e75, 0x0, 0x0, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xf, 0x4, r2, &(0x7f0000000300)="4fe7e87d7f127f14542eca1567ba5029baafc30df3946f4cd0d99a6401950d8e251608d670304eaa54fdb600cb04009751f1364168072ddb063ba7ea2be60cef78f15324f9bb849a099427298243a28246aa7d8ae007308867ea0753e26b709fb75d7229d7ca67241b38cade3be90575f7ac8ea335a8bff973d1b25d4105fc3715ac44f5144daba54dda3ac9841b6d0acb6bf303fdc4738da786ff25445455f359485a067bf2", 0xa6, 0x9a, 0x0, 0x1, r0}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000000400)="404f583dc793e955c829655be4696dcc", 0x10, 0x8, 0x0, 0x2, r0}]) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0xc}) 09:21:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x2, 0x4) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:10 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x5, 0x4, [0x1, 0x5, 0xfff, 0x8000]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000300)={r5, @in={{0x2, 0x4e23, @remote}}, [0x7, 0x8f07, 0xf8f3, 0x5a, 0xffffffff, 0x1a37, 0x9, 0x8, 0x2, 0x3, 0x6, 0x0, 0x680, 0x10001, 0x7fffffff]}, &(0x7f00000000c0)=0x100) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x1, r1, 0x0, 0x312, 0x0, 0x0, 0x7, 0xffffffffffffff9c}]) 09:21:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x401, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:10 executing program 4 (fault-call:7 fault-nth:29): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:10 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x600000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000080)={r1, 0x2}) io_setup(0x48, &(0x7f0000000100)=0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r2, 0x0, &(0x7f0000000600)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) ptrace$getenv(0x4201, r4, 0xe7, &(0x7f0000000140)) getuid() close(r3) recvfrom$inet6(r0, &(0x7f0000000400)=""/143, 0x8f, 0x20, &(0x7f0000000180)={0xa, 0x4e23, 0x180000000, @ipv4={[], [], @multicast1}}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x21) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000300)="97d22e99e7e4dbd02a543fc86b1a0d77dbba0dfb5dba4a0201cf1616b7b73101d855a8e92d3a46673cd40c137a4d17f752204f99fc0a0519326866670e5555297d3bab1283067649da15af43545b2098fb6eceff3cf01fbb4af2b817d0a06c50067fe3a5c94968cb10da177ad07a4989edc2e93feb2ed5517fd7d7a44b31c93bd796c60fdd3b89d4b08c9b917fb7f6e02950d7c34889b4e8b56218093ba225f8c0f26b6bac7694dc6727da64ce54a9941e1adf8a213d0c43f566b06c85196387dabe147da7", 0xc5) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r2, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 516.919692] FAULT_INJECTION: forcing a failure. [ 516.919692] name failslab, interval 1, probability 0, space 0, times 0 [ 516.931104] CPU: 0 PID: 13403 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 516.938423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.947813] Call Trace: [ 516.950499] dump_stack+0x306/0x460 [ 516.954206] should_fail+0x1170/0x1350 [ 516.958181] __should_failslab+0x278/0x2a0 [ 516.962491] should_failslab+0x29/0x70 [ 516.966445] kmem_cache_alloc+0x146/0xd50 [ 516.970655] ? skb_clone+0x4d2/0x7b0 [ 516.974434] ? __msan_poison_alloca+0x17a/0x210 [ 516.979179] skb_clone+0x4d2/0x7b0 [ 516.982792] br_flood+0xbee/0x10b0 [ 516.986437] br_dev_xmit+0x1441/0x1690 [ 516.990409] ? br_net_exit+0x230/0x230 [ 516.994364] dev_hard_start_xmit+0x6b8/0xdb0 [ 516.998908] __dev_queue_xmit+0x2e62/0x3d90 [ 517.003342] dev_queue_xmit+0x4b/0x60 [ 517.007209] ip_finish_output2+0x1308/0x14f0 [ 517.011702] ip_do_fragment+0x3810/0x3e90 [ 517.015910] ? ip_fragment+0x3f0/0x3f0 [ 517.019893] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 517.025391] ip_fragment+0x247/0x3f0 [ 517.029216] ip_finish_output+0xff3/0x10e0 [ 517.033538] ip_output+0x534/0x600 [ 517.037161] ? ip_mc_finish_output+0x440/0x440 [ 517.041861] ? ip_finish_output+0x10e0/0x10e0 [ 517.046423] ip_send_skb+0x178/0x350 [ 517.050225] udp_send_skb+0x10b9/0x18d0 [ 517.054326] udp_sendmsg+0x149a/0x4170 [ 517.058279] ? ip_copy_metadata+0x16a0/0x16a0 [ 517.063668] ? kmsan_set_origin_inline+0x6b/0x120 [ 517.068615] ? kmsan_set_origin+0x83/0x140 [ 517.072932] udpv6_sendmsg+0x124d/0x48f0 [ 517.077147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.082637] ? __msan_poison_alloca+0x17a/0x210 [ 517.087386] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 517.091797] inet_sendmsg+0x4d8/0x7f0 [ 517.095895] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.101361] ? security_socket_sendmsg+0x1bd/0x200 [ 517.106352] ? inet_getname+0x490/0x490 [ 517.110386] __sys_sendto+0x975/0xb70 [ 517.114324] ? syscall_return_slowpath+0x112/0x880 [ 517.119358] __se_sys_sendto+0x107/0x130 [ 517.123535] __x64_sys_sendto+0x6e/0x90 [ 517.127565] do_syscall_64+0xbe/0x100 [ 517.131437] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 517.136674] RIP: 0033:0x457569 [ 517.139921] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.158884] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x0, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:11 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x5082002) r1 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000b00)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80)={'syz', 0x1}, r1) add_key(&(0x7f0000000180)="72787270635f7300acee5dfd7c49a2f674541e6d8f625a7b5390f7ea563f06be4e593c8f9a799b402a3fc19bea666bd59b5d596a0e25492c8b95908d584f30723f9616344717ec2ad7da64ad98d960bf4c1cb1dc81af790ef5fb8b29291ae7791cf175d2f4bad3957a984b6ed1b7d6557252f5f7b5ecadfb74ec14a05be703c7ff3fbc5264562a048c6823448cd7cfcdf4893a7777e8611fc20925cc8a81df11d0c32666abb6315a94ec841ca221d1d7b8d684fe1028", &(0x7f0000000400)={'syz'}, &(0x7f00000000c0)="ad3c47b64ff73b7683615857e4adde23814e6b6e0423f384216b37d9e0827df54689bb1b16ee32c31956e5ce69c5d691ebc45bb2ab8e3926ca06982c338c375dd0f02f650adcca656579707db7c6627242584975f8e514d086a02e98ba6eb8e515f8eed03edacf3ead89f2059265aab3ddf831ad3c85ed86b35ca18471aac52b06d85fd27dbc9f548d716492ad212056f7e446b39caa3b76ec5f7943a1bb13faabca8226", 0xa4, 0xffffffffffffffff) sched_yield() 09:21:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffff, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000140)={0x7, 0x33, 0x2}, 0x7) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x0) accept4$packet(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x14, 0x80000) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 517.166663] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 517.173982] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 517.181300] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 517.188617] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 517.195938] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:11 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)={r2, r3}) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r4) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000040)=0x6, 0x8) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:11 executing program 1: add_key(&(0x7f0000000040)="72787270635f73007f95119cc727fdfda8689bfcf3b2f8a95336fa1bab38e72e241d88b1fe2dca78d6dc180100ffff8566cfee36313414d0611e1869395347cc1f2b5071ef76496b0c29e1a35d541bc38a677663b819aa71cdbeeaef5246eb4de8e94900000000000000000000000000000000", &(0x7f0000000000)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x0, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:11 executing program 4 (fault-call:7 fault-nth:30): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 517.822622] FAULT_INJECTION: forcing a failure. [ 517.822622] name failslab, interval 1, probability 0, space 0, times 0 [ 517.834018] CPU: 1 PID: 13434 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 517.841329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.850727] Call Trace: [ 517.853400] dump_stack+0x306/0x460 [ 517.857097] should_fail+0x1170/0x1350 [ 517.861066] __should_failslab+0x278/0x2a0 [ 517.865377] should_failslab+0x29/0x70 [ 517.869334] kmem_cache_alloc+0x146/0xd50 [ 517.873545] ? skb_clone+0x4d2/0x7b0 [ 517.877317] ? __msan_poison_alloca+0x17a/0x210 [ 517.882116] skb_clone+0x4d2/0x7b0 [ 517.885729] br_flood+0xbee/0x10b0 [ 517.889372] br_dev_xmit+0x1441/0x1690 [ 517.893391] ? br_net_exit+0x230/0x230 [ 517.897338] dev_hard_start_xmit+0x6b8/0xdb0 [ 517.901901] __dev_queue_xmit+0x2e62/0x3d90 [ 517.906331] dev_queue_xmit+0x4b/0x60 [ 517.910247] ip_finish_output2+0x1308/0x14f0 [ 517.914740] ip_do_fragment+0x3810/0x3e90 [ 517.918942] ? ip_fragment+0x3f0/0x3f0 [ 517.922919] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 517.928425] ip_fragment+0x247/0x3f0 [ 517.932216] ip_finish_output+0xff3/0x10e0 [ 517.936533] ip_output+0x534/0x600 [ 517.940148] ? ip_mc_finish_output+0x440/0x440 [ 517.944844] ? ip_finish_output+0x10e0/0x10e0 [ 517.949409] ip_send_skb+0x178/0x350 [ 517.953207] udp_send_skb+0x10b9/0x18d0 [ 517.957309] udp_sendmsg+0x149a/0x4170 [ 517.961455] ? ip_copy_metadata+0x16a0/0x16a0 [ 517.966109] ? kmsan_set_origin_inline+0x6b/0x120 [ 517.971052] ? kmsan_set_origin+0x83/0x140 [ 517.975375] udpv6_sendmsg+0x124d/0x48f0 [ 517.979595] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 517.985074] ? __msan_poison_alloca+0x17a/0x210 [ 517.989818] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 517.994245] inet_sendmsg+0x4d8/0x7f0 [ 517.998144] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 518.003604] ? security_socket_sendmsg+0x1bd/0x200 [ 518.008596] ? inet_getname+0x490/0x490 [ 518.012626] __sys_sendto+0x975/0xb70 [ 518.016560] ? syscall_return_slowpath+0x112/0x880 [ 518.021606] __se_sys_sendto+0x107/0x130 [ 518.025779] __x64_sys_sendto+0x6e/0x90 [ 518.029838] do_syscall_64+0xbe/0x100 [ 518.033709] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 518.038953] RIP: 0033:0x457569 [ 518.042203] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.061151] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x0, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:12 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0xfffffffffffffdec) unshare(0x20400) fchdir(0xffffffffffffffff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:12 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x3, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r1, 0x27, "746de66c58cdb8c662ffc843ff47e4451382b7c553a565b90a9d87827224bd28d0dd1e99232982"}, &(0x7f0000000100)=0x2f) 09:21:12 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0x10c, 0x2, {"171845d5a61e22f541a2a15943117cde3b7622c6b81de2d90239baa7d8899e484e26259991d6b4574ca7e846543d560c8382d5ec089a07df4294421f71fb01141f92df8e07fdaedd69ede7f46972c1ddd0ffb02cbb4c5fbf98ae968aa15b4505b774d3d0357a49000ac2580dbdeb43800dcff68228aeb17c0c122063934dc233c77b24398109835071376aff25dc16f4ec247f81d65759096513989c532f8edd40f08faa4081b8c7e85bf24f426f450ef7ba4e62e22061379539c3a59549c3dd648e2454b8bcb97195bee8d9023f9536c989dea410fd6b7b1a73533f030cf47c2d7a260adceeb8c0563e9ee0c2c2e8bf4f216f47"}}, {0x0, "32f73120ba7c9f42046261f1b4aed9bb6bfe8e964a5e40a7d609781d8f8eb0bccd654a9dc23954b2e07c1a2b95dd11aad5f9a9a3a60aad576d4411988ef1a96bed2e28c6f07133162695f8b257266ce071ab2b735d7ef608c110f25a1cb43f93983f5c20e3c71eba4a842559b499e11e6468fa3bd48e4a94c6b0b22d08af385c54adce5f6bec2bd8cacea14bdb3a778e5f1e022575a83e51623fdace97b2799373aea8bd54be35e681283faa733ce8b4767079b99b63c041c483fe9bbc00064cbafa0cd352e0a424f436a95018e7c5b31486a7caad80ee3e100c8d10d8545098715a2c77ecdb3e8043daee7b756dff75dbad615113b75919d92e1632c57a0f4aac808382338f1873bffae3b869e9d03b550cef426a808b0500c510779dc4e2bc25a4c0a201b6c5dd887a0c4b0338bb636a27aa11c51421d6819f582206b47fbb495c66888d134a8479546df14fc2168d22c0d1ae131227fb7c0d448c59a92b0260b1a05f35c9a9edfcd8293730c2d26188dae1fe7a27d99b9885fa481f6cb6c3f767a2b4e2ad17e9dc15d6d7c79986ecb4a055b6a5c02982e44e507638e4d47e6da1b24544e7a33f6681d2ba5d9eaf2771dd9b8fb2be30f7c45227f0d72f8947730f1e0f433cbe05477bf7d16cf27a4f4cc5bc65e010cce7a40205a0d2409677302198c72d41ceb072d788b24a595dd3e8e292977711b7557430fe6efc4cc5597f41c1f9ed67e7e7f7191fa5dd05fbc71195db75d176fe5d82b6b4311a4c093273ea46b3e700c94fe2645335cb56809b2dba62a87b04f55a145103eaef143526de849bfe51c9211653ae197f2de3a3377ba09b05684fd53344c976dc3942ca498453e18b2bb2552b5eddfef93b33659700ef47ebbd75707ff775f6b8c6e17ea0c7d377a437cfd9b917b3b1902530178cbda10a48be8f04852deead64c87105731bdc674527d8d65017dd01a79da4c4452a99150fc33bef654f58dcee6e9c314867cefe7e57d0787b7be9abdb89b94dedb06d4af39d8ed185b6f9a9ff81a44ecffd1b2427510ce996b5464de1da49cff59532460e706b9230f04da61f64c3edd18290a0e655acf8397db4db72aae5003bc9f8fa5c5daea8ab6bf5b5dca6e352b6c11e682e56759af3942c07cd19e0001eb81ab5f333d53fda5b70752c891beff1f65a314f83b984393502cc7958ef8a11d440d6aeb6aae2fa4469e1def93c2d50b7fe22cf9481c3942d2781dfc50a7e1f5574964b0cb6b755f16e549cbd1def8a3bc09249a18253f9fa03c0faf08144e9c772e43cb859a55b5970d6b844a5eb61e92329975b09147ed99adffc27dffe2734ec8a7a584ed4525d5c6a5a51c8a625f6cbf84bd86c29ec3e79900db041feba2249cc78a5306c11007632cb48407c455552222ca0b577ad9a8cd071990791027052d1cae77b8ecde506bd85c5aec83d9747778bf513abf9b2c20703be14eb5fae1d2053a586a3bc8ca5a4b3a2342c744ae8073e991cb3ef2762c721ce21339e7b7e83493f225d3ff699ccd90daf57303f51e2e2350186b1b2e322bf86e6efd8d488f1a8613b0ff86a3470c9c51d490953953ac4169d92d914640fbee4f5043ee59373f44593df464be2599b2bcf3cf10a9c287e4cd60599ba45a320f33eb81d449e690d4d97dd674afdeeb00e26a8236e62703605d96ff80973f0049be8dc6701852992e7313c58474f76193ff128837b1678b52cae7a32305c56a58db65fa7143eb6b6c148eb2061343157ee2fe2c58e99ed04477fea83c5b20757fb5fcd39e65f9ae0bca53aa49b48f199e29f7bacdfd798f9a3becba6abe6ae5a2a89f3f3d6ad573ac6e578fb528fb076a0f05c522dac9c77241d011fa637812e6cef22dce295dba5cc6aa169e9d06248c61df130baa0a5d45628b91386437ba623dca5ec638660524ec73276fe5803878273b77169756f475559758cad46a61baec65813014ef19872be49fecfc940b5a136abc65c4ec2c96ae086737253af727c2bedf50bbf905c548bb060092f712d3be330ae7776edecc7d1d1136a177746a098387d64451126e1e8d4b461eb51e941c93894652454bd14abc66a80c92f3c23bd117ef81162846ce4036ca185f913c27d409b68a68758391441e624212f22d93319aa3772d6a65decda43f49c6a4cfce7c0b75d10f7f6ead023143e7b441879e1c6b0996a52f148781129031541ff23d0aeeabecff82fa7efd1b674e39c61b79eab7f9cfa2541a7902e0296d802c96fe935772e04c17c5b43173cf6ba42fc50572061838b6a8d4fe4f69e1943c94055eb193d34da115666f9c1e538055bc19b6ed2668e89c814cdf816013152fa484fda3aa3fb098c8ab426ae706096eb0ed7d4d52644df9701ecc8207d0d3f2cbd22d35c2d46eea2c55eda3c62432ceef7132bbb0537691f4f28d6ca3c47dae13c63e9a28b129e0927c373c2e81870a936de45081e27d9189a51f3f1124cd9655a0c5fae1c1b2090ae5a717dbdb145a5ed527b9a8539d1b4d4f0177c8ce412d23e488257870ca7a8dc80cce5e4b6e4a00634d94fc13c86a3de2726286a64b594830aa16441c6121f7e9fc3aa418659bacfb68378c2297585b978930f32eba63a8b919a6339198afe6cc19214f3b49d30fe283d231cd7c9e57e2195e7b284e753249bcb04ff391b850e4c1b8ba185c79ef3c948dff0eb8b15d83bdef51374e97cfbb2f8c100132a01ed31ce17bc38b380663871b71c38d7af59f455909741c3dfb22cc8058fc7eab4ed29a5dba6c088e64f99c8bfbfb4a740f18d90513bba47b3716bcb9c247aa6b074a99d637783eef68f02bcfca4d903377ce60c7191b258264b6c8a0c646ceaa3837bd7666465fc4ce186f954badcab7de4390bd287ed2272e1d0822912fb27be7ba6c22ae6a45b5972d780ffbbcc1ece89c4548146cf08cee1cf6d6eb4e59144b78aed90a83494f2b7411b205d5328968b62a32f4cc7806d7d4cf71ee169b0cebfceba7934541ac814bfaa449bacef305c599bd5088f1fe92de6e8f4812dcec0cf4e44aa262ec800cc05627c9e698b0ccd865d458eb7c6c7c2c478339ebfe3bbbcc80c9569f6114a34995d785dfa386ca97d60d1ae953b7cf0506de9e621fa530a9c0b92865183bf2f0a4c29881a317804d22044f4ea8ac83b3bb306f499c6fda6eb4e76894116094fdf3e322bae43ba7d6cbf9e95c97e36466a3c60f7ad658eeba2957dd2289e67fd2041b0504404eb8f4b9b5574a391b96fb4e2279ba87e70dbbe766d16b4db1a860c8b87617c1a77e65270ff72c18597bd5b790c115ad64691fd873d99b7783ead27d88b968dfe2b95ab7b00dd8299effe16ef383b7ee3d7f1fde060e0926c6dbff8e77c58b31d85bed74a475d46265911961632514255cbb0283f7f8ced30251e0735a93008d0ade7f677af0fdbc24c0a6e6aa342b0890aab90319fcbe771957d453d3b5c13459d3350d83f8110319ddccefd9791e7f9a52e3b9154854bc53aa42d738ac0af077875a084be166ea5a85afb0f4c63a4a03fc41f5dc1c9bc897e92831aa3f17faf9e3885e062ea73bd12bb48a03e4556af30ec4c847cd7484ae56fb7225999cf5dbe8341322dbe95075094c626d1773bf9f21535264216fc89e1533774a1db42e970fd6c0fb2285d674c8552a8b002072c8e2084b5e78360b715997a571de51591522d9e6f18f0f2ddc4ab37333cf7803181a76d11e065dace7a75f76baa14e7fbc811fdcf684d03044e3d4222fa788071992c810230ebb8a099309295d1fe6f11df9005a9854f94bb11f58b75ea8fc24c8837d58720e3a3cd7a8e268fc8f76b47156d4fc07d664c55efe274641ea40de2046beec90c939cd9455c86129843801855fec9119ae4a435f3208c22f4b78e70d6c7ba4babecdf6e72adbc77adb5eeb06dc52264ec7890834b430ab7b963d43a6c67451b4a58fcbef1ac19c0fe397dc258ae4d1d321113c43b35dda1087b9323675b8fd3b87f4255365ae0f0aeeca9b3fdc435791b2da0c5c41d073d683ba13f8f5b4ce299f33f66b62bc384d45e45c2aafbdf224bb10197fd7fd6da4fcb4ba47cf4c21c42408e5adbe4ece88481fb6bc0cd42c28683f7943d2f581f06539257d686886be51c291d8b5ac9c9837692f757eb9c8074f1714f5df4a99ea72bd5b5a3dd1743433dc7d36839cd170b788deee234b3d565a27d92cc907d5ecb46db4339124eafa00fd3b914e7caf1bcd1c293a0dcb5352652baf5eadb72b863db984cc97e3e499d8814ca53fa563652fd883c57cc3e695a87af2b79e11860b95e3ff85cfef6c130d3ea260191804613cca8726ebc3f859c5a89999abfa9b051e53322f19440a1a37ed74d6869a96761b8820c9807e04de92725eaaf31692c53528ce9781d22f742d8b71f584838ab2ee8ea4078153baecd0db05121fecc02ca2a0e76aff7805cfa93fce606b5a130741f280a27be27f0dad848dfeea10abe60bf7bee81f5f485d8830dd8e875a3f9fb483c035543963a93428475a3de0379cc8ba32117dba18403d4a986e9d74cc784bcbc27e2414c3033351b8c7ea06c0a0e8ba90f955045933a3f71f708c4fc2873b241a35436e1b6fda41421f75609c5693c435bbf22dee621dff354257d7144b7d3ec78ddce28c398314426bfdf6f40c5144911732d545e4dfe5529b9a071e15825a55466acbf74277c28da0876f59fea20aeacdd5d854b183933cef520d242f4d1fd8821baa5db8547b4ca6ef58b9e1ff02859d353528c3ac89597986ca817e24103faaf9a820e70d25c036262fff10e032256a7be308507c9cba2fd3bbfca3c47ed6625fc15b36d0e58371be457aaac08428f65b691df6f1c2d7e39ce91b9aa097278b2b76f0fb27948d2f5efb20c359c88cc5ea225302ed3a83aa16663d7d8114e4e1df7feec35046ca705c0b29c92cf60391ca55d8f71c290f6716b88f08c0af769dcd713cc1731d4ae2660e3027b060a182adda1c6d327c1a07bc0208d3bfc339b465ba252d8922e5049cf1c186f8c898f55f4126b016004ac5f8cf67ab853022c452702b900ca9121ba37ff3c273468de67b45b6084fa363dc1d368b170adb44f899393ac9ed32e1eaa68d9351e8d1ec6075f0442639a1108c4c52cdd9ba72c802611bdad13eaf40f79b0cd6275213a60f8a65bb2e25bf85d94e2a913beb6759112e643cde090626562a7ec10af6f69defa659db831455cc1a0c44bb8622e14db9746037b069506dcb0a3fbe50c36f3ea95d5afb1e86998a01a2e9be1f41fdd01e19a50f23dde24ca396e692d02e688fd459d53f98031ea735da7f026bbbad988f843953867b9a17e987c29e8af07f8795fd05cec4f240abc24ca5ade4bb7095f5cc1173509579c657e7f3aec18df1e4b76e8e0a627821818279596a1d52cb36cd1a22545a11cec834dcb9705066262977c8bba3df971c29ae5b66072ee69d7bd14486a5904991b2d94cb98d1eeb3087372677ab48b9127549c1bac90090b05fb952f239c74a7c0d1e73305f2f2e4b8a0ad7a700aac6813aeb0ea9225881b76a10cb71a822f0b3501d48a8194346c6353ee98325c06145f588634e9e0e2adf88b999f402300e50fcab72b626aa98a87e82eead23e449c2d9f4959bbde261030a28517e42084446cfa031a1fa9e5177684c0122057bb08812206f838a674ef4dadfa5a51c108d9690657b4529c2efe4a3f3e8a2305559438da4d2935d3f2227fab30cee00f6597f700acd6d78f7bd484670182f14508b2913ecce25712fe672d3c4275d515aa94291ed8da32287036"}}, &(0x7f0000000000)=""/17, 0x110e, 0x11, 0x1}, 0x20) [ 518.068925] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 518.076237] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 518.083554] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 518.090881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 518.098195] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x0, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:12 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xf3a7, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0x8, &(0x7f00000000c0)=[0x7, 0x6, 0x7056, 0x0, 0x6, 0x7ff, 0x800, 0x1000000], &(0x7f0000000100)=[0x6, 0x10000, 0x3f1, 0xca], 0x10, 0x5, 0x0, &(0x7f0000000140)=[0xffffffff, 0xe98d, 0x7, 0x88, 0x0], &(0x7f0000000180)=[0x100000000, 0x3, 0x700000000000000, 0x9]}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r3 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) getsockname$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000fc0)={@dev, @remote, 0x0}, &(0x7f0000001000)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001040)={0x0, @multicast2, @multicast1}, &(0x7f0000001080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001180)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001200)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007900)={0x0, @multicast2, @dev}, &(0x7f0000007940)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000007980)={@local, @broadcast, 0x0}, &(0x7f00000079c0)=0xc) getsockname$packet(r0, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a80)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000007ac0)={'ip6tnl0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007b00)={{{@in=@local, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000007c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000007cc0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007d00)={0x0, @loopback, @remote}, &(0x7f0000007d40)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000007d80)={@empty, 