x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}) 21:31:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0xa}, 0x0) 21:31:05 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea04c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:05 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0xfffffffd}}], 0x60) 21:31:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc55123c123f319bd07048966494d9277a806ccb303b4d8568996d2cd0609220e59ab9bb0bd634b6e00cc72a46e1ab41") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) syz_execute_func(&(0x7f0000000140)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7085958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000200)=@sha1={0x1, "9727f16436402f2bc0d4939b9ffa4b1d5d1b0da8"}, 0x15, 0x2) 21:31:05 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0xfffffffe}}], 0x60) 21:31:05 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0xb}, 0x0) 21:31:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:06 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x100000000000000}}], 0x60) [ 2896.024705] audit: type=1400 audit(1556314265.991:195): avc: denied { setattr } for pid=2125 comm="syz-executor.1" name="stack" dev="proc" ino=814862 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 21:31:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}) 21:31:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") [ 2896.205978] validate_nla: 36 callbacks suppressed [ 2896.205990] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:06 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:06 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x200000000000000}}