0x0}, &(0x7f0000007dc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000007f80)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000007fc0)={@local, 0x0}, &(0x7f0000008000)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000008040)={'bridge_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000008140)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000008180)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000008280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000082c0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000083c0)=0xe8) getsockname$packet(r0, &(0x7f0000008400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008440)=0x14) getsockname(r2, &(0x7f0000008480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008500)=0x80) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000008d80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000008d40)={&(0x7f00000023c0)=ANY=[@ANYBLOB="f8070000", @ANYRES16=r3, @ANYBLOB="000028bd7000fbdbdf250100000008000100", @ANYRES32=r4, @ANYBLOB="800002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000008000100", @ANYRES32=r7, @ANYBLOB="e400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000900000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400010000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004004d07000008000100", @ANYRES32=r9, @ANYBLOB="6801020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000900000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040002000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400de00000008000600", @ANYRES32=r10, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="500102004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000000000008000100", @ANYRES32=r15, @ANYBLOB="2802020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ffffff7f08000600", @ANYRES32=r16, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r17, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000080000000050000001000040062726f6164636173740000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400c2000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000008000100", @ANYRES32=r21, @ANYBLOB="7001020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r22, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b0000000800040038ed000008000600", @ANYRES32=r23, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000600000004000400080006001efbc72c04a69140d5da575b986f390178b0f50e96f8a0847baccc78b2d4b1a3855cafedb647e5a92bcdb96913d46ecc999d92f4ed71016e3065e65950be162fe3a5e6d2e5be1126d275b1e2cb95e282c14dc96d960907320155a00967be9cc7237acab2e4b87a264043c1986dedfb9d6b36340966ce08bb030818596e57bda360da9977bc10bbef0000000000000000", @ANYRES32=r24, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r25, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040000000000"], 0x7f8}, 0x1, 0x0, 0x0, 0xdfb45b60e28a20df}, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r26 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r26, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r26, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:12 executing program 4 (fault-call:7 fault-nth:31): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:12 executing program 1: r0 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="87d91584cbfa", 0x6, 0xfffffffffffffffa) socket$kcm(0x29, 0x5, 0x0) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440), 0x0, r0) 09:21:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x100, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) write$binfmt_script(r2, &(0x7f0000000740)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC=r2, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r1, @ANYRESOCT=0x0, @ANYPTR64, @ANYRES16=r0, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRESDEC=r1, @ANYRES64=r0, @ANYRES64, @ANYRES64=r0, @ANYRES32=r1]], @ANYRES64=r2, @ANYRESHEX, @ANYRESDEC, @ANYRESHEX=r1, @ANYRESOCT, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES32=r0, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRES32=r1, @ANYRES64=r2]], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRESHEX=r0], @ANYRES32=r0, @ANYRESHEX=r2, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYPTR, @ANYRES32=r0]], @ANYRESHEX=r2], 0x81) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0xc1, &(0x7f0000000380)=[{&(0x7f0000000540)=""/105}, {&(0x7f0000000640)=""/227}, {&(0x7f00000023c0)=""/4096}, {&(0x7f0000000800)=""/125}], 0x1, &(0x7f0000000880)=""/45, 0x2d, 0x401}, 0xffffffffffffeffc) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="e18df9065daa0512a343d8614cb78760117e917a057caf1f33c4", 0x1a) socket$alg(0x26, 0x5, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000100)) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) socket$alg(0x26, 0x5, 0x0) keyctl$setperm(0x5, r3, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) 09:21:12 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 518.686107] FAULT_INJECTION: forcing a failure. [ 518.686107] name failslab, interval 1, probability 0, space 0, times 0 [ 518.697512] CPU: 0 PID: 13460 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 518.704839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.714244] Call Trace: [ 518.716930] dump_stack+0x306/0x460 [ 518.720628] should_fail+0x1170/0x1350 [ 518.724595] __should_failslab+0x278/0x2a0 [ 518.728917] should_failslab+0x29/0x70 [ 518.732888] kmem_cache_alloc+0x146/0xd50 [ 518.737096] ? skb_clone+0x4d2/0x7b0 [ 518.740883] ? __msan_poison_alloca+0x17a/0x210 [ 518.745629] skb_clone+0x4d2/0x7b0 [ 518.749248] br_flood+0xbee/0x10b0 [ 518.752906] br_dev_xmit+0x1441/0x1690 [ 518.756894] ? br_net_exit+0x230/0x230 [ 518.760886] dev_hard_start_xmit+0x6b8/0xdb0 [ 518.765399] __dev_queue_xmit+0x2e62/0x3d90 [ 518.769854] dev_queue_xmit+0x4b/0x60 [ 518.773736] ip_finish_output2+0x1308/0x14f0 [ 518.778240] ip_do_fragment+0x3810/0x3e90 [ 518.782447] ? ip_fragment+0x3f0/0x3f0 09:21:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x0, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 518.786419] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 518.791932] ip_fragment+0x247/0x3f0 [ 518.795755] ip_finish_output+0xff3/0x10e0 [ 518.800073] ip_output+0x534/0x600 [ 518.803695] ? ip_mc_finish_output+0x440/0x440 [ 518.808385] ? ip_finish_output+0x10e0/0x10e0 [ 518.812944] ip_send_skb+0x178/0x350 [ 518.816729] udp_send_skb+0x10b9/0x18d0 [ 518.820820] udp_sendmsg+0x149a/0x4170 [ 518.824882] ? ip_copy_metadata+0x16a0/0x16a0 [ 518.829531] ? kmsan_set_origin_inline+0x6b/0x120 [ 518.834463] ? kmsan_set_origin+0x83/0x140 [ 518.838778] udpv6_sendmsg+0x124d/0x48f0 [ 518.843011] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 518.848497] ? __msan_poison_alloca+0x17a/0x210 [ 518.853246] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 518.857663] inet_sendmsg+0x4d8/0x7f0 [ 518.861563] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 518.867036] ? security_socket_sendmsg+0x1bd/0x200 [ 518.872034] ? inet_getname+0x490/0x490 [ 518.876071] __sys_sendto+0x975/0xb70 [ 518.880004] ? syscall_return_slowpath+0x112/0x880 [ 518.885048] __se_sys_sendto+0x107/0x130 [ 518.889225] __x64_sys_sendto+0x6e/0x90 [ 518.893264] do_syscall_64+0xbe/0x100 [ 518.897139] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 518.902382] RIP: 0033:0x457569 [ 518.905661] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.924612] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 518.932405] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 518.939726] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 518.947042] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 518.954355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 518.961675] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:13 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x81, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 09:21:13 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x2000000000000340, &(0x7f0000000b00)=[&(0x7f0000000040)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x200, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x0, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0xfffd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x244500, 0x0) mknodat(r2, &(0x7f0000000040)='./file0\x00', 0x8042, 0x16) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) socketpair(0x5, 0xa, 0x401, &(0x7f00000000c0)) 09:21:13 executing program 4 (fault-call:7 fault-nth:32): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:13 executing program 1: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r0 = add_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440), 0x0, r0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x80000001, 0x100) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000180)={0x1c, 0x35, 0x14, 0x1c, 0x8, 0x4000000000000, 0x3, 0x143, 0xffffffffffffffff}) 09:21:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r1, 0x4) r2 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x8, 0x20002) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r0, 0x0, 0x0) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:13 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 519.825042] FAULT_INJECTION: forcing a failure. [ 519.825042] name failslab, interval 1, probability 0, space 0, times 0 [ 519.836505] CPU: 1 PID: 13497 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 519.843858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.853257] Call Trace: [ 519.855926] dump_stack+0x306/0x460 [ 519.859630] should_fail+0x1170/0x1350 [ 519.863611] __should_failslab+0x278/0x2a0 [ 519.867923] should_failslab+0x29/0x70 [ 519.871888] kmem_cache_alloc+0x146/0xd50 [ 519.876090] ? skb_clone+0x4d2/0x7b0 [ 519.879872] ? __msan_poison_alloca+0x17a/0x210 [ 519.884617] skb_clone+0x4d2/0x7b0 [ 519.888234] br_flood+0xbee/0x10b0 [ 519.891882] br_dev_xmit+0x1441/0x1690 [ 519.895900] ? br_net_exit+0x230/0x230 [ 519.899864] dev_hard_start_xmit+0x6b8/0xdb0 [ 519.904413] __dev_queue_xmit+0x2e62/0x3d90 [ 519.908849] dev_queue_xmit+0x4b/0x60 [ 519.912717] ip_finish_output2+0x1308/0x14f0 [ 519.917207] ip_do_fragment+0x3810/0x3e90 [ 519.921422] ? ip_fragment+0x3f0/0x3f0 [ 519.925399] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 519.930906] ip_fragment+0x247/0x3f0 [ 519.934740] ip_finish_output+0xff3/0x10e0 [ 519.939063] ip_output+0x534/0x600 [ 519.942686] ? ip_mc_finish_output+0x440/0x440 [ 519.947383] ? ip_finish_output+0x10e0/0x10e0 [ 519.951935] ip_send_skb+0x178/0x350 [ 519.955724] udp_send_skb+0x10b9/0x18d0 [ 519.959847] udp_sendmsg+0x149a/0x4170 [ 519.963934] ? ip_copy_metadata+0x16a0/0x16a0 [ 519.968524] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 519.973844] ? kmsan_set_origin_inline+0x6b/0x120 [ 519.978787] ? kmsan_set_origin+0x83/0x140 [ 519.983108] udpv6_sendmsg+0x124d/0x48f0 [ 519.987318] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 519.992798] ? __msan_poison_alloca+0x17a/0x210 [ 519.997555] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 520.001968] inet_sendmsg+0x4d8/0x7f0 [ 520.005880] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 520.011347] ? security_socket_sendmsg+0x1bd/0x200 [ 520.016348] ? inet_getname+0x490/0x490 [ 520.020401] __sys_sendto+0x975/0xb70 [ 520.024346] ? syscall_return_slowpath+0x112/0x880 [ 520.029408] __se_sys_sendto+0x107/0x130 [ 520.033584] __x64_sys_sendto+0x6e/0x90 [ 520.037624] do_syscall_64+0xbe/0x100 [ 520.041503] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 520.046742] RIP: 0033:0x457569 [ 520.049992] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 520.068941] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 520.076724] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 520.084035] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 520.091362] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 520.099164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 520.106476] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:14 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x900, 0x0) ioctl$KVM_NMI(r0, 0xae9a) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000140)={r0, r0, 0x1, 0x80, &(0x7f0000000100)="cc85666fc8cbbfab4d3720fecf46dbe3", 0x0, 0xc1, 0xea, 0x4, 0xf86e, 0x9, 0x532f, "e39477d699619ea2f6ca4138223b538b6bf3a08a433c87c4b9dc4ed0f8f56238dcde901e75869bd20aec974ecea967cde2b2e0c2b10b87863ce10f751899468341aa03b0f3a84d5ea0313b7933081c7117690da075458228b9c034014be7be8496c572f8676261"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x6, 0x5, 0x101, 0x8000, 0x811, r1}) 09:21:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xc82}, &(0x7f0000000400)=0x8) getsockname$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0x6e) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r5, 0x80000000}, &(0x7f00000001c0)=0x8) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r9, 0x4400ae8f, &(0x7f0000000a40)={"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"}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x8, @mcast2, 0xd89}}, 0x4, 0x1, 0x9, 0x80000001, 0x96}, 0x98) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_RUN(r9, 0xae80, 0x0) getegid() ioctl$KVM_GET_DEBUGREGS(r9, 0x8400ae8e, &(0x7f0000000000)) getpeername$unix(r4, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) dup2(r8, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:14 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r3 = accept(r2, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000140)=0xfffffea2) 09:21:14 executing program 1: add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:14 executing program 4 (fault-call:7 fault-nth:33): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:15 executing program 2: io_setup(0x1, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0xa0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r3}) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) signalfd4(r4, &(0x7f00000000c0)={0x80000000}, 0x8, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400000, 0x0) write$P9_RRENAME(r1, &(0x7f0000000100)={0x7, 0x15, 0x1}, 0x7) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000f80)=[{{&(0x7f0000000140)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/9, 0x9}, {&(0x7f0000000280)=""/212, 0xd4}, {&(0x7f0000000380)=""/72, 0x48}, {&(0x7f0000000400)=""/177, 0xb1}], 0x4, &(0x7f00000023c0)=""/4096, 0x1000, 0xf8}, 0x2}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/95, 0x5f}, {&(0x7f0000000580)=""/57, 0x39}, {&(0x7f0000000640)=""/13, 0xd}, {&(0x7f0000000680)=""/60, 0x3c}, {&(0x7f00000006c0)=""/222, 0xde}, {&(0x7f00000007c0)=""/238, 0xee}], 0x6, 0x0, 0x0, 0x7}, 0x7}, {{&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e40)=[{&(0x7f00000009c0)=""/17, 0x11}, {&(0x7f0000000a00)=""/195, 0xc3}, {&(0x7f0000000b40)=""/98, 0x62}, {&(0x7f00000033c0)=""/4096, 0x1000}, {&(0x7f0000000c40)=""/133, 0x85}, {&(0x7f0000000d00)=""/59, 0x3b}, {&(0x7f0000000d40)=""/124, 0x7c}, {&(0x7f0000000dc0)=""/102, 0x66}], 0x8, &(0x7f0000000ec0)=""/186, 0xba, 0xa7}, 0x8}], 0x3, 0x10000, &(0x7f0000001040)={0x77359400}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001080)={0x0, 0x0}, &(0x7f00000010c0)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@local, 0x4e23, 0x200, 0x4e24, 0x2, 0xa, 0x80, 0x80, 0xbf, r3, r5}, {0xffffffff, 0x8, 0x3, 0xffff, 0x6, 0x7fff, 0x0, 0xffff}, {0xffffffff, 0x8001, 0x4, 0x200}, 0x3, 0x6e6bb5, 0x2, 0x1, 0x3}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@local, 0x3503, 0x4, 0x2, 0x80, 0x1f, 0x6, 0x1000}}, 0xe8) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x40000, 0x0) write$P9_RSETATTR(r6, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) getpeername(r4, &(0x7f0000001200)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000001280)=0x80) [ 521.086863] FAULT_INJECTION: forcing a failure. [ 521.086863] name failslab, interval 1, probability 0, space 0, times 0 [ 521.098461] CPU: 0 PID: 13538 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 521.105780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.115189] Call Trace: [ 521.117879] dump_stack+0x306/0x460 [ 521.121589] should_fail+0x1170/0x1350 [ 521.125561] __should_failslab+0x278/0x2a0 [ 521.129882] should_failslab+0x29/0x70 [ 521.133848] kmem_cache_alloc+0x146/0xd50 [ 521.138068] ? skb_clone+0x4d2/0x7b0 [ 521.141877] ? __msan_poison_alloca+0x17a/0x210 [ 521.146635] skb_clone+0x4d2/0x7b0 [ 521.150256] br_flood+0xbee/0x10b0 [ 521.153936] br_dev_xmit+0x1441/0x1690 [ 521.157926] ? br_net_exit+0x230/0x230 [ 521.161902] dev_hard_start_xmit+0x6b8/0xdb0 [ 521.166407] __dev_queue_xmit+0x2e62/0x3d90 [ 521.170837] dev_queue_xmit+0x4b/0x60 [ 521.174716] ip_finish_output2+0x1308/0x14f0 [ 521.179210] ip_do_fragment+0x3810/0x3e90 [ 521.183416] ? ip_fragment+0x3f0/0x3f0 [ 521.187405] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 521.192924] ip_fragment+0x247/0x3f0 [ 521.196755] ip_finish_output+0xff3/0x10e0 [ 521.201075] ip_output+0x534/0x600 [ 521.204694] ? ip_mc_finish_output+0x440/0x440 [ 521.209376] ? ip_finish_output+0x10e0/0x10e0 [ 521.213934] ip_send_skb+0x178/0x350 [ 521.217722] udp_send_skb+0x10b9/0x18d0 [ 521.221846] udp_sendmsg+0x149a/0x4170 [ 521.225849] ? ip_copy_metadata+0x16a0/0x16a0 [ 521.230515] ? kmsan_set_origin_inline+0x6b/0x120 [ 521.235461] ? kmsan_set_origin+0x83/0x140 [ 521.239813] udpv6_sendmsg+0x124d/0x48f0 [ 521.244043] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 521.249525] ? __msan_poison_alloca+0x17a/0x210 [ 521.254276] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 521.258688] inet_sendmsg+0x4d8/0x7f0 [ 521.262593] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 521.268065] ? security_socket_sendmsg+0x1bd/0x200 [ 521.273061] ? inet_getname+0x490/0x490 [ 521.277100] __sys_sendto+0x975/0xb70 [ 521.281041] ? syscall_return_slowpath+0x112/0x880 09:21:15 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x20004843ff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000000)={0x0, 0xfffffffffffffff8}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="72000000ab2ff7cf91f24c3ffb6656bff6071ba52438165ae257dc4f18225dc22ba4b4d5785758e9a9a8b8491146f33e44ee4f43f8d72854665f5136e40138393e0449ba84137832ff6e7a6a879e0473a09944c9a34dd39d0c57c20a1c7d279fabbf07bf1fc38dce62c7a6bd82f07d2a9aef786388a0"], &(0x7f0000000200)=0x7a) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000040)=""/55, &(0x7f0000000080)=0x37) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) recvfrom$inet(r0, &(0x7f00000000c0)=""/75, 0x4b, 0x40, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) [ 521.286083] __se_sys_sendto+0x107/0x130 [ 521.290264] __x64_sys_sendto+0x6e/0x90 [ 521.294294] do_syscall_64+0xbe/0x100 [ 521.298163] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 521.303407] RIP: 0033:0x457569 [ 521.306691] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.325657] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 521.333438] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 521.340749] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 521.348069] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 521.355390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 521.362711] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:15 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x3) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0x122, 0x29, 0x2, {0x2, [{{0x20, 0x1, 0x5}, 0xc03, 0x3ff, 0x7, './file0'}, {{0x59, 0x4, 0x3}, 0x0, 0x6, 0x7, './file0'}, {{0x9, 0x2, 0x4}, 0x8, 0xc22, 0x7, './file0'}, {{0x4, 0x0, 0x6}, 0x1000, 0xa55, 0x7, './file0'}, {{0x20, 0x4, 0x5}, 0x80, 0x3, 0x7, './file0'}, {{0x40, 0x0, 0x1}, 0x1, 0x2, 0x7, './file0'}, {{0x0, 0x1, 0x5}, 0x9, 0x1, 0x7, './file0'}, {{0x0, 0x1, 0x5}, 0x20, 0x28, 0x7, './file0'}, {{0x10, 0x2, 0x6}, 0x4, 0x7, 0x7, './file0'}]}}, 0x122) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:15 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x400000, 0x0) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000480)={0x4, 0x9}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000c40)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000060060000e0020000a001000090050000f0030000e0020000900500009005000090050000900500009005000005000000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000ffffe00000020000000000000000000000000000000100000000ffffffffffffffffffffffffffffffff000000ffffffff00ffffffff62726964676530000000000000000000697036746e6c30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000f702240000000000000000000000000000005801a00100000000000000000000000000000000000000000000000090007372680000000000000000000000000000000000000000000000000000013301040000000000ff02000000000000000000000000000100000000000000000000ffffe0000002fe8000000000000000000000000000bbffffff00ffffffffffffffffffffffffffffffffff000000ffffff00ffffff00ffffff0000000000ffffff00ffffffff010040000000000048004d4153515545524144450000000000000000000000000000000000000000100000007f000001000000000000000000000000000000000000000000000000000000014e230068fe8000000000000000000000000000bb00000000000000000000000000000000ff000000000000ffffffff00ff000000ffffffffffffff00ffffff00ffffffff76657468305f746f5f626f6e6400000073797a6b616c6c657231000000000000000000000000000000ff00000000000060d7000000000000000000000000000000000000000000ff00000000000000000000000000000000af00030140000000000000000000000000000000f8004001000000000000000000000000000000000000000000000000300066726167000000000000000000000000000000000000000000000000000000020000a4040000020000000402000048004d415351554552414445000000000000000000000000000000000000000002000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa4e22050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6390000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d415351554552414445000000000000000000000000000000000000000009000000ff010000000000000000000000000001e000000100000000000000000000000000660067fe8000000000000000000000000000aafe8000000000000000000000000000bbff000000ffffffff000000ff00000000ffffffff0000000000000000ffffffff6970366772657461703000000000000062726964676530000000000000000000000000000000000000ff0000000000000000000000000000000000ff00000000000000000000000000000000b7000301030000000003000000000000000000005801a0010000000000000000000000000000000000000000000000004800686268000000000000000000000000000000000000000000000000000000030000000701fc990900000001000200030000020010080006000300080008000400050008000600480068626800000000000000000000000000000000000000000000000000000000000100020109000000ffff05000100000007008600d50c0100000100000600020022ff00040600480052454449524543540000000000000000000000000000000000000000000014000000000087cc0000000000000000000000007f00000100000000000000000000000009004e220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000c0a95bb27228376141deaa9840861c20d281b85ac83510986896f58526c0ad45374324215431a9b2a8178b1b2cc34916a2674fd94a2a3371a593c8e824683c064d72527994e1e5d65"], 0x6c0) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r5 = eventfd(0x4) r6 = socket$unix(0x1, 0x7, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x6, 0x2000) getsockopt$bt_hci(r7, 0x0, 0x2, &(0x7f0000000b40)=""/146, &(0x7f0000000c00)=0x92) ioctl$KVM_GET_DIRTY_LOG(r6, 0x4010ae42, &(0x7f0000000240)={0x1ff, 0x0, &(0x7f0000ffb000/0x4000)=nil}) io_submit(r0, 0x2, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0xf4, r2, &(0x7f0000000000)="1728a271b4ed6cc537afbbe1d460d20906ba5a0949d0fe6cfc16ed3d41e9fba1ecf5e3b420a88d8e8982ee2ce298d86e844722152331ae0e26c0c21c389992ddc36d0e2aa6495c2e536136cf625889cf256df0731373fc092e0e39564b7ee3d50895d5fbe2cb76b8286af6444e3de85c91e23d434c76027ee16363f9d2b17f768b5f41624ac4ae98219d60e6144776f518b4d2eb960d6967e853bb1468152e52342d0e163f522b08cc59804ac6c8fbbb413a2635523a8892", 0xb8, 0x0, 0x0, 0x0, r5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xf, 0x100000000, r6, &(0x7f0000000300)="aab4a7faf0dbe13eee7a351b8be522d817e95a60b4f8f3ca275cf79a6e3ba0d9e129af3b0cc56675fe7eabe439e3cb3fb0a0109c2eadf56f5347ea77a818f3b2ede8fc1ee0545dfa0381d3373d239a0ea63449c436fe43e2723181921c42dd4bf5992c430db37e8944c9ad88588a0d05aecdecb1ca3336cfa09e41b3b6541bf1f4c93e685bdbcc82d80bcf0cb89c96", 0x8f, 0x2, 0x0, 0x2, r7}]) 09:21:15 executing program 4 (fault-call:7 fault-nth:34): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:15 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x10000, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/202) symlinkat(&(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1, 0x9, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r1, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) linkat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00', 0x400) 09:21:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 521.935445] FAULT_INJECTION: forcing a failure. [ 521.935445] name failslab, interval 1, probability 0, space 0, times 0 [ 521.946887] CPU: 1 PID: 13568 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 521.954216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.963909] Call Trace: [ 521.966584] dump_stack+0x306/0x460 [ 521.970292] should_fail+0x1170/0x1350 [ 521.974274] __should_failslab+0x278/0x2a0 [ 521.978580] should_failslab+0x29/0x70 [ 521.982545] kmem_cache_alloc+0x146/0xd50 [ 521.986750] ? skb_clone+0x4d2/0x7b0 [ 521.990524] ? __msan_poison_alloca+0x17a/0x210 [ 521.995274] skb_clone+0x4d2/0x7b0 [ 521.998901] br_flood+0xbee/0x10b0 [ 522.002537] br_dev_xmit+0x1441/0x1690 [ 522.006504] ? br_net_exit+0x230/0x230 [ 522.010452] dev_hard_start_xmit+0x6b8/0xdb0 [ 522.014963] __dev_queue_xmit+0x2e62/0x3d90 [ 522.019401] dev_queue_xmit+0x4b/0x60 [ 522.023336] ip_finish_output2+0x1308/0x14f0 [ 522.027847] ip_do_fragment+0x3810/0x3e90 [ 522.032055] ? ip_fragment+0x3f0/0x3f0 [ 522.036034] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 522.041550] ip_fragment+0x247/0x3f0 [ 522.045389] ip_finish_output+0xff3/0x10e0 [ 522.049713] ip_output+0x534/0x600 [ 522.053328] ? ip_mc_finish_output+0x440/0x440 [ 522.058017] ? ip_finish_output+0x10e0/0x10e0 [ 522.062571] ip_send_skb+0x178/0x350 [ 522.066354] udp_send_skb+0x10b9/0x18d0 [ 522.070466] udp_sendmsg+0x149a/0x4170 [ 522.074455] ? ip_copy_metadata+0x16a0/0x16a0 [ 522.079049] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 522.084363] ? kmsan_set_origin_inline+0x6b/0x120 [ 522.089317] ? kmsan_set_origin+0x83/0x140 [ 522.094126] udpv6_sendmsg+0x124d/0x48f0 [ 522.098343] ? apic_timer_interrupt+0xa/0x20 [ 522.102861] ? inet_getname+0x490/0x490 [ 522.106945] ? task_kmsan_context_state+0xdf/0x120 [ 522.111957] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 522.116376] inet_sendmsg+0x4d8/0x7f0 [ 522.120282] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 522.125744] ? security_socket_sendmsg+0x1bd/0x200 [ 522.130738] ? inet_getname+0x490/0x490 [ 522.134780] __sys_sendto+0x975/0xb70 [ 522.138729] ? syscall_return_slowpath+0x112/0x880 [ 522.143767] __se_sys_sendto+0x107/0x130 [ 522.147957] __x64_sys_sendto+0x6e/0x90 [ 522.151999] do_syscall_64+0xbe/0x100 [ 522.155891] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 522.161135] RIP: 0033:0x457569 [ 522.164424] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000200)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x143000, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x420040, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@local, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r4, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) fcntl$getflags(r4, 0x408) [ 522.183399] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 522.191197] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 522.198521] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 522.205859] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 522.213182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 522.220502] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 522.325898] capability: warning: `syz-executor5' uses deprecated v2 capabilities in a way that may be insecure 09:21:16 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x8000, 0x5}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x12040000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r1, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x26}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3845}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xe5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x40) 09:21:16 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000080)=0x2, &(0x7f00000000c0)=0x4) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r3 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r4 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x2000) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r3) syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x0, 0x80) 09:21:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x6, 0xfffffffffffffff8, 0x2, 0x7f}, {0x5, 0x7, 0x83, 0x8}, {0xef, 0x80000000, 0x8, 0x933}, {0x2, 0x1000, 0x1000, 0x100000000}, {0x7, 0x1f, 0x3, 0x401}]}, 0x10) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7fff, 0x9de914f20779d00c) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x0) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000100)={0x10200, 0x0, &(0x7f0000ffb000/0x4000)=nil}) 09:21:16 executing program 4 (fault-call:7 fault-nth:35): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:16 executing program 1: setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v2={0x7, 0x2, 0xe, 0x1, 0xaf, "aede7fbdef15972d7912341b5fd4b9c38a2e7680523f360a41671c18e5c6244aecff9000e543a60d48927c0b1ccb23ff796fa372673163c382bd87691dc6da36f87b04bea292b3a3827de143bc8f178b58681eadce53fa40252b3a70297201d80e1a5b72ffb3cbc2be8cf634fb8619c7a853fcda8ea161c9ff58394b2aa442bf4b13506499c562bcccb5f039914b0a9cc3786588137adbe91a725ce878d10190c101abe10f75898a1382ffe2e0effe"}, 0xb9, 0x3) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x3ff, 0x2) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f0000000180)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(sha512_mb,lrw(cbc(cast6)))\x00'}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000200)="47bf1c85f3e457ab3fdd5d40e1a8331156d59fa5403f744426bb5a27024e2cbe9b0097648d170586abb46e84a2ff141970686b6e481d2848065bf38837c6bddcd8683372c61a4d3992fd79dfe1c949273bdc7395861192bc12f1636e40fdc0f505ab989d6350100ca8522150beffe30876522c437d3c8262fde4b8a2b837289733d5c65911ff8ed39f5e43cfee64d6aea034eaea2525ee687ef84437138bb6bf7def2565da74d61495c83d047e81148fdee1bbd2997dd132d64f5ae1da999250683ecbff27007f5f83bb27c54433043a6a822db82d9689b87e856bdbddc7abbe34c0100bd983", 0xe6}, {&(0x7f0000000300)="6a24c39d5e09169bb0d7544a8f907fa79dbce417e82741aafec77032a11f546beba17357e7c57a6ffd1ebaef79c8baaffccba6d3a9dae832006d79b4087f4ccd6cde29eae069715d904591227dd43cd15f218a", 0x53}, {&(0x7f0000000380)="f734931edb6b89c3c4eee18563f078ea44e2037ac0ed2141083910b37d5d1da7c66ef7730b5081270723fcaec34bbbafe96415d25152b317bf42f3b61b1a1eeb38fcb29adbf15bbb3f51127be61bcb6c43f7088e89e440760e26df954e115680ef94675834d624b5ee4ec29e517fa608c1db481225de4a17487cc62b00863c087dada4bbf1cb148290d56902fd63577ad60cf85657588f1e2c2ed6b567ea706e7464dd8305c748f1fbb731512d9969bddfbabadad7b32d80213ef4ccedc3f59755413ff3969f5ddff4186dff78b1ccd860d2f5096333aa06a767", 0xda}, {&(0x7f0000000480)="8dc943aef340ffae7bf024aaca258655b955a9bdc922ff477a36896c07b4bb9ee23108c7eba6b645cc35fc685fb7bb0a0c818161094786663cb40a66c8ea7ca6da735e3204ff896da544cc81e596519526902efe9b0d9cb44bc4c54ec27d23b112777a4aeafc7a5f685839c373b077581b2f375ca06821e2f919a4c29b459bb2add9a745ac2a7b54a332", 0x8a}, {&(0x7f0000000540)="9fbe76185a7dbccb07fddf46", 0xc}, {&(0x7f0000000580)="dfb130df4f3f9c0d6d74e67676ee57c09a9d16eaff6a457ed0d9e7392d4e7680748d0cbb358befaeabd2526857e662bd8b71a6a4cbc11e0ea94ec7a92ab5b06ff3fb6964b950293acfdf1fb54c8a4115e97cf94a6fd7857636fc128c14718fb643734ed911431d419f9ef53064b20a89638fac0bbd9204ae3020f82c4404a8a3303501631c6413dd7ed92dd9cbc1e7dcd62b7758fceb47a377c3fb00d55cb5a3051b9cd2f333c32b5fd1b7b9075c097651695ed38da0eecd2f23b978e76dff7c7eb03d243f007960", 0xc8}, {&(0x7f0000000680)="51bcca1192bba0a70d917ce8d7db308d9ddd3d940b23953bcab1f6266cf0bf438d6cbdde92a420a88c2b971e8a4826ea6976e53ab318c01d1b93c021ecb33f124d606e7005c48e757b9bfe2901223fc538298dad99b350b93108eba241316bb5d895e98ec892ef742886a1cfe7b73a5b37a8cdf5889c20c0b8fb4bb0b27601829dcde0a4fe3192", 0x87}], 0x7, 0x0, 0x0, 0x15}, 0x40000) 09:21:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:17 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x2241) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f0000000040)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fstat(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000200)=[0xee00, 0xee00]) fchown(r4, r6, r7) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='veth1_to_bridge\x00', 0x2e}) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 523.063542] FAULT_INJECTION: forcing a failure. [ 523.063542] name failslab, interval 1, probability 0, space 0, times 0 [ 523.074935] CPU: 1 PID: 13602 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 523.082253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.091649] Call Trace: [ 523.094789] dump_stack+0x306/0x460 [ 523.098499] should_fail+0x1170/0x1350 [ 523.102472] __should_failslab+0x278/0x2a0 [ 523.106774] should_failslab+0x29/0x70 [ 523.110735] kmem_cache_alloc+0x146/0xd50 [ 523.114948] ? skb_clone+0x4d2/0x7b0 [ 523.118719] ? __msan_poison_alloca+0x17a/0x210 [ 523.123458] skb_clone+0x4d2/0x7b0 [ 523.127089] br_flood+0xbee/0x10b0 [ 523.130731] br_dev_xmit+0x1441/0x1690 [ 523.134704] ? br_net_exit+0x230/0x230 [ 523.138653] dev_hard_start_xmit+0x6b8/0xdb0 [ 523.143163] __dev_queue_xmit+0x2e62/0x3d90 [ 523.147590] dev_queue_xmit+0x4b/0x60 [ 523.151502] ip_finish_output2+0x1308/0x14f0 [ 523.156001] ip_do_fragment+0x3810/0x3e90 [ 523.160213] ? ip_fragment+0x3f0/0x3f0 [ 523.164177] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 523.169677] ip_fragment+0x247/0x3f0 [ 523.173508] ip_finish_output+0xff3/0x10e0 [ 523.177833] ip_output+0x534/0x600 [ 523.181452] ? ip_mc_finish_output+0x440/0x440 [ 523.186141] ? ip_finish_output+0x10e0/0x10e0 [ 523.190698] ip_send_skb+0x178/0x350 [ 523.194485] udp_send_skb+0x10b9/0x18d0 [ 523.198597] udp_sendmsg+0x149a/0x4170 [ 523.202584] ? ip_copy_metadata+0x16a0/0x16a0 [ 523.207231] ? kmsan_set_origin_inline+0x6b/0x120 [ 523.212176] ? kmsan_set_origin+0x83/0x140 [ 523.216484] udpv6_sendmsg+0x124d/0x48f0 [ 523.220696] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.226168] ? __msan_poison_alloca+0x17a/0x210 [ 523.230914] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 523.235323] inet_sendmsg+0x4d8/0x7f0 [ 523.239223] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.244686] ? security_socket_sendmsg+0x1bd/0x200 [ 523.249682] ? inet_getname+0x490/0x490 [ 523.253721] __sys_sendto+0x975/0xb70 [ 523.257655] ? syscall_return_slowpath+0x112/0x880 [ 523.262697] __se_sys_sendto+0x107/0x130 [ 523.266883] __x64_sys_sendto+0x6e/0x90 [ 523.270917] do_syscall_64+0xbe/0x100 [ 523.274782] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 523.280027] RIP: 0033:0x457569 [ 523.283269] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.302568] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x384, 0x200) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) r2 = accept$alg(r0, 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000000c0)={0xcb, "a621408502f6c788f5ac9019e2b021255cc0eb0e87b00bbd0b24101a6ad22bf7cec83dae8e7a005f868e6d021b10e4d1a232f0a1039d2368b1bb1a909755948fda8c79433f03252746264faca80c8bcf636da529d88a1133452153e868be01826978ea17edc22fe93461b894cc2a88fd09d788230c85bb3ae6400c8f5909d9caa09fed4cdfe0c7553ca43af6907f96724036cd8f029fcca88d5c2d34e7c0d065cf24fb4340b4f553cfd3d7bde16eeb04d86969eb123e2c7ab2a3834ac7ba9ae5355b13b1cee5ed59fc87a1"}) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e1503200660a69accf7e90f1921", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:17 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x40000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x2) uname(&(0x7f0000000440)=""/4096) [ 523.310337] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 523.317659] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 523.324970] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 523.332288] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 523.339609] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:17 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000080)={@loopback, @rand_addr=0x4}, 0xc) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) socket$inet_udplite(0x2, 0x2, 0x88) 09:21:17 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101280, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xdf9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x1}, 0xc) 09:21:17 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:18 executing program 4 (fault-call:7 fault-nth:36): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:18 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) socketpair$inet6_sctp(0xa, 0x5aa0155fd291adb7, 0x84, &(0x7f0000000000)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 09:21:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:18 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="fe50018845361947763f893f9a43d47e91765ad2d9a6f3c3dea0474c325730b476257f417623a67d20c6820089c92289d2948fad43661f4a695544acc2bebdf950f35e1225bc3283e84088f3154814fe9d9f2d906351214a2aa9d4603f4743a9534eaef239ac290d2ea221012de67c12338eff6922d501285b97d81279087cba73e0c9", 0x83}], 0x1, &(0x7f0000000440)=[@iv={0x78, 0x117, 0x2, 0x62, "729c27a6ce807969597bec57246d5bf3ff7ceacdf6260c022c1c2c171676f22c01a63d2139c5fb8c5d4d3422406aa907bec1589a3ab0b6525d507525a6f45b3ee61cecf71514adb70efd6b4861cca2caed8913d30a7786f5f76e0dee6b954060dfa4"}, @iv={0x28, 0x117, 0x2, 0xe, "34351799999d6e9766000824b17e"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x7fff}, @op={0x18, 0x117, 0x3, 0x1}], 0x1130, 0x24008040}, 0x20000085) [ 524.401262] FAULT_INJECTION: forcing a failure. [ 524.401262] name failslab, interval 1, probability 0, space 0, times 0 [ 524.412712] CPU: 0 PID: 13646 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 524.412734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:21:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '-]'}, {0x20, 'ecb(twofish)\x00'}, {0x20, "24766d6e657430db736563757269747947504c"}, {0x20, 'posix_acl_access:%}{('}, {}, {0x20, 'skcipher\x00'}], 0xa, "7c39a916b58d0fce79b708e79ecb521836845db4b66dedda3ab73cb653c8910cf0495c8430ff46f1453cb8784f49606b08543c82eeca8bfa1d557d06736dee74a7976214212c54199dabe27aa5c0c8a24813d45ac54f6377e4336c21c8e5317cb398b70c4f5f4240ec29076377da67eb469e5d9b82c28ebf991815843076f0c3b93de73df208740357655d71610bf1631141a8b30ce32623a1799009a70e8c03fd31338778cd240ffe96b996c19f0e37bf8d14b05e64df85543517573dc4ef998df2"}, 0x113) 09:21:18 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 524.412752] Call Trace: [ 524.412818] dump_stack+0x306/0x460 [ 524.412928] should_fail+0x1170/0x1350 [ 524.412996] __should_failslab+0x278/0x2a0 [ 524.413046] should_failslab+0x29/0x70 [ 524.413094] kmem_cache_alloc+0x146/0xd50 [ 524.413132] ? skb_clone+0x4d2/0x7b0 [ 524.413170] ? __msan_poison_alloca+0x17a/0x210 [ 524.413225] skb_clone+0x4d2/0x7b0 [ 524.413284] br_flood+0xbee/0x10b0 [ 524.413360] br_dev_xmit+0x1441/0x1690 [ 524.413426] ? br_net_exit+0x230/0x230 [ 524.413480] dev_hard_start_xmit+0x6b8/0xdb0 [ 524.413590] __dev_queue_xmit+0x2e62/0x3d90 09:21:18 executing program 4 (fault-call:7 fault-nth:37): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 524.413682] dev_queue_xmit+0x4b/0x60 [ 524.413774] ip_finish_output2+0x1308/0x14f0 [ 524.413853] ip_do_fragment+0x3810/0x3e90 [ 524.413913] ? ip_fragment+0x3f0/0x3f0 [ 524.413974] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 524.414083] ip_fragment+0x247/0x3f0 [ 524.414188] ip_finish_output+0xff3/0x10e0 09:21:18 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) openat$cgroup_int(r3, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 524.414250] ip_output+0x534/0x600 [ 524.414307] ? ip_mc_finish_output+0x440/0x440 [ 524.414387] ? ip_finish_output+0x10e0/0x10e0 [ 524.414428] ip_send_skb+0x178/0x350 [ 524.414482] udp_send_skb+0x10b9/0x18d0 [ 524.414589] udp_sendmsg+0x149a/0x4170 [ 524.414665] ? ip_copy_metadata+0x16a0/0x16a0 [ 524.414737] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 524.414846] ? kmsan_set_origin_inline+0x6b/0x120 [ 524.414931] ? kmsan_set_origin+0x83/0x140 [ 524.414989] udpv6_sendmsg+0x124d/0x48f0 [ 524.415132] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.415220] ? __msan_poison_alloca+0x17a/0x210 [ 524.415278] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 524.415343] inet_sendmsg+0x4d8/0x7f0 [ 524.415422] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.415504] ? security_socket_sendmsg+0x1bd/0x200 [ 524.415548] ? inet_getname+0x490/0x490 [ 524.415592] __sys_sendto+0x975/0xb70 [ 524.415710] ? syscall_return_slowpath+0x112/0x880 [ 524.415799] __se_sys_sendto+0x107/0x130 [ 524.415917] __x64_sys_sendto+0x6e/0x90 [ 524.415966] do_syscall_64+0xbe/0x100 [ 524.416018] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 524.416051] RIP: 0033:0x457569 [ 524.416092] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.416117] RSP: 002b:00007fa65644fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 524.416164] RAX: ffffffffffffffda RBX: 00007fa65644fc90 RCX: 0000000000457569 [ 524.416191] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000004 [ 524.416216] RBP: 000000000072bfa0 R08: 0000000020000180 R09: 000000000000001c [ 524.416244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564506d4 [ 524.416269] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000005 [ 524.922219] FAULT_INJECTION: forcing a failure. [ 524.922219] name failslab, interval 1, probability 0, space 0, times 0 [ 524.922266] CPU: 1 PID: 13660 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 524.922287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.922305] Call Trace: [ 524.922377] dump_stack+0x306/0x460 [ 524.922431] should_fail+0x1170/0x1350 [ 524.922494] __should_failslab+0x278/0x2a0 [ 524.922542] should_failslab+0x29/0x70 [ 524.922586] kmem_cache_alloc+0x146/0xd50 [ 524.922625] ? skb_clone+0x4d2/0x7b0 [ 524.922663] ? __msan_poison_alloca+0x17a/0x210 [ 524.922719] skb_clone+0x4d2/0x7b0 [ 524.922780] br_flood+0xbee/0x10b0 [ 524.922870] br_dev_xmit+0x1441/0x1690 [ 524.922935] ? br_net_exit+0x230/0x230 [ 524.922980] dev_hard_start_xmit+0x6b8/0xdb0 [ 524.923063] __dev_queue_xmit+0x2e62/0x3d90 [ 524.923154] dev_queue_xmit+0x4b/0x60 [ 524.923241] ip_finish_output2+0x1308/0x14f0 [ 524.923308] ip_do_fragment+0x3810/0x3e90 [ 524.923352] ? ip_fragment+0x3f0/0x3f0 [ 524.923422] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 524.923534] ip_fragment+0x247/0x3f0 [ 524.923630] ip_finish_output+0xff3/0x10e0 [ 524.923694] ip_output+0x534/0x600 [ 524.923752] ? ip_mc_finish_output+0x440/0x440 [ 524.923865] ? ip_finish_output+0x10e0/0x10e0 [ 524.923911] ip_send_skb+0x178/0x350 [ 524.923968] udp_send_skb+0x10b9/0x18d0 [ 524.924079] udp_sendmsg+0x149a/0x4170 [ 524.924157] ? ip_copy_metadata+0x16a0/0x16a0 [ 524.924292] ? kmsan_set_origin_inline+0x6b/0x120 [ 524.924381] ? kmsan_set_origin+0x83/0x140 [ 524.924440] udpv6_sendmsg+0x124d/0x48f0 [ 524.924571] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.924660] ? __msan_poison_alloca+0x17a/0x210 [ 524.924718] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 524.924786] inet_sendmsg+0x4d8/0x7f0 [ 524.924883] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.924973] ? security_socket_sendmsg+0x1bd/0x200 [ 524.925020] ? inet_getname+0x490/0x490 [ 524.925064] __sys_sendto+0x975/0xb70 [ 524.925181] ? syscall_return_slowpath+0x112/0x880 [ 524.925271] __se_sys_sendto+0x107/0x130 [ 524.925375] __x64_sys_sendto+0x6e/0x90 [ 524.925417] do_syscall_64+0xbe/0x100 [ 524.925471] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 524.925504] RIP: 0033:0x457569 [ 524.925547] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.925572] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 524.925619] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 524.925645] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 524.925672] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 524.925699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 524.925725] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4040, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000280)="f73dfa184552367e06b0f8c3437e6497a71bc8888da4e6c07b84ae840d0df81409bc32fd08bfa8a6c513dba9c23a0e297953fcef3a7728140da9889c89f33a2839476c081c14c3cda1cbca3b3bef0000000059df6042b32bb44f3ca9a6e5763941cdf73afd7adb1d920c6868a8c1a1a6e478ec557ae53ea4597f935ee2992d49673fcecefee24187b04a7fc11671ec98e1d70a73901ef34c5ad17e704dc5b75574ba9093b61e8414d44a216dbd90986441e7515f02db74a446fc5f7499b546cbd428f83616a14c611aeb80a9a63f37ac0ed668a2cee1", 0xfffffffffffffe16) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) recvmsg(r2, &(0x7f0000000580)={&(0x7f0000000180)=@nfc, 0x80, &(0x7f0000000540)=[{&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/235, 0xeb}, {&(0x7f0000000480)=""/89, 0x59}, {&(0x7f0000000500)=""/38, 0x26}], 0x4, &(0x7f0000000640)=""/200, 0xc8, 0x1000}, 0x40010021) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x7fffffff, &(0x7f0000000100)=0x2) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000740)={0x8, 0x4, 0xfffffffffffffffd, 0x3, 0x4, 0x40}) 09:21:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410bb1312d6c0d6e", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:20 executing program 4 (fault-call:7 fault-nth:38): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:20 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0x2000) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000)="7910f7f1ed00c66982bfd705dbe37992bd842f3d4b72114bffea2da89b40fa14f229f7213ee4edc5351e05fbb40672c2e656556896cc3e78b58f5210131e77e6ce5734ad39250cfd01c91c", 0x4b, 0x10000, 0x0, 0x1, r3}, &(0x7f0000000140)) 09:21:20 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x100, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0xffffffff, 0x20, 0x3, 0x4, 0xffffffffffffff9c, 0x6}, 0x2c) fcntl$setflags(r1, 0x2, 0x1) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x181000, 0x0) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) 09:21:20 executing program 5: epoll_create1(0x80000) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0xc) openat(r2, &(0x7f0000000180)='./file0\x00', 0x501080, 0x120) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x28a4, 0x3ff, 0x6, 0x2, 0x1, 0x101, 0x1000, 0x0, r4}, 0x20) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r3, 0x8b93}, 0x8) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 526.514865] FAULT_INJECTION: forcing a failure. [ 526.514865] name failslab, interval 1, probability 0, space 0, times 0 [ 526.526243] CPU: 1 PID: 13681 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 526.533563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.542956] Call Trace: [ 526.545633] dump_stack+0x306/0x460 [ 526.549342] should_fail+0x1170/0x1350 [ 526.553324] __should_failslab+0x278/0x2a0 [ 526.557631] should_failslab+0x29/0x70 [ 526.561583] kmem_cache_alloc+0x146/0xd50 [ 526.565793] ? skb_clone+0x4d2/0x7b0 [ 526.569587] ? __msan_poison_alloca+0x17a/0x210 [ 526.574339] skb_clone+0x4d2/0x7b0 [ 526.577961] br_flood+0xbee/0x10b0 [ 526.581588] br_dev_xmit+0x1441/0x1690 [ 526.585557] ? br_net_exit+0x230/0x230 [ 526.589507] dev_hard_start_xmit+0x6b8/0xdb0 [ 526.594007] __dev_queue_xmit+0x2e62/0x3d90 [ 526.598449] dev_queue_xmit+0x4b/0x60 [ 526.602311] ip_finish_output2+0x1308/0x14f0 [ 526.606799] ip_do_fragment+0x3810/0x3e90 [ 526.611023] ? ip_fragment+0x3f0/0x3f0 09:21:20 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) [ 526.614994] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 526.620491] ip_fragment+0x247/0x3f0 [ 526.624284] ip_finish_output+0xff3/0x10e0 [ 526.628610] ip_output+0x534/0x600 [ 526.632230] ? ip_mc_finish_output+0x440/0x440 [ 526.636933] ? ip_finish_output+0x10e0/0x10e0 [ 526.641490] ip_send_skb+0x178/0x350 [ 526.645285] udp_send_skb+0x10b9/0x18d0 [ 526.649402] udp_sendmsg+0x149a/0x4170 [ 526.653391] ? ip_copy_metadata+0x16a0/0x16a0 [ 526.658044] ? kmsan_set_origin_inline+0x6b/0x120 09:21:20 executing program 1: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = open(&(0x7f0000000180)='./file0\x00', 0x420000, 0x1) r2 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffff9c, 0x0) restart_syscall() ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000001c0)={r2}) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000440), 0x0, r0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9c1, 0x40000) socket$can_raw(0x1d, 0x3, 0x1) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000000c0)=0xc5) [ 526.662995] ? kmsan_set_origin+0x83/0x140 [ 526.667311] udpv6_sendmsg+0x124d/0x48f0 [ 526.671543] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 526.677042] ? __msan_poison_alloca+0x17a/0x210 [ 526.681791] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 526.686213] inet_sendmsg+0x4d8/0x7f0 [ 526.690114] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 526.695586] ? security_socket_sendmsg+0x1bd/0x200 [ 526.700583] ? inet_getname+0x490/0x490 [ 526.704625] __sys_sendto+0x975/0xb70 [ 526.708571] ? syscall_return_slowpath+0x112/0x880 [ 526.713622] __se_sys_sendto+0x107/0x130 [ 526.717798] __x64_sys_sendto+0x6e/0x90 [ 526.721859] do_syscall_64+0xbe/0x100 [ 526.725739] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 526.730980] RIP: 0033:0x457569 [ 526.734230] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.753192] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 526.760978] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 526.768294] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 526.775606] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 526.782923] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 526.790242] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:21 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) r2 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2a8002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000240)=0xe8) recvmmsg(r3, &(0x7f0000002f40)=[{{&(0x7f00000004c0)=@nl, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)=""/61, 0x3d}], 0x1, &(0x7f00000005c0)=""/123, 0x7b, 0x4}, 0x1}, {{&(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/28, 0x1c}, {&(0x7f0000000700)=""/152, 0x98}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/243, 0xf3}], 0x5, &(0x7f0000000940), 0x0, 0x1000}, 0x24}, {{&(0x7f0000000980)=@nl=@proc, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000000a00)=""/184, 0xb8}, {&(0x7f0000002b40)=""/243, 0xf3}, {&(0x7f0000002c40)=""/180, 0xb4}, {&(0x7f0000002d00)=""/132, 0x84}, {&(0x7f0000002dc0)=""/248, 0xf8}], 0x5, &(0x7f0000000ac0)=""/63, 0x3f, 0x1f}, 0x200}], 0x3, 0x40010023, &(0x7f0000003000)={0x77359400}) bind$xdp(r4, &(0x7f0000003040)={0x2c, 0x6, r5, 0x6, r6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) finit_module(r2, &(0x7f0000000000)='\x00', 0x1) 09:21:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:21 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x3, "fb699b"}, &(0x7f0000000440)=0xb) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000480)={r1, @in6={{0xa, 0x4e23, 0xc000000000000000, @local, 0x6}}}, 0x84) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r2 = memfd_create(&(0x7f00000002c0)='GPL[\x00', 0x4) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000300), 0x1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x40, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000580)=0x200, 0xfdac) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000240)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) r5 = gettid() mq_notify(r4, &(0x7f00000001c0)={0x0, 0xc, 0x0, @tid=r5}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000005c0)={r1, @in6={{0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x16}, 0x6a5a}}}, &(0x7f0000000680)=0x84) pselect6(0x40, &(0x7f0000000000)={0x8, 0x2, 0x7, 0x3, 0x3f, 0x3, 0x8, 0x400}, &(0x7f0000000040)={0x101, 0x4, 0x2a73, 0x7, 0x20, 0x2, 0x608, 0x7}, &(0x7f0000000080)={0x2a92, 0xe, 0xffffffffffffff81, 0x9, 0x5, 0x0, 0x20, 0xffffffffffffffff}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={0x5}, 0x8}) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000280)={0x6, 0x19}) mkdir(&(0x7f0000000540)='./file0\x00', 0xf0) 09:21:21 executing program 4 (fault-call:7 fault-nth:39): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xb3512140848814e7, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f00000000c0)=""/204) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 527.513122] FAULT_INJECTION: forcing a failure. [ 527.513122] name failslab, interval 1, probability 0, space 0, times 0 [ 527.524526] CPU: 0 PID: 13710 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 527.531854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.541262] Call Trace: [ 527.543933] dump_stack+0x306/0x460 [ 527.547630] should_fail+0x1170/0x1350 [ 527.551595] __should_failslab+0x278/0x2a0 [ 527.555909] should_failslab+0x29/0x70 [ 527.559876] kmem_cache_alloc+0x146/0xd50 [ 527.564082] ? skb_clone+0x4d2/0x7b0 [ 527.567870] ? __msan_poison_alloca+0x17a/0x210 [ 527.572614] skb_clone+0x4d2/0x7b0 [ 527.576239] br_flood+0xbee/0x10b0 [ 527.579890] br_dev_xmit+0x1441/0x1690 [ 527.583876] ? br_net_exit+0x230/0x230 [ 527.587844] dev_hard_start_xmit+0x6b8/0xdb0 [ 527.592360] __dev_queue_xmit+0x2e62/0x3d90 [ 527.596788] dev_queue_xmit+0x4b/0x60 [ 527.600659] ip_finish_output2+0x1308/0x14f0 [ 527.605151] ip_do_fragment+0x3810/0x3e90 [ 527.609355] ? ip_fragment+0x3f0/0x3f0 [ 527.613315] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 527.618807] ip_fragment+0x247/0x3f0 [ 527.622642] ip_finish_output+0xff3/0x10e0 [ 527.626958] ip_output+0x534/0x600 [ 527.630571] ? ip_mc_finish_output+0x440/0x440 [ 527.635251] ? ip_finish_output+0x10e0/0x10e0 [ 527.639805] ip_send_skb+0x178/0x350 [ 527.643619] udp_send_skb+0x10b9/0x18d0 [ 527.647744] udp_sendmsg+0x149a/0x4170 [ 527.651725] ? ip_copy_metadata+0x16a0/0x16a0 [ 527.656307] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 527.661614] ? kmsan_set_origin_inline+0x6b/0x120 [ 527.666555] ? kmsan_set_origin+0x83/0x140 [ 527.670880] udpv6_sendmsg+0x124d/0x48f0 [ 527.675090] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 527.680561] ? __msan_poison_alloca+0x17a/0x210 [ 527.685309] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 527.689717] inet_sendmsg+0x4d8/0x7f0 [ 527.693610] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 527.699077] ? security_socket_sendmsg+0x1bd/0x200 [ 527.704068] ? inet_getname+0x490/0x490 [ 527.708107] __sys_sendto+0x975/0xb70 [ 527.712043] ? syscall_return_slowpath+0x112/0x880 [ 527.717086] __se_sys_sendto+0x107/0x130 [ 527.721252] __x64_sys_sendto+0x6e/0x90 [ 527.725280] do_syscall_64+0xbe/0x100 [ 527.729148] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 527.734420] RIP: 0033:0x457569 [ 527.737668] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.756624] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15b00bd419410b", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:21 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000640)=0xe8) r2 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuseblk\x00', 0x397857, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0xbaf}}], [{@obj_role={'obj_role', 0x3d, '/dev/qat_adf_ctl\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@euid_eq={'euid', 0x3d, r3}}]}}) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r5 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000380)='syz', r4) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x480, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="08000000d3226d4cd5ce439fd07dbbf293331294d0f1c487a3ff4c273e980f08e20efbdc5b4b54627fc2bb3059447c67eea12ef7e480665418e318cf9f2263824a8d2e924162ebf8ce6666c746c171b28f2f20403c09638002b82a9b6011eb7a7796d21c20bdc6d3dac8221704ecf375461a9df4", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000240)=0x24) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000280)={r7, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000300)=0x100, 0x4) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000100)="cbafd533fda9becd2e222d9bdd66f3c7fcad80ffa375059b73cdf4f85359a92b0b7a8cdc4edb23b373812901e293cf7f1468714f8b91479ba0abce736e7a5919016429ca36ec72af926356842f9b6cefddd76faa342e", 0x56, r5) [ 527.764401] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 527.771731] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 527.779047] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 527.786365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 527.793681] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:21 executing program 2: io_setup(0x48, &(0x7f0000000040)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f0000000140)=0x14) ioctl$sock_proto_private(r2, 0x89e9, &(0x7f0000000180)="cd5986131008f13deb914737ab63169c1cc149eea53e37d405b1e1bf2004bd23897e754753c1f7e726deec65f8fcaa2eb8858841f6fa43e50ce5eff80b9759384d7f327d05721fb72eb0538598a0d5feea1de5d4eb5c09efe2754fa38ea79a4ce36f39ad3c4497f84667") setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000240)={0x0, &(0x7f0000000200)}, 0x10) close(r1) socket$inet6(0xa, 0x0, 0x3f6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) write$P9_RSYMLINK(r4, &(0x7f0000000080)={0xf, 0x11, 0x2, {0x20, 0x4, 0x3}}, 0x14) 09:21:21 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x40001) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x4, 0x5, 0x69}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f00000000c0)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000023c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000100)=""/45, 0x2d}, 0x0) 09:21:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15", &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:22 executing program 4 (fault-call:7 fault-nth:40): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:22 executing program 1: r0 = request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='rxrpc_s\x00', 0xfffffffffffffffd) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0xc8ddb85d6aa2aef5, r0) [ 528.317972] FAULT_INJECTION: forcing a failure. [ 528.317972] name failslab, interval 1, probability 0, space 0, times 0 [ 528.329480] CPU: 0 PID: 13741 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 528.336816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.346227] Call Trace: [ 528.348914] dump_stack+0x306/0x460 [ 528.352621] should_fail+0x1170/0x1350 [ 528.356590] __should_failslab+0x278/0x2a0 [ 528.360910] should_failslab+0x29/0x70 [ 528.364874] kmem_cache_alloc+0x146/0xd50 [ 528.369084] ? skb_clone+0x4d2/0x7b0 [ 528.372877] ? __msan_poison_alloca+0x17a/0x210 [ 528.377624] skb_clone+0x4d2/0x7b0 [ 528.381247] br_flood+0xbee/0x10b0 [ 528.384893] br_dev_xmit+0x1441/0x1690 [ 528.388879] ? br_net_exit+0x230/0x230 [ 528.392850] dev_hard_start_xmit+0x6b8/0xdb0 [ 528.397369] __dev_queue_xmit+0x2e62/0x3d90 [ 528.401802] dev_queue_xmit+0x4b/0x60 [ 528.405683] ip_finish_output2+0x1308/0x14f0 [ 528.410175] ip_do_fragment+0x3810/0x3e90 [ 528.414377] ? ip_fragment+0x3f0/0x3f0 [ 528.418339] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 528.423843] ip_fragment+0x247/0x3f0 [ 528.427673] ip_finish_output+0xff3/0x10e0 [ 528.431991] ip_output+0x534/0x600 [ 528.435608] ? ip_mc_finish_output+0x440/0x440 [ 528.440296] ? ip_finish_output+0x10e0/0x10e0 [ 528.444857] ip_send_skb+0x178/0x350 [ 528.448646] udp_send_skb+0x10b9/0x18d0 [ 528.452743] udp_sendmsg+0x149a/0x4170 [ 528.456726] ? ip_copy_metadata+0x16a0/0x16a0 [ 528.461375] ? kmsan_set_origin_inline+0x6b/0x120 [ 528.466333] ? kmsan_set_origin+0x83/0x140 [ 528.470657] udpv6_sendmsg+0x124d/0x48f0 [ 528.474889] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 528.480365] ? __msan_poison_alloca+0x17a/0x210 [ 528.485113] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 528.489522] inet_sendmsg+0x4d8/0x7f0 [ 528.493427] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 528.498921] ? security_socket_sendmsg+0x1bd/0x200 [ 528.503919] ? inet_getname+0x490/0x490 [ 528.507954] __sys_sendto+0x975/0xb70 [ 528.511931] ? syscall_return_slowpath+0x112/0x880 [ 528.516972] __se_sys_sendto+0x107/0x130 [ 528.521152] __x64_sys_sendto+0x6e/0x90 [ 528.525186] do_syscall_64+0xbe/0x100 [ 528.529071] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 528.534310] RIP: 0033:0x457569 [ 528.537563] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.556518] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:22 executing program 2: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000600)) close(r1) socket$inet6(0xa, 0x1, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000000)=""/116) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_submit(r0, 0x1ffffffffffffe76, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x7fffffffefff, 0x0, 0x80000000005, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 528.564301] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 528.571626] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 528.578948] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 528.586264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 528.593585] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:22 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x420000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0), &(0x7f0000000100)=[0x0, 0x0], 0x4, 0x9, 0x0, 0x2}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:22 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r0, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x220000, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000080)="72903285f7f32a428e685c69edbe685a8569c878eafb59807f2393dac360e30b493d7e6d0728100b11fc131d05fb20fd085657b88771e21862a14eb69f85cad0e30c1a3ecc288e8d11065e34cba857533498c37c89ae8250e3438a4d701533f4f7839b33ec760f3bd1ff9d3e3ccb56c69d6cc6c9b6a160ae9edce17791b6825fd9cccf432b1c85ce3d1163a87a3d08c721cf28b931904f55481c8351f47c02ab9e91c867de50fd512b6434fd6d93e2ffe5", 0xb1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x10000}, &(0x7f0000000180)=0x8) write$P9_RUNLINKAT(r1, &(0x7f0000001140)={0x7, 0x4d, 0x1}, 0x7) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000280)={r2, 0x78, "33f749aa11aed3adf8dcfe91ea17c91d9b24a4b5049b46019442a0f43417baf1cbc1befc12224de2b69bcf027a6b2617cfb18ab32b2974089de46ea05c9ae9386d4f3cce5a774c6e2f8bc440b0bfcc4f7873c3abac499146d17b05d41619cf7847798f13cb3f09bc39092fd4e27942ff6d6e1580b19219a9"}, &(0x7f00000001c0)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000640)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000840)='trusted.overlay.opaque\x00', &(0x7f0000001100)='y\x00', 0x2, 0x2) r6 = getegid() fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getuid() r10 = getegid() getresuid(&(0x7f00000007c0)=0x0, &(0x7f0000000800), &(0x7f0000000b80)) getgroups(0x6, &(0x7f0000000880)=[0xee00, 0xee01, 0xffffffffffffffff, 0xee01, 0x0, 0xee00]) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f00000009c0)=0xe8) r14 = getgid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000b00)=0xe8) perf_event_open$cgroup(&(0x7f00000011c0)={0x2, 0x70, 0xffffffff, 0xae, 0x8, 0x9, 0x0, 0x800, 0x40000, 0x2, 0x9, 0x9, 0x8, 0xcf, 0x200, 0x4, 0x10000, 0x15, 0x3fbf, 0x0, 0x5a75, 0x6c53, 0x0, 0x2, 0x6, 0x35e, 0x0, 0x8, 0x200, 0x5c8dfd37, 0x6, 0x1, 0x5, 0x1, 0x300d, 0x5, 0x9, 0x80000000, 0x0, 0xffff, 0x3, @perf_bp={&(0x7f0000001180), 0x7}, 0x1, 0x8000, 0x2, 0x2, 0x7, 0x4, 0x80}, r1, 0x2, r1, 0x0) getgroups(0x4, &(0x7f0000000b40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee01]) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000c40)={0x4b8, 0xfffffffffffffff5, 0x2, [{{0x1, 0x0, 0x8bcf, 0x5, 0x80000000, 0x21a51c6b, {0x4, 0x5, 0x4, 0xff, 0x9, 0x9, 0x5, 0x21b6, 0xffffffff, 0x6, 0x5b, r3, r4, 0x1, 0x3}}, {0x1, 0x80000001, 0xb, 0x8, 'selinuxeth1'}}, {{0x1, 0x2, 0x8, 0x2, 0x12b7, 0x12989a560000000, {0x6, 0x16b5, 0x0, 0x8000000000000000, 0x1, 0x401, 0x1, 0x7fffffff, 0x4f, 0x6, 0x401, r5, r6, 0x6, 0x20}}, {0x6, 0x100000000, 0x28, 0xfcd, "70707030706f7369785f61636c5f61636365737373656c696e7578fb5b216b657972696e677d222a"}}, {{0x3, 0x3, 0x26e, 0xa7, 0x1c4caada, 0x200, {0x4, 0x7, 0x2, 0x81, 0x1000, 0x4, 0x5, 0x8, 0x80000000, 0x6, 0x5a8a60e, r7, r8, 0xfffffffffffffff7, 0xdd}}, {0x3, 0x0, 0x9, 0x102d, 'skcipher\x00'}}, {{0x5, 0x0, 0x5, 0x5, 0x10000, 0x62b8, {0x5, 0x200, 0x7, 0x401, 0x200, 0x8, 0x2, 0x2, 0x6, 0x7fffffff, 0x143b852e, r9, r10, 0x3c10, 0x2}}, {0x5, 0xb7, 0x9, 0x0, '/dev/vcs\x00'}}, {{0x4, 0x2, 0x774c, 0xff, 0x1, 0xff, {0x5, 0x5, 0x6, 0x89a, 0x5, 0x9, 0x17, 0x7, 0x8, 0x400, 0x846, r11, r12, 0xfffffffffffffffb, 0x10000}}, {0x3, 0x10000, 0x2, 0x2, '@@'}}, {{0x1, 0x0, 0x3, 0x5, 0x8, 0x1, {0x5, 0x10001, 0x2, 0x3, 0x0, 0x0, 0x5, 0x401, 0x8, 0x4000000000000, 0x1, r13, r14, 0xfffffffffffffff7, 0x32e7}}, {0x5, 0x101, 0x9, 0x8000, '/dev/vcs\x00'}}, {{0x6, 0x1, 0x6, 0x6, 0x7ff, 0x1, {0x6, 0x78, 0xf39f, 0x2, 0x6bf7, 0x8001, 0x100000001, 0x4, 0x8, 0x401, 0xffffffffffffffff, r15, r16, 0x4, 0x6}}, {0x4, 0x5, 0x9, 0xc, 'skcipher\x00'}}]}, 0x4b8) socket$alg(0x26, 0x5, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000001240)) 09:21:22 executing program 4 (fault-call:7 fault-nth:41): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = socket$alg(0x26, 0x5, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r4, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:23 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) r3 = geteuid() bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e21, 0x81, @mcast2, 0x100000000}, 0x1c) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x80, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x100000000}}], [{@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'rxrpc_s\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'rxrpc_s\x00'}}, {@obj_type={'obj_type', 0x3d, 'syz'}}, {@smackfsdef={'smackfsdef', 0x3d, 'syz'}}, {@euid_lt={'euid<', r3}}]}}) 09:21:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)="2f02726f75702e7374617000084a96ecf6b5d29a375ccdf07428cbf63e5692e37261380d8afcef581b778cd642c71b9774a864a538ba9180e05ad48625c9be517e3cc533103aaeddb4737f8be9ea651f08e4ee0142", 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f00000018c0)=[{0x10, 0x107}], 0x10, 0x800}, 0x20008000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000006c0)=""/229, 0xe5}], 0x1, &(0x7f0000001840)=""/33, 0x21}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)=0x1) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000a00)}], 0x1, &(0x7f0000000b00)=[{0x110, 0x13f, 0x9, "6aa37b7353cb61fa83a43a51edfa6ad78f3a16dc7f71c409d803ef99322223a34d5c96d839a6644b5ed3b59b0a0f21128298fcdce2de4a7e8739f31b4d828a6c91c3400f4e0517b9994c84060ee559b2d490252970d1e5662b19c16adc1839c26f975867cb47a4949ae1883195780e4997c4f29c9ce5e428cd3dc0093232ee68f40bf25c6bd0b5c8867a17ea0e6e1ca581bdc8bfb791fe6b7a83415e745ac8d866639ddd8d5d8aad35b8c92a268b598a8c4c4142b5cfcd1223add63c9ee78bbbab271b71d6cae82ead0e2dd72aca236fb84029b026a1a9deebf33d5a0f7b4426aa2cabd6b1d63f9370f055d76bcd30e7f942bf8c600c3a11541d"}], 0x110, 0x4004000}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff0100000000000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) 09:21:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x2, 'K\\'}, &(0x7f00000000c0)=0xa) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x635, 0xffffffffffff8000}, 0x8) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0xcf, 0xb6, 0xd5, 0x3}]}, 0x10) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 529.337172] FAULT_INJECTION: forcing a failure. [ 529.337172] name failslab, interval 1, probability 0, space 0, times 0 [ 529.348572] CPU: 1 PID: 13761 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 529.355896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.365299] Call Trace: [ 529.367973] dump_stack+0x306/0x460 [ 529.371676] should_fail+0x1170/0x1350 [ 529.375646] __should_failslab+0x278/0x2a0 [ 529.379954] should_failslab+0x29/0x70 [ 529.383914] kmem_cache_alloc+0x146/0xd50 [ 529.388122] ? skb_clone+0x4d2/0x7b0 [ 529.391898] ? __msan_poison_alloca+0x17a/0x210 [ 529.396647] skb_clone+0x4d2/0x7b0 [ 529.400267] br_flood+0xbee/0x10b0 [ 529.403918] br_dev_xmit+0x1441/0x1690 [ 529.407899] ? br_net_exit+0x230/0x230 [ 529.411855] dev_hard_start_xmit+0x6b8/0xdb0 [ 529.416355] __dev_queue_xmit+0x2e62/0x3d90 [ 529.420798] dev_queue_xmit+0x4b/0x60 [ 529.424692] ip_finish_output2+0x1308/0x14f0 [ 529.429179] ip_do_fragment+0x3810/0x3e90 [ 529.433395] ? ip_fragment+0x3f0/0x3f0 [ 529.437376] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 529.442887] ip_fragment+0x247/0x3f0 [ 529.446715] ip_finish_output+0xff3/0x10e0 [ 529.451033] ip_output+0x534/0x600 [ 529.454645] ? ip_mc_finish_output+0x440/0x440 [ 529.459326] ? ip_finish_output+0x10e0/0x10e0 [ 529.463913] ip_send_skb+0x178/0x350 [ 529.467696] udp_send_skb+0x10b9/0x18d0 [ 529.471759] udp_sendmsg+0x149a/0x4170 [ 529.475743] ? ip_copy_metadata+0x16a0/0x16a0 [ 529.480339] ? kmsan_save_stack_with_flags+0xd0/0x100 09:21:23 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) [ 529.485657] ? kmsan_set_origin_inline+0x6b/0x120 [ 529.490603] ? kmsan_set_origin+0x83/0x140 [ 529.494953] udpv6_sendmsg+0x124d/0x48f0 [ 529.499170] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 529.504641] ? __msan_poison_alloca+0x17a/0x210 [ 529.509395] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 529.513804] inet_sendmsg+0x4d8/0x7f0 [ 529.517714] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 529.523181] ? security_socket_sendmsg+0x1bd/0x200 [ 529.528185] ? inet_getname+0x490/0x490 [ 529.532231] __sys_sendto+0x975/0xb70 [ 529.536174] ? syscall_return_slowpath+0x112/0x880 [ 529.541217] __se_sys_sendto+0x107/0x130 [ 529.545399] __x64_sys_sendto+0x6e/0x90 [ 529.549429] do_syscall_64+0xbe/0x100 [ 529.553300] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 529.558538] RIP: 0033:0x457569 [ 529.561789] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.580757] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 529.588547] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 529.595874] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 529.603193] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 529.610512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 529.617823] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:23 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)="6d5d717cafe09216ec5ea38bf4990fa4e1abccacdca9600cf54a0082934cd33ff2e099ffa544a7d307f9a2aa8f6359aeb8f414249ea24b27a849c6c1e5664b0621002da080ecd2440516a0d72386acfc8517241d4a91c2efb884ea4fe98daf", 0x1}, 0x20) 09:21:23 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0xfffffffffffffef0, r0) 09:21:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15", &(0x7f00000000c0), 0x1}, 0x20) 09:21:24 executing program 1: add_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x10001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x31, 0x2d, 0x17, 0x18, 0xa, 0x5e1, 0x3, 0x76, 0x1}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 09:21:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = dup2(r0, r0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:24 executing program 4 (fault-call:7 fault-nth:42): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x6, 0x7f, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="15", &(0x7f00000000c0)}, 0x20) 09:21:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:24 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x200) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x200) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000100)={r3, r4, 0x4}) [ 530.661968] FAULT_INJECTION: forcing a failure. [ 530.661968] name failslab, interval 1, probability 0, space 0, times 0 [ 530.673381] CPU: 0 PID: 13816 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 530.680702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.690094] Call Trace: [ 530.692770] dump_stack+0x306/0x460 [ 530.696475] should_fail+0x1170/0x1350 [ 530.700448] __should_failslab+0x278/0x2a0 [ 530.704753] should_failslab+0x29/0x70 [ 530.708707] kmem_cache_alloc+0x146/0xd50 [ 530.712920] ? skb_clone+0x4d2/0x7b0 [ 530.716696] ? __msan_poison_alloca+0x17a/0x210 [ 530.721438] skb_clone+0x4d2/0x7b0 [ 530.725057] br_flood+0xbee/0x10b0 [ 530.728691] br_dev_xmit+0x1441/0x1690 [ 530.732659] ? br_net_exit+0x230/0x230 [ 530.736607] dev_hard_start_xmit+0x6b8/0xdb0 [ 530.741120] __dev_queue_xmit+0x2e62/0x3d90 [ 530.745557] dev_queue_xmit+0x4b/0x60 [ 530.749475] ip_finish_output2+0x1308/0x14f0 [ 530.753973] ip_do_fragment+0x3810/0x3e90 [ 530.758183] ? ip_fragment+0x3f0/0x3f0 [ 530.762149] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 530.767649] ip_fragment+0x247/0x3f0 [ 530.771477] ip_finish_output+0xff3/0x10e0 [ 530.775796] ip_output+0x534/0x600 [ 530.779438] ? ip_mc_finish_output+0x440/0x440 [ 530.784126] ? ip_finish_output+0x10e0/0x10e0 [ 530.788680] ip_send_skb+0x178/0x350 [ 530.792483] udp_send_skb+0x10b9/0x18d0 [ 530.796592] udp_sendmsg+0x149a/0x4170 [ 530.800580] ? ip_copy_metadata+0x16a0/0x16a0 [ 530.805159] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 530.810553] ? kmsan_set_origin_inline+0x6b/0x120 [ 530.815501] ? kmsan_set_origin+0x83/0x140 [ 530.819809] udpv6_sendmsg+0x124d/0x48f0 [ 530.824038] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 530.829511] ? __msan_poison_alloca+0x17a/0x210 [ 530.834256] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 530.838664] inet_sendmsg+0x4d8/0x7f0 [ 530.842564] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 530.848033] ? security_socket_sendmsg+0x1bd/0x200 [ 530.853027] ? inet_getname+0x490/0x490 [ 530.857060] __sys_sendto+0x975/0xb70 [ 530.861003] ? syscall_return_slowpath+0x112/0x880 [ 530.866041] __se_sys_sendto+0x107/0x130 [ 530.870214] __x64_sys_sendto+0x6e/0x90 [ 530.874240] do_syscall_64+0xbe/0x100 [ 530.878119] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 530.883360] RIP: 0033:0x457569 [ 530.886609] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:24 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f000079df88)) msgsnd(0x0, &(0x7f0000000040)={0x1}, 0x8, 0x0) [ 530.905566] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 530.913338] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 530.920656] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 530.929364] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 530.936682] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 530.944002] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:25 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)="2e2f6367726f75702e6370752f73787a308c", 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003480)='cgroup.controllers\x00', 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003500)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000003540)={0xffffffffffffffff, r2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r1, 0x50, &(0x7f0000001b00)}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) gettid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000200)="54f3af2696caefedc29d980b7b2cd6961a01e7920f92dd36f14b44cd6915238ec9bf9c1dd1059d9a5b88f099c19828ffbc7162f2b18cfb823bdb2ea598acaff456c255460545aae4fbd216fbba8c937e359a", &(0x7f0000000280)=""/136}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000001c0)}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x1}, 0x2c) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001a80)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x28, &(0x7f0000000500)}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001c80)) socketpair(0x1b, 0x7, 0x7f, &(0x7f0000000340)) 09:21:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) recvmmsg(r0, &(0x7f0000006680)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/186, 0xba}, {&(0x7f0000000280)=""/233, 0xe9}], 0x2, 0x0, 0x0, 0xffff}, 0x6}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/253, 0xfd}, {&(0x7f0000000480)=""/243, 0xf3}, {&(0x7f0000000640)=""/141, 0x4f}], 0x3, 0x0, 0x0, 0xffffffffffffffe9}}, {{&(0x7f0000000700)=@nl=@proc, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000780)=""/171, 0xab}, {&(0x7f0000000840)=""/208, 0xd0}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/15, 0xf}, {&(0x7f0000000940)=""/122, 0x7a}], 0x6, &(0x7f0000000a40)=""/178, 0x414, 0x4e93}}, {{&(0x7f0000000b40)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000c40)=""/15, 0xf}, {&(0x7f0000006980)=""/100, 0x64}, {&(0x7f0000000d00)=""/93, 0x5d}, {&(0x7f0000000d80)=""/58, 0x3a}, {&(0x7f0000000dc0)=""/245, 0xf5}, {&(0x7f0000000ec0)=""/175, 0x37}, {&(0x7f0000000f80)=""/11, 0xffffffffffffff44}, {&(0x7f0000000fc0)=""/222, 0xde}], 0x8, &(0x7f0000001140)=""/57, 0x39, 0x3}, 0x4}, {{&(0x7f0000001180)=@ax25, 0x80, &(0x7f0000006500)=[{&(0x7f0000001200)=""/15, 0x32e}, {&(0x7f00000043c0)=""/4096, 0x1000}, {&(0x7f0000001240)=""/138, 0x8a}, {&(0x7f0000001300)=""/12, 0xc}, {&(0x7f0000001340)=""/66, 0x42}, {&(0x7f0000006a00)=""/158, 0x9e}, {&(0x7f0000005480)=""/25, 0x19}, {&(0x7f00000054c0)=""/28, 0x1c}, {&(0x7f0000006ac0)=""/4096, 0x1000}], 0x9, &(0x7f00000065c0)=""/140, 0x8c, 0x6}, 0x266}], 0x5, 0x40, &(0x7f00000067c0)={0x77359400}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) pipe(&(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000cc0), 0x2) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000005500)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000053c0)=0xe8) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000006800)='/dev/vsock\x00', 0x8000, 0x0) readlinkat(r4, &(0x7f0000006840)='./file0\x00', &(0x7f0000006880)=""/241, 0xf1) 09:21:25 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0xd0}}, 0x18) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x0, 0x8, 0x0, 0x7}}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) ptrace$peek(0x1, r2, &(0x7f00000002c0)) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000040)=""/40, &(0x7f0000000080)=0x28) 09:21:25 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000140)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)}}}], 0x97, 0x0, &(0x7f0000fedffe)}) 09:21:25 executing program 4 (fault-call:7 fault-nth:43): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:25 executing program 1: r0 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x80, 0x200180) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000100)=0x4000) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000180)=""/187) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000140)=0xffffffffffffffff) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'lo\x00'}}) [ 531.790029] binder: BINDER_SET_CONTEXT_MGR already set [ 531.795728] binder: 13847:13852 ioctl 40046207 0 returned -16 09:21:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 531.842979] binder_alloc: 13847: binder_alloc_buf, no vma [ 531.849083] binder: 13847:13854 transaction failed 29189/-3, size 0-0 line 2970 [ 531.870794] FAULT_INJECTION: forcing a failure. [ 531.870794] name failslab, interval 1, probability 0, space 0, times 0 [ 531.882171] CPU: 1 PID: 13851 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 531.889493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.898903] Call Trace: [ 531.901575] dump_stack+0x306/0x460 [ 531.905270] should_fail+0x1170/0x1350 [ 531.909249] __should_failslab+0x278/0x2a0 [ 531.913554] should_failslab+0x29/0x70 [ 531.916116] binder: send failed reply for transaction 2 to 13847:13849 [ 531.917536] kmem_cache_alloc+0x146/0xd50 [ 531.917580] ? skb_clone+0x4d2/0x7b0 [ 531.917622] ? __msan_poison_alloca+0x17a/0x210 [ 531.917680] skb_clone+0x4d2/0x7b0 [ 531.917741] br_flood+0xbee/0x10b0 [ 531.944077] br_dev_xmit+0x1441/0x1690 [ 531.948043] ? br_net_exit+0x230/0x230 [ 531.951981] dev_hard_start_xmit+0x6b8/0xdb0 [ 531.956482] __dev_queue_xmit+0x2e62/0x3d90 [ 531.960892] dev_queue_xmit+0x4b/0x60 [ 531.964791] ip_finish_output2+0x1308/0x14f0 [ 531.969283] ip_do_fragment+0x3810/0x3e90 [ 531.973479] ? ip_fragment+0x3f0/0x3f0 [ 531.977436] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 531.982925] ip_fragment+0x247/0x3f0 [ 531.986700] ip_finish_output+0xff3/0x10e0 [ 531.991002] ip_output+0x534/0x600 [ 531.994600] ? ip_mc_finish_output+0x440/0x440 [ 531.999267] ? ip_finish_output+0x10e0/0x10e0 [ 532.003805] ip_send_skb+0x178/0x350 [ 532.007590] udp_send_skb+0x10b9/0x18d0 [ 532.011673] udp_sendmsg+0x149a/0x4170 [ 532.015641] ? ip_copy_metadata+0x16a0/0x16a0 [ 532.020276] ? kmsan_set_origin_inline+0x6b/0x120 [ 532.025206] ? kmsan_set_origin+0x83/0x140 [ 532.029527] udpv6_sendmsg+0x124d/0x48f0 [ 532.033725] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 532.039193] ? __msan_poison_alloca+0x17a/0x210 [ 532.043923] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 532.048313] inet_sendmsg+0x4d8/0x7f0 [ 532.052209] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 532.057654] ? security_socket_sendmsg+0x1bd/0x200 [ 532.062630] ? inet_getname+0x490/0x490 [ 532.066652] __sys_sendto+0x975/0xb70 [ 532.070571] ? syscall_return_slowpath+0x112/0x880 [ 532.075595] __se_sys_sendto+0x107/0x130 [ 532.079751] __x64_sys_sendto+0x6e/0x90 [ 532.083769] do_syscall_64+0xbe/0x100 [ 532.087626] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 532.093317] RIP: 0033:0x457569 [ 532.096561] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.115505] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 532.123267] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 532.130572] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 09:21:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) recvmmsg(r0, &(0x7f000000a1c0)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000140)=""/46, 0x2e}, {&(0x7f0000000180)=""/104, 0x68}], 0x3, &(0x7f00000002c0)=""/194, 0xc2, 0x1}}, {{&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)=""/40, 0x28}, {&(0x7f0000000480)=""/241, 0xf1}, {&(0x7f0000000580)=""/13, 0xd}, {&(0x7f0000000640)=""/41, 0x29}, {&(0x7f0000000680)=""/181, 0xb5}, {&(0x7f0000000740)=""/55, 0x37}], 0x6, &(0x7f0000000800)=""/173, 0xad, 0x1f}, 0x7d6f}, {{&(0x7f00000008c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000940)=""/108, 0x6c}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/55, 0x37}, {&(0x7f0000000a00)=""/68, 0x44}, {&(0x7f0000000a80)=""/34, 0x22}, {&(0x7f0000000b40)=""/112, 0x70}, {&(0x7f0000000ac0)=""/11, 0xb}], 0x7, &(0x7f0000000cc0)=""/233, 0xe9, 0x8}, 0x1f}, {{0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)=""/93, 0x5d}, {&(0x7f0000000e40)=""/89, 0x59}, {&(0x7f00000033c0)=""/4096, 0x1000}, {&(0x7f0000000ec0)=""/204, 0xcc}], 0x4, &(0x7f0000001000)=""/89, 0x59, 0xffffffffffffffff}, 0x1}, {{&(0x7f0000001080)=@l2, 0x80, &(0x7f00000044c0)=[{&(0x7f0000001100)}, {&(0x7f0000001140)=""/154, 0x9a}, {&(0x7f0000001200)=""/66, 0x42}, {&(0x7f0000001280)=""/244, 0xf4}, {&(0x7f00000043c0)=""/210, 0xd2}], 0x5, &(0x7f0000004540)=""/130, 0x82, 0x1f}, 0x200}, {{&(0x7f0000004600)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f00000068c0)=[{&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000005680)=""/220, 0xdc}, {&(0x7f0000005780)=""/4096, 0x1000}, {&(0x7f0000006780)=""/93, 0x5d}, {&(0x7f0000006800)=""/168, 0xa8}], 0x5, &(0x7f0000006940)=""/142, 0x8e, 0x5}, 0x400}, {{&(0x7f0000006a00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001380)=[{&(0x7f0000006a80)=""/109, 0x6d}, {&(0x7f0000006b00)=""/138, 0x8a}, {&(0x7f0000006bc0)=""/4096, 0x1000}, {&(0x7f0000007bc0)=""/178, 0xb2}], 0x4, &(0x7f0000007c80)=""/49, 0x31, 0xffffffffffffffa1}, 0x6}, {{&(0x7f0000007cc0)=@nfc_llcp, 0x80, &(0x7f0000008040)=[{&(0x7f0000007d40)=""/169, 0xa9}, {&(0x7f0000007e00)=""/40, 0x28}, {&(0x7f0000007e40)=""/181, 0xb5}, {&(0x7f0000007f00)}, {&(0x7f0000007f40)=""/240, 0xf0}], 0x5, &(0x7f00000080c0)=""/4096, 0x1000, 0x6}, 0x10001}, {{&(0x7f00000090c0)=@in6, 0x80, &(0x7f000000a140)=[{&(0x7f0000009140)=""/4096, 0x1000}], 0x1, &(0x7f000000a180)=""/18, 0x12, 0x73d}, 0x47}], 0x9, 0x10000, &(0x7f000000a400)={0x77359400}) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f000000a440), &(0x7f000000a480)=0x4) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 532.137873] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 532.145182] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 532.152484] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 09:21:26 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:26 executing program 1: 09:21:26 executing program 4 (fault-call:7 fault-nth:44): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:26 executing program 3: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, &(0x7f0000000180)="1f0000000104fffffd3b54c8f6100000f30501000b000300000010d102f7ce", 0x1f) fcntl$getown(0xffffffffffffffff, 0x9) 09:21:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) pipe(&(0x7f00000001c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) signalfd(r0, &(0x7f0000000180)={0x7}, 0x8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20101, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimes(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={{r2, r3/1000+30000}, {0x77359400}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="61077e124c1c8c649d848dd8233d416e40a24547b07f923ad4373b554a00c763b2d316602341984d5be1f101ea3847ebaaa60c6bba9047bce62feb02949f88d8e34c34d1326f773be72791cc7b2d13e33e2d6e53988b3c4ed7cb9cd880c89a2a3621978de01f29608e8d474bbbefe059ebc590ec91035466b185ef727096b2da193ba463533f025d2905eee22ba8f7c9f387f44242c12b87375c349eabc7c88106913131fab7b02e024e5ae7d9cc95f5431a2ae9658a61c59315d8e81f565d61a1e877952bd8767293a3b7eb96c0b8e8577c41ab29719230cfd5123c90bc", 0xde) sendmsg$alg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="f512179ba2c96a847a7da35acc28fcafe36ac220c5f9dcaf64fc818f5dede7878c3346", 0x23}, {&(0x7f00000000c0)="19bc59b6322450ba60e29d26e5c709c2c528169786995b2f03a296afbfcdd3", 0x1f}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xfffffffffffffd11, 0x8814}, 0x20040080) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r4, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 09:21:26 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:26 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8981, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8100) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0a0127bd7000fbdbdf25d2c69dd03494491c870f0000"], 0x1c}, 0x1, 0x0, 0x0, 0x40005}, 0x40) [ 532.781660] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 532.844899] netlink: 'syz-executor3': attribute type 3 has an invalid length. [ 532.885320] FAULT_INJECTION: forcing a failure. [ 532.885320] name failslab, interval 1, probability 0, space 0, times 0 [ 532.896710] CPU: 0 PID: 13881 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 532.904032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.913426] Call Trace: [ 532.916100] dump_stack+0x306/0x460 [ 532.919804] should_fail+0x1170/0x1350 [ 532.923798] __should_failslab+0x278/0x2a0 [ 532.928126] should_failslab+0x29/0x70 [ 532.932082] kmem_cache_alloc+0x146/0xd50 [ 532.936292] ? skb_clone+0x4d2/0x7b0 [ 532.940064] ? __msan_poison_alloca+0x17a/0x210 [ 532.944811] skb_clone+0x4d2/0x7b0 [ 532.948450] br_flood+0xbee/0x10b0 [ 532.952080] br_dev_xmit+0x1441/0x1690 [ 532.956041] ? br_net_exit+0x230/0x230 [ 532.959991] dev_hard_start_xmit+0x6b8/0xdb0 [ 532.964964] __dev_queue_xmit+0x2e62/0x3d90 [ 532.969484] dev_queue_xmit+0x4b/0x60 [ 532.973430] ip_finish_output2+0x1308/0x14f0 [ 532.977960] ip_do_fragment+0x3810/0x3e90 [ 532.982169] ? ip_fragment+0x3f0/0x3f0 [ 532.986132] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 532.991627] ip_fragment+0x247/0x3f0 [ 532.995452] ip_finish_output+0xff3/0x10e0 [ 532.999771] ip_output+0x534/0x600 [ 533.003398] ? ip_mc_finish_output+0x440/0x440 [ 533.008085] ? ip_finish_output+0x10e0/0x10e0 [ 533.012635] ip_send_skb+0x178/0x350 [ 533.016428] udp_send_skb+0x10b9/0x18d0 [ 533.020520] udp_sendmsg+0x149a/0x4170 [ 533.024514] ? ip_copy_metadata+0x16a0/0x16a0 [ 533.029105] ? kmsan_save_stack_with_flags+0xd0/0x100 [ 533.034410] ? kmsan_set_origin_inline+0x6b/0x120 [ 533.039358] ? kmsan_set_origin+0x83/0x140 [ 533.043662] udpv6_sendmsg+0x124d/0x48f0 [ 533.047892] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 533.053382] ? __msan_poison_alloca+0x17a/0x210 [ 533.058131] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 533.063355] inet_sendmsg+0x4d8/0x7f0 [ 533.067258] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 533.072725] ? security_socket_sendmsg+0x1bd/0x200 [ 533.077719] ? inet_getname+0x490/0x490 [ 533.081752] __sys_sendto+0x975/0xb70 [ 533.085685] ? syscall_return_slowpath+0x112/0x880 [ 533.090718] __se_sys_sendto+0x107/0x130 [ 533.095024] __x64_sys_sendto+0x6e/0x90 [ 533.099056] do_syscall_64+0xbe/0x100 [ 533.102928] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 533.108188] RIP: 0033:0x457569 [ 533.111439] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:21:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000180), 0x0, r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x80040000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) pread64(r1, &(0x7f00000001c0)=""/249, 0xf9, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000140)={r2, &(0x7f0000000100)=""/14}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x2, 0x0) 09:21:27 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) [ 533.130395] RSP: 002b:00007fa656470c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 533.138172] RAX: ffffffffffffffda RBX: 00007fa656470c90 RCX: 0000000000457569 [ 533.145501] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000006 [ 533.152811] RBP: 000000000072bf00 R08: 0000000020000180 R09: 000000000000001c [ 533.160152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6564716d4 [ 533.167473] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000007 [ 533.201239] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 533.226518] netlink: 'syz-executor3': attribute type 3 has an invalid length. [ 533.235937] binder: undelivered TRANSACTION_ERROR: 29189 09:21:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) keyctl$set_reqkey_keyring(0xe, 0x47) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) setpgid(r2, r3) 09:21:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx\x00'}, 0xffffffffffffffab) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x10) 09:21:27 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:27 executing program 1: 09:21:27 executing program 4 (fault-call:7 fault-nth:45): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x141300, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000180)) prctl$setfpexc(0xc, 0x160000) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) setsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f0000000100)=0x3f000000000, 0x4) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xe4fa, 0x10000) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x0, 0x2, 0x6}, 0x5}}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = gettid() ptrace$peekuser(0x3, r4, 0x2) r5 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r5, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r1, 0x2}, 0x8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000200)="29ac8750f0dae5876cc4dae9eeb0fe9c4d2839f5113d31eaec28a2e5a7548f1c8b96e1d87cfcc67d25b4bb4aee9acd846e78b769d75bfd4b9d920226fe8ac5b8b9502607b8edce49fb4633e214e456587dc07c5ab48795ae2b6ae6c46c901977c1e4b641f92d1609523235dc9c8e7f6224ae374eea1ffa485e4cdba61e5bf1b19bd39050ae3475277a2e9f1cdf18ad3d1f7a02ac16971c6c", 0x98) socketpair(0x2, 0x3, 0x2, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x7, 0xff, 0x1, 0x200], 0x4, 0x3, 0x6, 0x3, 0x6, 0xff, {0xffff, 0x5, 0xfffffffffffff9ed, 0x4, 0x40, 0x4, 0x8, 0x1, 0x6a2, 0x3400b696, 0x31de, 0x76, 0x9, 0x1, "05c05d41e3f0ba5412d8b0d44ce84e290991c005a1bf40e0e4b856be377c48a9"}}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:28 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) shmctl$SHM_UNLOCK(r0, 0xc) [ 534.157372] FAULT_INJECTION: forcing a failure. [ 534.157372] name failslab, interval 1, probability 0, space 0, times 0 [ 534.168769] CPU: 1 PID: 13926 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #69 [ 534.176099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.185498] Call Trace: [ 534.188166] dump_stack+0x306/0x460 [ 534.191876] should_fail+0x1170/0x1350 [ 534.195905] __should_failslab+0x278/0x2a0 [ 534.200217] should_failslab+0x29/0x70 09:21:28 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) shmctl$SHM_UNLOCK(r0, 0xc) [ 534.204171] kmem_cache_alloc+0x146/0xd50 [ 534.208388] ? skb_clone+0x4d2/0x7b0 [ 534.212160] ? __msan_poison_alloca+0x17a/0x210 [ 534.216913] skb_clone+0x4d2/0x7b0 [ 534.220533] br_flood+0xbee/0x10b0 [ 534.224170] br_dev_xmit+0x1441/0x1690 [ 534.228141] ? br_net_exit+0x230/0x230 [ 534.232086] dev_hard_start_xmit+0x6b8/0xdb0 [ 534.236581] __dev_queue_xmit+0x2e62/0x3d90 [ 534.241007] dev_queue_xmit+0x4b/0x60 [ 534.244887] ip_finish_output2+0x1308/0x14f0 [ 534.249391] ip_do_fragment+0x3810/0x3e90 [ 534.253602] ? ip_fragment+0x3f0/0x3f0 [ 534.257572] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 534.263066] ip_fragment+0x247/0x3f0 [ 534.266908] ip_finish_output+0xff3/0x10e0 [ 534.271230] ip_output+0x534/0x600 [ 534.274859] ? ip_mc_finish_output+0x440/0x440 [ 534.279598] ? ip_finish_output+0x10e0/0x10e0 [ 534.284151] ip_send_skb+0x178/0x350 [ 534.287949] udp_send_skb+0x10b9/0x18d0 [ 534.292016] udp_sendmsg+0x149a/0x4170 [ 534.296006] ? ip_copy_metadata+0x16a0/0x16a0 [ 534.300659] ? kmsan_set_origin_inline+0x6b/0x120 [ 534.305600] ? kmsan_set_origin+0x83/0x140 [ 534.309921] udpv6_sendmsg+0x124d/0x48f0 [ 534.314146] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 534.319615] ? __msan_poison_alloca+0x17a/0x210 [ 534.324373] ? __udp6_lib_rcv+0x3d60/0x3d60 [ 534.328781] inet_sendmsg+0x4d8/0x7f0 [ 534.332684] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 534.338150] ? security_socket_sendmsg+0x1bd/0x200 [ 534.343143] ? inet_getname+0x490/0x490 [ 534.347182] __sys_sendto+0x975/0xb70 [ 534.351115] ? syscall_return_slowpath+0x112/0x880 [ 534.356158] __se_sys_sendto+0x107/0x130 [ 534.360335] __x64_sys_sendto+0x6e/0x90 [ 534.364386] do_syscall_64+0xbe/0x100 [ 534.368261] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 534.373500] RIP: 0033:0x457569 [ 534.376756] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.395709] RSP: 002b:00007fa65640dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 09:21:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) [ 534.403489] RAX: ffffffffffffffda RBX: 00007fa65640dc90 RCX: 0000000000457569 [ 534.410809] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 534.418135] RBP: 000000000072c0e0 R08: 0000000020000180 R09: 000000000000001c [ 534.425453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa65640e6d4 [ 534.432770] R13: 00000000004c3921 R14: 00000000004d57d8 R15: 0000000000000004 09:21:28 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400042, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x10}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e20}}}, 0x84) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180)=0x7, 0x4) 09:21:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) 09:21:28 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:28 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000006c0)=[0x3, 0xffffffffbaf4d80d]) getsockopt$inet_dccp_buf(r0, 0x21, 0x2, &(0x7f00000023c0)=""/4096, &(0x7f0000000680)=0x1000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8800, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f00000004c0)) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000180)={0x3, 0x1, &(0x7f00000000c0)=""/137, &(0x7f0000000040)=""/6, &(0x7f0000000280)=""/208, 0x7000}) write$binfmt_script(r2, &(0x7f0000000480)=ANY=[@ANYRES64=r2, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r3, @ANYRES16=r2, @ANYRES64=r1, @ANYPTR, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES32, @ANYRESDEC=r1, @ANYRESHEX=r3, @ANYRESOCT=0x0], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES32=r1], @ANYRES16=r3, @ANYRES16, @ANYRESOCT=r2]], 0x196b78357c135fed) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000500), &(0x7f0000000580)=0x4) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000540)={0x2e3, 0x10001}) 09:21:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x40200) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:29 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3ff, 0x254100) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') add_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000080)="d5ca0ab10200000045a9ed59af508d6969579deef22614ddb105a1be3971000000000000000000e6a02a3400001300000000db1bd8cc40f647d22704db2ae198eeebc258c2bff6e37261cf246f1efaa26146387073e149c549b90f41e01a391072e0b85dbb117d20c60031cc39e04b591c236efd817e6e5530b7000000000000aec5d97ef88495044c027d5f1acf3ee2", 0x90, 0xfffffffffffffffe) 09:21:29 executing program 4 (fault-call:7 fault-nth:46): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:29 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:29 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x0, @ipv4}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000280)=@nl=@proc, 0x313, &(0x7f0000000040), 0x0, &(0x7f0000000140)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 09:21:29 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000), 0x4) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000300)={'lo\x00', 0x400}) sendmsg(r1, &(0x7f0000000640)={&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @broadcast}, 0x0, 0x3, 0x2, 0x3}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000500)="faf9aeeca0f640664e0d4be9bb528c50ebd0143205c355c76c514db80ec88c8c76792fe60c05764d1a540e8421c6c82f051c1d1696dd790ff7b618958d6e77b0b72ea54d216032ce82bb9ac6f736d44ffb4440b9b29231c5f57ac4b379bd543c1bf85ee8f3295c6bcfbfdc7b07de70adf6617a5978dda73ad4ab90f900e3abc9cbf4034cd5c51cc9fb4cac630fb6ba80920abd6b7590fba75582247d13322f2cb8a6b5b5468bdd96441d5792df4364d1facf587d2bcd36349ec9c5fd1334f6aadabd322217627f371f669a81301f050f1e79614c9af9", 0xd6}], 0x1, 0x0, 0x0, 0x80}, 0x800000000001) r2 = socket$kcm(0x2, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xb, 0x6, 0x200, 0x9, 0x5, 0x1, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(r0, &(0x7f0000001a00)={&(0x7f00000003c0)=@rc={0x1f, {0x7ff, 0x8, 0x7, 0x0, 0x7f}, 0x7}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001640)="cecf9d7ad4585b344236d37ae62a3560872f1f67065bce6f7a6007d8d6df737218ed0561aefeb627b749572e5e1157a1c453b83dee3ab83108436f905867b4e349ef444a21fd2bd2fd88", 0x4a}], 0x1, &(0x7f0000001740), 0x0, 0x20048001}, 0x20000081) perf_event_open$cgroup(&(0x7f0000000ac0)={0x2, 0x70, 0x0, 0x6, 0x100, 0x3, 0x0, 0xb, 0x5a44, 0x2, 0x8, 0x6, 0x1, 0xfffffffffffffffa, 0x2f9a, 0xcc2f, 0x200, 0x6, 0x6, 0x100000000, 0x7fff, 0x4, 0x800, 0x0, 0x7, 0x5129e3ab, 0x4, 0x9, 0x2, 0x7, 0x80000000, 0xff, 0xb65a, 0x0, 0x40, 0xcc70, 0x1, 0x7fff, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x100}, 0x4000, 0x3, 0x6, 0x7, 0xfff, 0xd02f}, r0, 0x4, r1, 0x2) sendmsg(r2, &(0x7f0000000d80)={&(0x7f0000000bc0)=@in={0x2, 0x4e20, @remote}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000840)="33ad13430a4dda638a0c89610723ebb744082b44e9", 0x15}], 0x1, &(0x7f0000001a40)=[{0x1010, 0x0, 0x9, "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"}], 0x1010, 0x480c0}, 0x20000014) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000540)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000440)=r3, 0x12) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000940)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={r1, 0x10, &(0x7f00000008c0)={&(0x7f0000000880)=""/11, 0xb, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x144, &(0x7f0000000980)={&(0x7f0000000a40)=""/121, 0xfffffffffffffd20, r4}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780)=r4, 0xfffffffffffffe96) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000800)=r1) perf_event_open(&(0x7f00000006c0)={0x2, 0x70, 0x8b, 0x46c4, 0x5, 0x40, 0x0, 0x8, 0x6000, 0x0, 0x90, 0xa62, 0x7, 0x1, 0xf5, 0x80000001, 0x7, 0x3, 0x40, 0x1, 0xf200, 0xffffffff, 0xffffffff, 0x1, 0x8, 0x6, 0x1ff, 0x3, 0xb36, 0x7fffffff, 0x7, 0xbbe5, 0x81, 0xfffffffffffffffd, 0x1000, 0x3, 0x3, 0x3, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000680), 0x2}, 0x0, 0x7fff, 0x8, 0x0, 0xfff, 0x9, 0x4}, r3, 0xf, r0, 0x1) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) sendmsg(r1, &(0x7f0000001080)={&(0x7f0000000b40)=@sco={0x1f, {0x1, 0x401, 0x7, 0xbb42, 0x4, 0xffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000e00)="e383839e3f118cbe60c0b19b6a5c11b74fbc51a29e2f34ecad1ee32a8652a795c5bdeb88fd92ff378c8edb5a1f5a7d9e40a9f752d34cc5570b2942e42d882ad3ebd615d73193cf70146be194241dd84d84a8fcb161328365a8ac53520a0d2a523a7f53f32d5c4372ad0803504b36db28c1a7b082", 0x74}], 0x1, &(0x7f00000010c0)=ANY=[], 0x0, 0x20040890}, 0x41) gettid() openat$cgroup_procs(r1, &(0x7f0000000e80)='tasks\x00', 0x2, 0x0) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x45a, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x4}, 0x8080) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000600)={r5, r0}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000c40)) openat$cgroup_type(r1, &(0x7f00000007c0)='cgroup.type\x00', 0x2, 0x0) 09:21:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:29 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:29 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r0 = dup(0xffffffffffffffff) accept4$inet6(r0, &(0x7f0000000000), &(0x7f0000000040)=0x1c, 0x80800) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@dev, @in6=@ipv4={[], [], @remote}}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) [ 535.832275] device lo entered promiscuous mode 09:21:30 executing program 1: futex(&(0x7f0000000040)=0x4, 0xb, 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180), &(0x7f0000000040), 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) sendmsg$rds(r0, &(0x7f0000001b80)={&(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000080)=""/215, 0xd7}, {&(0x7f0000000180)=""/65, 0x41}, {&(0x7f0000000200)=""/190, 0xbe}, {&(0x7f00000002c0)=""/187, 0xbb}], 0x4, &(0x7f00000019c0)=[@mask_fadd={0x58, 0x114, 0x8, {{0x4000000040000, 0x24b}, &(0x7f00000003c0)=0x80, &(0x7f0000000400)=0xfffffffeffffffff, 0x10000, 0x6, 0x3, 0x10000, 0x20, 0x2}}, @mask_fadd={0x58, 0x114, 0x8, {{0x3f, 0x5}, &(0x7f0000000440)=0x5, &(0x7f0000000480)=0x8000, 0x9, 0x0, 0x200, 0x6, 0x10, 0x4}}, @mask_fadd={0x58, 0x114, 0x8, {{0xae1, 0x3}, &(0x7f00000004c0)=0xfff, &(0x7f0000000500)=0x35c5, 0xc8, 0x2, 0x1, 0x9, 0x78, 0x2}}, @rdma_args={0x48, 0x114, 0x1, {{0x157db1458, 0xd64f}, {&(0x7f0000000540)=""/84, 0x54}, &(0x7f0000001740)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)=""/209, 0xd1}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x3, 0xa, 0xbe75}}, @rdma_dest={0x18, 0x114, 0x2, {0x101, 0x4}}, @rdma_args={0x48, 0x114, 0x1, {{0x100, 0x81}, {&(0x7f0000001780)=""/103, 0x67}, &(0x7f0000001980)=[{&(0x7f0000001800)=""/191, 0xbf}, {&(0x7f00000018c0)=""/112, 0x70}, {&(0x7f0000001940)=""/35, 0x23}], 0x3, 0xd, 0xcec}}], 0x1b0, 0x4000004}, 0x4000) 09:21:30 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:30 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x1, @empty, 0x7}, 0x1c) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffffd9d, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000280)={0x2, 0x7, 0x1e2, 0x0, 0xc}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$P9_RFLUSH(r2, &(0x7f0000000380)={0x7, 0x6d, 0x2}, 0x7) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={r0, r2, 0x7, 0x2}, 0x10) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000040)=0xfffffffeffffffff) r3 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000340)={0x0, 0x1, 0x4, &(0x7f0000000300)=0x1ff}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0xedc5dfb939cfe9f8, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000180)) setsockopt$inet_int(r2, 0x0, 0x34, &(0x7f0000000100)=0x7, 0xe0) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:30 executing program 4: socketpair$unix(0x1, 0x8, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x5, 0x1, 0x5) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000400000000000000000000000000000000feffffff000016000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db804000000505a000000000000000100000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000000000000000000000000c000000000000feffffff00000000"]}, 0x139) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x210) r2 = socket$inet6(0xa, 0x100000002, 0x0) unshare(0x2000400) r3 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r3, &(0x7f00000000c0), 0xd) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$RTC_PLL_SET(r4, 0x40207012, &(0x7f0000000240)={0x80000000, 0x3, 0x9, 0x3c0d, 0x80, 0xba69, 0x8000}) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r4, 0x10, &(0x7f0000000480)={&(0x7f0000000440)=""/50, 0x32, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r5, 0x4) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x5, 0x8c4, 0xf916, 0x0, 0x7}, 0x14) mq_timedsend(r6, &(0x7f0000000340)="d5f0cac2ce7063114f1612442ff120d580b0c77e98bb3063440ba527805952128b4fe3ed55ae819bb4b804bd2352630696ccb135db87b0e0353f14cd407dc74eaecfaf2f33ee7e8a700abb262a62c625919170daf78050f9871224955a8d94b276c46d518b59a45a41c89b09bc899068baf2d8df501397eec0cd25935417ca29558b98da2337c9ac3df774eb9878b9189073682c1dc2ede755110ecea2141c254e950b6b7f71606e859176386c1771fdb61f55bbbb1d81c89c5ef1577cc0aa9d625a58500a168a091db16a0d06ac12247bf1e11e", 0xd4, 0xfffffffffffffc01, 0x0) 09:21:30 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0xfffffffffffffe5f}, 0x0) 09:21:31 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000300)={'lo\x00', 0x400}) sendmsg(r1, &(0x7f0000000640)={&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @broadcast}, 0x0, 0x3, 0x2, 0x3}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000500)="faf9aeeca0f640664e0d4be9bb528c50ebd0143205c355c76c514db80ec88c8c76792fe60c05764d1a540e8421c6c82f051c1d1696dd790ff7b618958d6e77b0b72ea54d216032ce82bb9ac6f736d44ffb4440b9b29231c5f57ac4b379bd543c1bf85ee8f3295c6bcfbfdc7b07de70adf6617a5978dda73ad4ab90f900e3abc9cbf4034cd5c51cc9fb4cac630fb6ba80920abd6b7590fba75582247d13322f2cb8a6b5b5468bdd96441d5792df4364d1facf587d2bcd36349ec9c5fd1334f6aadabd322217627f371f669a81301f050f1e79614c9af9", 0xd6}], 0x1, 0x0, 0x0, 0x80}, 0x800000000001) r2 = socket$kcm(0x2, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xb, 0x6, 0x200, 0x9, 0x5, 0x1, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(r0, &(0x7f0000001a00)={&(0x7f00000003c0)=@rc={0x1f, {0x7ff, 0x8, 0x7, 0x0, 0x7f}, 0x7}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001640)="cecf9d7ad4585b344236d37ae62a3560872f1f67065bce6f7a6007d8d6df737218ed0561aefeb627b749572e5e1157a1c453b83dee3ab83108436f905867b4e349ef444a21fd2bd2fd88", 0x4a}], 0x1, &(0x7f0000001740), 0x0, 0x20048001}, 0x20000081) perf_event_open$cgroup(&(0x7f0000000ac0)={0x2, 0x70, 0x0, 0x6, 0x100, 0x3, 0x0, 0xb, 0x5a44, 0x2, 0x8, 0x6, 0x1, 0xfffffffffffffffa, 0x2f9a, 0xcc2f, 0x200, 0x6, 0x6, 0x100000000, 0x7fff, 0x4, 0x800, 0x0, 0x7, 0x5129e3ab, 0x4, 0x9, 0x2, 0x7, 0x80000000, 0xff, 0xb65a, 0x0, 0x40, 0xcc70, 0x1, 0x7fff, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x100}, 0x4000, 0x3, 0x6, 0x7, 0xfff, 0xd02f}, r0, 0x4, r1, 0x2) sendmsg(r2, &(0x7f0000000d80)={&(0x7f0000000bc0)=@in={0x2, 0x4e20, @remote}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000840)="33ad13430a4dda638a0c89610723ebb744082b44e9", 0x15}], 0x1, &(0x7f0000001a40)=[{0x1010, 0x0, 0x9, "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"}], 0x1010, 0x480c0}, 0x20000014) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000540)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890c, &(0x7f0000000000)) r3 = getpid() write$cgroup_pid(r0, &(0x7f0000000440)=r3, 0x12) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000940)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={r1, 0x10, &(0x7f00000008c0)={&(0x7f0000000880)=""/11, 0xb, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x144, &(0x7f0000000980)={&(0x7f0000000a40)=""/121, 0xfffffffffffffd20, r4}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780)=r4, 0xfffffffffffffe96) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000800)=r1) perf_event_open(&(0x7f00000006c0)={0x2, 0x70, 0x8b, 0x46c4, 0x5, 0x40, 0x0, 0x8, 0x6000, 0x0, 0x90, 0xa62, 0x7, 0x1, 0xf5, 0x80000001, 0x7, 0x3, 0x40, 0x1, 0xf200, 0xffffffff, 0xffffffff, 0x1, 0x8, 0x6, 0x1ff, 0x3, 0xb36, 0x7fffffff, 0x7, 0xbbe5, 0x81, 0xfffffffffffffffd, 0x1000, 0x3, 0x3, 0x3, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000680), 0x2}, 0x0, 0x7fff, 0x8, 0x0, 0xfff, 0x9, 0x4}, r3, 0xf, r0, 0x1) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) sendmsg(r1, &(0x7f0000001080)={&(0x7f0000000b40)=@sco={0x1f, {0x1, 0x401, 0x7, 0xbb42, 0x4, 0xffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000e00)="e383839e3f118cbe60c0b19b6a5c11b74fbc51a29e2f34ecad1ee32a8652a795c5bdeb88fd92ff378c8edb5a1f5a7d9e40a9f752d34cc5570b2942e42d882ad3ebd615d73193cf70146be194241dd84d84a8fcb161328365a8ac53520a0d2a523a7f53f32d5c4372ad0803504b36db28c1a7b082", 0x74}], 0x1, &(0x7f00000010c0)=ANY=[], 0x0, 0x20040890}, 0x41) gettid() openat$cgroup_procs(r1, &(0x7f0000000e80)='tasks\x00', 0x2, 0x0) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}, 0xfffffffffffffe00}, 0x45a, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x4}, 0x8080) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000600)={r5, r0}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000c40)) openat$cgroup_type(r1, &(0x7f00000007c0)='cgroup.type\x00', 0x2, 0x0) 09:21:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000100)={0x1, 0x7ff, 0x6}) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r3 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r3, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r3, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:31 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000200)={[{0xbad4, 0x2, 0x0, 0x0, 0x40000, 0x1, 0x10001, 0x7f, 0x4, 0x2, 0x2, 0x1, 0x12e9}, {0x6, 0x200, 0xfffffffffffffa63, 0xffff, 0x5, 0xffffffffffff8000, 0x800, 0xfffffffffffffffd, 0x80000001, 0xfffffffffffffff7, 0xf1f7, 0x6}, {0x100, 0x101, 0x7ff, 0x3, 0x7, 0x1, 0x4, 0x100, 0x1, 0x6, 0x7fff, 0x9, 0x50000}], 0x1b}) r1 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000180)="1c3e9845870ced05ee537d335f78ffd444292bd59cfe997fac373471", 0x1c, 0xfffffffffffffffe) r2 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r2, 0x10000, 0x30) add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="aa42bce12b0043c017ab1c4cb0809132bd949dfe08b1dd4587c1752ba8b0ea0dca00b9a470ece90f421ccfbe7600dc8b76cc1df7d140252631faaae324ebf57b3b04d8391338f8d9a42c1ad65809f35e7dd68bf0e3849f514a4b7fa42070e7cee2982bd9ce637e25b3dc0d9c7f7d0468171b224cb8c76194686bd33a8d52dab4bc87565fe47cde7b25285bdda5b46c642b7d1580e83fc81c72173f21b064341b45b33e70c1cc68ff40fbb44c504cef3e267812d2a310a279fa6be2d8b6b878aae8a791bbd6f8fd982370e2cdb7e97f300bc3446da523a7968c1cb2", 0xdb, r1) 09:21:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000380)={0x0, 0xc0, 0x3f}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=r3, @ANYBLOB="e82d6609494858c626756e2a0000000000000000000000"], 0xc) [ 537.698660] QAT: Invalid ioctl [ 537.731014] QAT: Invalid ioctl 09:21:31 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_UNLOCK(r0, 0xc) 09:21:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x2, 0x8, 0x6, 0x7fff, 0x0, 0x1, 0xa0200, 0x6, 0x6, 0x1000, 0x1ff, 0x3, 0x80000001, 0x400, 0x8, 0x5, 0x80000001, 0x10000, 0xd45, 0x6, 0x8, 0x9, 0x0, 0xcae, 0x7, 0x6, 0x5, 0x1, 0x1, 0x3, 0x17, 0x7fffffff, 0xfff, 0x4, 0x7, 0x6, 0x0, 0x401, 0x1, @perf_config_ext={0x7fffffff, 0x3ff}, 0x200, 0x8, 0x1, 0x5, 0xd49b, 0xe66b, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x600040, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:32 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) socket$packet(0x11, 0x3, 0x300) set_robust_list(&(0x7f0000000040)={&(0x7f0000000000), 0x2}, 0x18) 09:21:32 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0x140, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x2, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000100)) 09:21:32 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) dup(r0) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x801, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:32 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000000)="ac14b23524643292dc5a9c4930d1c604e498f9236a448caa7e8ac6ae6ac6c42eab2b1005599e638cf3fecb7167c030a4bc5e2c707210cbc6dc0d409ed2de0e0e8b6a96d97cc32d8648e7f503ea212fb6e544174a774c126f96a987be632e3040635b4f9bb2554f3f6be917f56c60c2a249d7bc5e5785d1215bb02538fa062047a72e4c54ce2d86af038339d0632a82b9c9ef", 0x92, 0xfffffffffffffffe) r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x50b, @mcast1, 0x1}}, 0xf9, 0x9, 0xac, 0x9d}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0xfff, 0x7, 0x80000000}, &(0x7f0000000200)=0x10) 09:21:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) 09:21:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x8912, &(0x7f00000000c0)="153f6234418dd25d766070") ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = socket$alg(0x26, 0x5, 0x0) connect(r2, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @local}}, 0x80) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(crc32-generic,ctr-serpent-avx2)\x00'}, 0x58) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x98000, 0x0) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='\x00', 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r2, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r4, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1000000000000341, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000c40)={"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"}) r5 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f0000000100)) read(r6, &(0x7f0000000400)=""/91, 0x214) lseek(r2, 0x41, 0x0) 09:21:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x183) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x100) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x200, 0x7, 0xa000}, 0x4) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:33 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2000, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000080)={0x0, 0x1f000}) epoll_create1(0x80000) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) epoll_create1(0x80000) 09:21:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xe000) read(r0, &(0x7f00000000c0)=""/233, 0xe9) [ 539.332575] kernel msg: ebtables bug: please report to author: Wrong len argument 09:21:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) [ 539.464767] kernel msg: ebtables bug: please report to author: Wrong len argument 09:21:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0x14, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000140)=ANY=[@ANYRESDEC=r0]}, 0x8c) r3 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r3, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r3, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:33 executing program 1: r0 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r0) r1 = socket$netlink(0x10, 0x3, 0x13) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'ip6gre0\x00', 0xb161}) 09:21:33 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)="2f70726f632f7379732f6e65742f697076636b00ea38ca8464aac043598729ac7b4dde4c27125e8d696120b256c6e0bda6899e8c9fcc07b3efe80b215ed3f83d2445b9d5eadbf9945875b8a7590000000000000000000000000000000000006b1fca4a7e7735406479fa072a0000000000", 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) 09:21:33 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) [ 539.956217] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 09:21:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0xffffff8d) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) r2 = semget$private(0x0, 0x5, 0x2) r3 = socket$inet(0x2, 0x80003, 0x2000000084) sendto$inet(r3, &(0x7f0000000000), 0x0, 0x8000, &(0x7f0000000080), 0x10) sendto$inet(r3, &(0x7f0000000040)="16089928dd3884f9d9c1719284f9ee52", 0x10, 0x0, &(0x7f0000e81ff0), 0x10) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000140)=[0x3, 0x2, 0x4, 0x1, 0x3, 0x3ff]) r4 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16=r0, @ANYRESOCT=r4, @ANYBLOB="24b104a8f0e38f4b691a487e242dcfccc4a158cabb53997ae53df5997483aa5a50da506d486a7cd0b4a1cc1a166fe130409f664d841fe731a24ecbdc25a0bf81b98cdcbbb5581fb1b4208c68190e52a0ad9644be6d0d9e908c71d440591bc915bf0d6803e26d61f8fabd9011add0759849adc879af2c2cbb389a5d00c5a67431be4ba518cfc5148cc1c573d9365ec785f5e990e8fb1315283fb9abbc695fbb4cfad44e5427", @ANYBLOB="e8f0504c7e4a67da1caf4b08a96c9b5f40e61543ec3f201cdd5cedb9eb9491a0262aacfca73377ac02ed8d2067fd187a0f226853b64784f623a35eef1c6801cf8700f1c9656a8bd5a973e2fa7c47f50c57b3a3f16014f5d76adeb913697d3fb1ee57cae3d97dc5f7eb0c24f09e1c7777d7a0bfc4f1b1893d073dca9d827963a7bc16fea89fbec41f620d90764d1d990fd5900d5ac31639341b718339f0be54ec06a437077b84a388e4e634733450334943ecfe25b7f0602c0ffa52e399dc381387f569ff64e530d8f8f7498dc6ebbcaa6f3a5e83d7953b024df5d52e6cecc09ef431f399983686f9722dcc07bd"], 0x34b) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 540.110435] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 09:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 09:21:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:34 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@hopopts={0x33, 0x37, [], [@ra={0x5, 0x2, 0x2}, @generic={0x835, 0xda, "742a862db5d987631676f3874f0fb040179e8c42c9d33848d8433b7d0e541292babd8ea584fc37dba0c46ff7e0504ed2cfa34a54aabb6fd0c592bcb0b2dfeb7db467d830042af55d8434956cee17245e1d6586c17e8877b0aa795612f182a3c999d6c5720bfecf5ba2bb1113a382ca2b0ab4f76d84303dbb22bebf895a97abc4402a4a280e0b3bf5b80ee81c9bb44ed261bf9a1a31f186e3e60b436f59f9ae4f8c914d6684c71c829d3d70cffbdaaca250beebc7cf8a51232643e6f6bd361970dec3fc7405e240fd27be7f32117408ea3a72a4d8cbe37aaeb875"}, @hao={0xc9, 0x10, @local}, @generic={0xffff, 0xbb, "e7084d1ef35567f5b68e7a0009a89a2e43ab72b96e3e45d0670f46236b3efc024aeb6e5bdf81db95693746d4ec29778d96e6bb9c4814e30034e93a1dbed3e9f81f8d1705caeb81928ee3f6e53f486f7482acb8cec2afc92933cca7440fa76de988f48708c5b8c989f3945d4b9246a5fffac1a8c3a522f4d6a29c0f9bd8c45f70de1de3b6c0484c1eab020e5738f51e89a0a14e0bbf260849728e36f7f59d0a9761cee6c839991a678c992a460218c709c71b53a1c732bd005d94c2"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xffff}]}, 0x1c0) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000440)="9b115abfaf142a66305b441490f1115a64c014a4b33cebfbff9ae94205bef81a91064464478d7d226ef5d06907147954be53681bab7ae37177b4d3fbf8bedbdabd1621a4") getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000380)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000340)={@local, r1}, 0x14) 09:21:34 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000180)=""/116) setsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000340)="170b8abb1d027ad8fc77c48be42c486b2bd29a88083d4aa50c65c8d5654151d20a15fd4a9daf109d41957fa88fa031b493c0a45de4180d6e3379af8255e211e1abc36976b4f921574515475f313f518e8644aeda11e1e02888336aaf4a01766867096c804b3b6b55c9b514ac03e1abe41eb0257a16dc1fd6d21e3d6b6ba38307739fedd6f05918da9dbaa471d652", 0xffffffffffffffcc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="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", 0xffffffffffffffe1) socketpair(0x1, 0x5, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x6c, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e22, 0x2, 'sed\x00', 0x8, 0x6, 0x6}, 0x2c) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES64=r1], @ANYRESDEC=0x0], 0x1c) r3 = getpgrp(0xffffffffffffffff) process_vm_writev(r3, &(0x7f0000000500)=[{&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000000300)=""/48, 0x30}, {&(0x7f0000000340)=""/232, 0xe8}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/75, 0x4b}, {&(0x7f00000004c0)=""/41, 0x29}, {&(0x7f0000000640)=""/254, 0xfe}], 0x7, &(0x7f0000000800)=[{&(0x7f00000033c0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/30, 0x1e}, {&(0x7f0000000740)=""/63, 0x3f}, {&(0x7f0000000780)=""/83, 0x53}], 0x4, 0x0) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:34 executing program 3: io_setup(0x48, &(0x7f0000000100)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) close(r1) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x7fffffffefff, 0x507000, 0x0, 0x80000000005, 0x0, r1, 0x0}]) 09:21:34 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x240, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x3, 0x3}) add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r1 = msgget(0x3, 0x404) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000080)=""/250) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0x5, 0x8, 0x1, r0}) 09:21:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:35 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xc7, 0x80000) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@nat={'nat\x00', 0x19, 0x3, 0x3f8, [0x20000480, 0x0, 0x0, 0x200004b0, 0x20000700], 0x0, &(0x7f0000000280), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x40, 0x88e5, 'veth1_to_team\x00', 'eql\x00', 'ipddp0\x00', 'team_slave_1\x00', @dev={[], 0x21}, [0x0, 0x0, 0xff, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xa0, 0xa0, 0xd8, [@cgroup0={'cgroup\x00', 0x8, {{0x53, 0x1}}}]}}, @snat={'snat\x00', 0x10, {{@dev={[], 0xd}, 0xffffffffffffffff}}}}, {{{0x9, 0x57, 0x8100, 'gre0\x00', 'veth0_to_bridge\x00', 'rose0\x00', 'dummy0\x00', @local, [0xa47521bdabe67628, 0xff, 0x0, 0xff, 0xff], @dev={[], 0xa}, [0xff, 0xff, 0xff, 0x0, 0xff], 0xe0, 0x110, 0x148, [@rateest={'rateest\x00', 0x48, {{'veth0_to_bridge\x00', 'veth1_to_bridge\x00', 0x10, 0x1, 0x5, 0x1f, 0x6, 0x800, 0x8, 0x3ff}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x100000000}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0x9b45a057e08761c, 0x1, [{{{0x1b, 0x20, 0x892f, 'ip6_vti0\x00', 'rose0\x00', 'dummy0\x00', 'bridge_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0xe0, 0x118}, [@arpreply={'arpreply\x00', 0x10, {{@random="068c644bf80b", 0xfffffffffffffffd}}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x21}, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@random="9887b31ea771", 0xfffffffffffffffe}}}}]}]}, 0x470) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=ANY=[@ANYBLOB="00000400000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000549952a448000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000007561000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000fb431389c967a94cb05116a2d0c366dcebc9"]}, 0x14f) r4 = socket$inet6(0xa, 0x4, 0x0) connect$inet6(r3, &(0x7f0000000880)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x8000000000000d}, 0x1c) sendto$inet6(r4, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r4, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) signalfd(r1, &(0x7f0000000240)={0x4}, 0x8) 09:21:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000200)={0x14}, 0x14) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) 09:21:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) recvmmsg(r0, &(0x7f0000004cc0)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/191, 0xbf}, {&(0x7f0000000280)=""/46, 0x2e}], 0x2, &(0x7f0000000300)=""/115, 0x73, 0x7}, 0xe728}, {{&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/227, 0xe3}], 0x1, &(0x7f0000000640)=""/232, 0xe8, 0x4}, 0x20}, {{&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000740)=""/223, 0xdf}, {&(0x7f0000000840)=""/114, 0x72}, {&(0x7f00000008c0)=""/220, 0xdc}, {&(0x7f00000009c0)=""/128, 0x80}, {&(0x7f0000000a40)=""/208, 0xd0}, {&(0x7f0000000c40)=""/200, 0xc8}], 0x6, &(0x7f0000000bc0)=""/40, 0x28, 0xa5e}, 0x4}, {{&(0x7f0000000d40)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000033c0)=[{&(0x7f0000000dc0)=""/81, 0x51}, {&(0x7f0000000e40)=""/250, 0xfa}, {&(0x7f0000000f40)=""/15, 0xf}, {&(0x7f0000000f80)=""/170, 0xaa}, {&(0x7f0000001040)=""/152, 0x98}, {&(0x7f0000001100)=""/105, 0x69}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000001180)=""/167, 0xa7}, {&(0x7f0000001240)=""/136, 0x88}, {&(0x7f0000001300)=""/87, 0x57}], 0xa, &(0x7f0000003480)=""/140, 0x8c, 0x20000000000000}, 0x1}, {{&(0x7f0000003540)=@hci, 0x80, &(0x7f0000001380)=[{&(0x7f00000035c0)=""/93, 0x5d}], 0x1, &(0x7f0000003640)=""/130, 0x82, 0x6}, 0xff}, {{0x0, 0x0, &(0x7f0000004980)=[{&(0x7f0000003700)=""/1, 0x1}, {&(0x7f0000003740)=""/236, 0xec}, {&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000004840)}, {&(0x7f0000004880)=""/204, 0xcc}], 0x5, &(0x7f0000004a00)=""/133, 0x85, 0x8001}, 0x3}, {{&(0x7f0000004ac0)=@generic, 0x80, &(0x7f0000004c80)=[{&(0x7f0000004b40)=""/242, 0xf2}, {&(0x7f0000004c40)=""/22, 0x16}], 0x2, 0x0, 0x0, 0x9}, 0xfffffffffffff384}], 0x7, 0x1, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000040)=""/45, 0x2d}, 0x40000000) 09:21:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:35 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_pts(0xffffffffffffffff, 0x200000) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/111) [ 541.486353] kernel msg: ebtables bug: please report to author: Wrong len argument 09:21:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="102f9562f0d1035dd55de8150101ee379146c01e6f5574ba0657c01453e7a05b8039e71138058c107c9f6cdcb93fb81db8c56a6903e4d6131b090166ddd44b1933797d3983b4", 0x46) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x30000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r2, 0x6, 0x2}, 0x14) socketpair(0x9, 0x807, 0x401, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x20, 0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x7fff, 0x874, 0x0, 0x8}]}, 0x10) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x2) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timerfd_settime(r4, 0x1, &(0x7f00000002c0)={{}, {r5, r6+30000000}}, &(0x7f0000000300)) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x20, 0x80, 0x8}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001400)={r0, &(0x7f00000003c0), &(0x7f0000000400)=""/4096}, 0x18) 09:21:35 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x9, 0x4) 09:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r3 = getgid() socket$inet_dccp(0x2, 0x6, 0x0) setgid(r3) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 09:21:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x100, 0x220002) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xd1a, 0x100fff) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) setsockopt$inet_buf(r2, 0x0, 0x3d, &(0x7f0000000280)="cba8f9892dfeb4251703b0c46416d22d4737ac2e9cb4d4473746513c18cd1192c4f856db58269d6ad345aa87d600ef028adbc53c90927e54c29088c33ed1e844362c67dc97f6aad5a0aa8fb9b85f29fe463fa574952474242513f8c30a3296131f8806b4bfce4f41f618d57c722213247e047faf9457e2ccddd38a747dd9550a365bbbad9a50604072384640fed1ab2c6e0d92f792313c44f04c832c3c09e8a5f3f26e19f26d7e9a8a686d51553b36c1ff93921cfca274236d687ff90b65eae872ade445bedbede146da6a53ad8e48bf0d68b5e726821af02f", 0xd9) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0x0) recvmsg(r3, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0xffffffffffffff22, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) lookup_dcookie(0xfffffffffffff001, &(0x7f0000000380)=""/226, 0xe2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000140)={0x18c, @time={0x0, 0x1c9c380}, 0x5, {0x4df, 0x80}, 0x3ff, 0x2, 0x4}) fchdir(r3) 09:21:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000880)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 09:21:36 executing program 1: add_key(&(0x7f0000000000)="72f87ba7e716f2b485787270635f73002d4cdee25101c10c34116364629e04bb8551bd1085ebb4b551aa76222843018205aff2f82786468ac9c73d", &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) 09:21:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r2, 0x5) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000000c0)) 09:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40000, 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000340)={0x0, 0x0, 0x2080}) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)="2e2f6367726f75702e6370752f2e787a308c", 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003480)='cgroup.controllers\x00', 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003500)=0xffffffffffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000003540)={0xffffffffffffffff, r2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b80)={r1, 0x50, &(0x7f0000001b00)}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) gettid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000200)="54f3af2696caefedc29d980b7b2cd6961a01e7920f92dd36f14b44cd6915238ec9bf9c1dd1059d9a5b88f099c19828ffbc7162f2b18cfb823bdb2ea598acaff456c255460545aae4fbd216fbba8c937e359a", &(0x7f0000000280)=""/136}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000001c0)}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x1}, 0x2c) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001a80)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)=0x5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x28, &(0x7f0000000500)}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001c80)) socketpair(0x1b, 0x7, 0x7f, &(0x7f0000000340)) 09:21:36 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) 09:21:36 executing program 1: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="dbb9edaa13e9624b53067342aa3bac0cf0d5b6131eae80b02ef5668f50d7f96fc69ab624cfbd2b0bb5612b41a84affe56c3273021d0f286dccc9aa23c3874228b988e26eef30265b42756c9a428c93491d073d7f0f0ff60b028bed7e6e16d30c6347be84813e8c572ef8a4a6f9a13bbe234d8d5ba39b54a62ca62a8df7f89dccc177531c018a0b0efa861de2f5b59c8b370b20abc63a1e2b3b9a4b4a93d35e407821a58c37cd44863317ed76647909eb66a71a254cf20c36f6a12b059aaebd5f141a2565736649e550bb7f1a9f691b925500e5f7025a26bfad88f90e8c109125054a6b", 0xe3, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000180)="66972a1c1ab5810e20b108a9a19f4ce2074dd959c28fce40fa80a0a29357cafd5c71e1c89551d08957b22862b70aa76e8fed241f1d84a4a8b10cdd8a5b6d44170a5729b30893df643077b5e104b7c18498ff90e4275a3ca2630ba58d11fde7d6d12b6865f8cb782d70f2b8a997654dd9d35a2605db694a6a4fb8ab5aeb3ca7a2a7b809f475a3faff76e5a0725bf48ca90966969ef9b079b2cec1619ef31d84c26dc078433d263bdf7a7da403f887006c5de3f82ca4cdf5726cfbb048d3751df9c644dcd83420e0be2d5946af1d7fd70237792e7fced8", 0xd6) r1 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000280), 0x800) r3 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000340)=r3) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000002c0)=0x1a, &(0x7f0000000300)=0x1) keyctl$invalidate(0x15, r1) 09:21:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRES32=r1, @ANYRES64=r1, @ANYRES16, @ANYRES32=0x0, @ANYRESOCT], 0x40) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 543.065985] Unknown ioctl -1065308482 09:21:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 09:21:37 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x438000) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000000)={0x6, [0x10001, 0x6, 0x7bb, 0xfffffffffffffff7, 0x3ff, 0x0]}) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000040)=0x7ff, 0x4) 09:21:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x0, @ipv4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000080)=0x8, 0x4) recvmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000140)=""/36, 0x24}, 0x2000) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 09:21:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x88000, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000340)=""/205) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000b40)={0xf004, &(0x7f0000000b00), 0xa, r0, 0xb}) pwritev(r1, &(0x7f0000000980)=[{&(0x7f0000000440)="71289f5b35f7b5b9fb818c4bf2f278f2529d2fc630601676d4e08d953aac02966531ed7d27379e485547266b84a60e474b74e91758b9b930c0fba8ab9d4157e699e4e371ba7f1bd56d842a31823a4be3429aec11a66976abad73c2aa9ff3ebe551ccb4d3d31bbe93c0ef4338530cdce44514bdae2e477fe6a6c0ce073a7ec288999eaffa070cd6272f34b89f735b5fc4ea62c0da2734974771b64eabaffecc822259e365b3161d87b2937fde6373477dbb3e7b37b65d9e96d4701af0525d3fac35d55aebd093e955768eb1dc1444f36dc828beafc170750e4c7dc9351b159a1b2b2b9dd5e22836fe8ab4ffe9c855ea5fdfc76b66004e7f", 0xf7}, {&(0x7f0000000540)="21ca782b57d5c81eb540fd453252ecd1fbc7428e98bb02ec53b1d4071efe6f09872b2c34dbf616bcc0a7b9c64611624d010dc1a8e7f2a321fe0b84cca492de681c907788a8898369d4087f197f20fa834ad21edda87a7aec2b087e08d301a505029fa525a80d1f01bfc237214866a438ec21ec5c970de291d5551de1006e79c24348ac4419c38c59ac9326030d715504e0178da9f22f39f428ea00937022203a9197d46f19650d29d6d28e0d11716ab0d0725fc17261f2e081acfd3ac93b2e24a00542efa580", 0xc6}, {&(0x7f0000000640)="a68b50af43dff14954149c4f2384b0f1b30f3ab728b537d8f269d031fb774313b2e61862c76226b409c79e521b9514e41aabba9b18eb7c2abed1227b9fa7487e65c2ddb5a01fdedb1f65a759137d321f3e3287830e7f29166b524c90ec2db7b42f14647c160b8cf578947fef3b295495c5141a257a3c9ff814e18d3db032ed5d49f5632993c7c3c4c00bfa7639562252de4469a65ea67bcf60e0cfd519a21a4761ff33c2ce823151f5921e18fbab4fc7ef224e971c4732ce27cdeef2fc3fcf0efc8dbc", 0xc3}, {&(0x7f0000000740)="a02ec8efba8b65377571044cdf34cd6cfeb07e58e4908b141d66e26a1c68dea64a6c14d11f525c00f93b7d3c05b9bee52c5b6f654ba7c42ea6b454c7bccd8a2a725cf4111ed3eb95f93ef1ed0b365604aef984d3d624e8c234abf8bfe562e75d6dd64c4dc8951b5e371e3be77d60d47db1d164079421747579799730c8414eac6a5b8d3118a036de228035c36074891139cf2e7ca4538fe8d71eefd21bdcfa9d30062baf45ba5914ec66759f8a72c893d5c1118e2e", 0xb5}, {&(0x7f0000000100)="c72a77ee4b19b02f3b89c16accec1c779e535e977406985ae88d3ceb63d03e580b634f2477bb9330a14311ee788ad705f6cb1b681d3232d70a5d7e296d152fb76bf681b5685ffa6a483f90cfb4e1961e3dda93c9314f08bfd130a65097430ecf0c7ef01dccff2e", 0x67}, {&(0x7f0000000800)="ce5b015e0a773f25e4eb3d1d0ee3a8e911397a2d725ebfbb739f846b5ef7d14d48cbfd58895603fcd235c82a464d6ebb09382be26045428c64f5fb7c8c5ae4c5862dc5065eddeb1eab8b2f078222ef05aabb672ea2453509ac49f8efca844d2331257af61355f62576d1fa0470724d709d7cd799dbc5a1c90c8573a4537b5b8ee3caccc8d740d98a2d2a89449131752370fce140319c289e4c8e0251d5ef48de89afe04a302f4be1d5328964042c59fa5ae3e56c9465f603163b4d1526773608f2e445764d70774a95d7a7853bbd460c", 0xd0}, {&(0x7f0000000900)="65b88eba25e07fe5343dbecc83f1fd18a93e834c300a9bdae39c9a635d211d0c6514837c86d0f7f2c516cb83923ca0c6d09a3121ebc35ac42aa5aa2017b19d301a0024bfa02517ae0ba03f359d7b305175d8c126afdec137a1b290c5f91b37befa98596500898f5f1fdfe67b36aac3c49019d5b646d94329c9e98a0a621e", 0x7e}], 0x7, 0x0) sendto$inet6(r3, &(0x7f0000000bc0)="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", 0x0, 0x400806e, &(0x7f0000000b80)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@loopback, @in6=@dev}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x60000, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x201, 0x0) 09:21:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 09:21:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@local}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:37 executing program 1: add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000440), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4e61, 0x141040) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000040)) 09:21:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=0x0, &(0x7f0000000380)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000003c0)={r2, @in6={{0xa, 0x4e20, 0x4, @mcast1, 0x6}}, 0x2, 0x6000000000000}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r4 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r4, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r4, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0x0, @empty, 0x4e20, 0x0, 'rr\x00'}, 0x2c) 09:21:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 09:21:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003f80)=[{{&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/113, 0x71}], 0x1, &(0x7f0000000580)=""/235, 0xeb}}, {{&(0x7f0000000d00)=@llc, 0x80, &(0x7f0000001080), 0x0, &(0x7f0000001100)=""/11, 0xb}}], 0x2, 0x0, &(0x7f0000004200)) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xffe0) [ 544.166433] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20000 09:21:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) 09:21:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x18) 09:21:38 executing program 1: geteuid() r0 = open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="05", 0x1}], 0x1, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) write(r0, &(0x7f0000000500), 0xfffffe66) 09:21:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff00000000834f0000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r2, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:38 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1b, 0xb00) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'skcipher\x00'}, {0x20, 'wlan0[selinux&'}, {0x20, 'skcipher\x00'}, {0x20, 'skcipher\x00'}, {0x20, 'skcipher\x00'}, {0x20, 'ecb(twofish)\x00'}, {0x20, '\'posix_acl_accesseth0'}, {0x20, 'skcipher\x00'}], 0xa, "7ffb00a0acb96b8a2f40e938dcf45d8664ca61ac732ed5e79b6b0a475a5a56e6f2bb4288c8f7eb2172e679024decd2da9510428a6eb1612bfec4d4fb27898c4b21fd55b1ba1e118e62769e89ab591f791549a953aab91bddc77b1843a61b85dfefcd5e90c90c46ad39ecfd847c6f75eceb7eaafe7c5b49858154c6ed32d72918fdfdc7"}, 0xf3) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) [ 544.788549] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 544.912519] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 09:21:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) socket$inet6(0xa, 0x80f, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 09:21:39 executing program 1: munmap(&(0x7f0000000000/0x600000)=nil, 0x600000) mincore(&(0x7f0000587000/0x2000)=nil, 0x2000, &(0x7f0000000040)=""/4096) 09:21:39 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 09:21:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x0, 0xc0, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000003e0a2c1900000000000000000000000000000000000000000000ffffffff0000000000000000000000000000001db8ce221433505a000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000"]}, 0x138) r2 = socket$inet6(0xa, 0x100000002, 0x0) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4607093903d60000000000000003000600020000005b030000000000004000000000000000080200000000000001010000ffff38000200ffff0800ff00000000000000000094da00000000000040000000000000000000000000000000070000000000000005000000000000003f00000000000000af338eb13ada326f9fa1399eb502bd515392d2c71a9f60e1b4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b295000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x591) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 09:21:39 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000040)=""/187, 0xbb) 09:21:39 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @rand_addr}, {0x0, @random="4107badbfac3"}, 0x0, {0x2, 0x0, @remote}, 'irlan0\x00'}) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0xffffffffffffffff, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xffe0) 09:21:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) 09:21:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) fcntl$getflags(r2, 0x401) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x93, [0x0, 0x20000280, 0x200002b0, 0x200002e0], 0x0, &(0x7f0000000040), &(0x7f0000000400)=ANY=[@ANYRESHEX=r1, @ANYPTR, @ANYRESHEX=r2, @ANYRESOCT, @ANYRES64=r1, @ANYRES32=0x0, @ANYRESHEX=r2, @ANYRESOCT, @ANYRES32=r1, @ANYRESOCT=r0]}, 0x10b) recvfrom$unix(r2, &(0x7f00000001c0)=""/239, 0xef, 0x10000, 0x0, 0x0) exit(0x3) r3 = socket$inet6(0xa, 0x100000002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x400000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r3, &(0x7f00000002c0), 0x0, 0x400806e, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c) sendto$inet6(r3, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:21:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x3) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) close(r2) r3 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000380)={0x80000001, 0x3, 'client0\x00', 0xffffffff80000003, "176ff0d531a80efc", "b2f3db3be653b71c4527ed726d2ba132b888b7badfcaf6cd4dc591e6a3717a94", 0x1, 0x7}) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10401, 0x120) io_setup(0x19, &(0x7f0000000100)=0x0) io_pgetevents(r5, 0x1, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r4, 0x80045700, &(0x7f00000000c0)) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 545.891335] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 09:21:40 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x14) ptrace$cont(0x20, r0, 0x0, 0x7) wait4(0x0, &(0x7f0000000000), 0x20000008, &(0x7f0000000080)) 09:21:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) 09:21:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000000c0)={0x4, 0x3, 'client0\x00', 0xffffffff80000001, "70581ae0bc1073ba", "6acb3857f4607a8f9c49bdf0cf35fedb5baf3663744e4f0df5996dd29e65971e", 0x9, 0x8e58}) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) arch_prctl(0x1001, &(0x7f0000000280)="07dc79765fe21fe91ce06dac96b46252f565b7fe7df63786f005e5ec3c56a400a0e11a061961e8cca66d5a1111cec973bd1c8a7295a17b6684fabd6a40f9505e272ad08fabd17ba57e088af32914cf4dee259d8092d12786f242546c2d186b165789dd78684ecaf02aadd632358452f3fed5e2cdcb25bc2cf45f67bce92f61ab038b3001fc9c80cee3948060e0de9b2e0f95951942b5dfea903f6d68ffd787b6bb5fa11bbfc62f9e6f210a23ce3a9674acb6d880c93c542a94d5a5fed119a3aa95092eca2ff5508ddca26790d27742ddaac4226b2e5172") recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) [ 546.219884] ptrace attach of "/root/syz-executor3"[14397] was attempted by "/root/syz-executor3"[14398] 09:21:40 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0xffffff7a}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc={0x27, 0x8}, 0xb6, &(0x7f0000000100)}, 0x0) 09:21:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="5fe082368c4477fbdd4c24aa632cfe7232f30a31d9608398fb4bfd1cb782b6fdd768ccf61a940b96d917931519f18f90d7cec63684766fbfe3e58c04efba008057eff7ea29a8e0b616cf8db3543800631fdcb04d42bba6675088adc103483f1d6f40814c4067ac158bb62dc6160340af856ec5b3e8d5084ee2829f4571a3549e4b307de819388e597b74e789aaa31ae48db1a3", 0x93) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000040)=0x2, 0x4) recvmsg(r1, &(0x7f0000000c00)={&(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000bc0)=""/45, 0x2d}, 0x0) 09:21:40 executing program 1: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180), 0x8) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getitimer(0x0, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) sched_setattr(0x0, &(0x7f00000002c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 546.600409] ================================================================== [ 546.607865] BUG: KMSAN: uninit-value in sit_tunnel_xmit+0x1b14/0x3d10 [ 546.614480] CPU: 1 PID: 14407 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #69 [ 546.621769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.631137] Call Trace: [ 546.633762] dump_stack+0x306/0x460 [ 546.637420] ? _raw_spin_lock_irqsave+0x227/0x340 [ 546.642295] ? sit_tunnel_xmit+0x1b14/0x3d10 [ 546.646759] kmsan_report+0x1a2/0x2e0 [ 546.650633] __msan_warning+0x7c/0xe0 [ 546.654480] sit_tunnel_xmit+0x1b14/0x3d10 [ 546.658795] ? ipip6_tunnel_uninit+0x7e0/0x7e0 [ 546.663423] dev_hard_start_xmit+0x6b8/0xdb0 [ 546.667908] __dev_queue_xmit+0x2e62/0x3d90 [ 546.672308] dev_queue_xmit+0x4b/0x60 [ 546.676146] ? __netdev_pick_tx+0x1490/0x1490 [ 546.680679] packet_sendmsg+0x853e/0x9170 [ 546.684900] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 546.690288] ? aa_sk_perm+0x739/0x960 [ 546.694179] ___sys_sendmsg+0xe47/0x1200 [ 546.698291] ? compat_packet_setsockopt+0x360/0x360 [ 546.703351] ? __fget+0x8f7/0x940 [ 546.706906] __se_sys_sendmsg+0x307/0x460 [ 546.711125] __x64_sys_sendmsg+0x4a/0x70 [ 546.715221] do_syscall_64+0xbe/0x100 [ 546.719066] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 546.724279] RIP: 0033:0x457569 [ 546.727494] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.746416] RSP: 002b:00007f85b4918c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 546.754154] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 546.761448] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 546.768739] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 546.776042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85b49196d4 [ 546.783329] R13: 00000000004c3823 R14: 00000000004d5640 R15: 00000000ffffffff [ 546.790643] [ 546.792289] Uninit was created at: [ 546.795869] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 546.800999] kmsan_kmalloc+0xa4/0x120 [ 546.804828] kmsan_slab_alloc+0x10/0x20 [ 546.808846] __kmalloc_node_track_caller+0xb43/0x1400 [ 546.814059] __alloc_skb+0x422/0xe90 [ 546.817798] alloc_skb_with_frags+0x1d0/0xac0 [ 546.822322] sock_alloc_send_pskb+0xe00/0x1420 [ 546.826934] packet_sendmsg+0x6874/0x9170 [ 546.831117] ___sys_sendmsg+0xe47/0x1200 [ 546.835202] __se_sys_sendmsg+0x307/0x460 [ 546.839377] __x64_sys_sendmsg+0x4a/0x70 [ 546.843463] do_syscall_64+0xbe/0x100 09:21:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/255, 0xff}], 0x1, &(0x7f0000000740)=""/248, 0xf8}}], 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}) [ 546.847289] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 546.852485] ================================================================== [ 546.859858] Disabling lock debugging due to kernel taint [ 546.865325] Kernel panic - not syncing: panic_on_warn set ... [ 546.865325] [ 546.872737] CPU: 1 PID: 14407 Comm: syz-executor2 Tainted: G B 4.19.0-rc7+ #69 [ 546.881417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.890792] Call Trace: [ 546.893435] dump_stack+0x306/0x460 [ 546.897119] panic+0x54c/0xafa [ 546.900402] kmsan_report+0x2d3/0x2e0 [ 546.904245] __msan_warning+0x7c/0xe0 [ 546.908100] sit_tunnel_xmit+0x1b14/0x3d10 [ 546.912434] ? ipip6_tunnel_uninit+0x7e0/0x7e0 [ 546.917049] dev_hard_start_xmit+0x6b8/0xdb0 [ 546.921529] __dev_queue_xmit+0x2e62/0x3d90 [ 546.925937] dev_queue_xmit+0x4b/0x60 [ 546.929777] ? __netdev_pick_tx+0x1490/0x1490 [ 546.934308] packet_sendmsg+0x853e/0x9170 [ 546.938533] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 546.943927] ? aa_sk_perm+0x739/0x960 [ 546.947787] ___sys_sendmsg+0xe47/0x1200 [ 546.951861] ? compat_packet_setsockopt+0x360/0x360 [ 546.956902] ? __fget+0x8f7/0x940 [ 546.960547] __se_sys_sendmsg+0x307/0x460 [ 546.964721] __x64_sys_sendmsg+0x4a/0x70 [ 546.968795] do_syscall_64+0xbe/0x100 [ 546.972648] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 546.977872] RIP: 0033:0x457569 [ 546.981090] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.000001] RSP: 002b:00007f85b4918c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 547.007719] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 547.015001] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 547.022274] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 547.029568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f85b49196d4 [ 547.037001] R13: 00000000004c3823 R14: 00000000004d5640 R15: 00000000ffffffff [ 547.045278] Kernel Offset: disabled [ 547.048920] Rebooting in 86400 seconds..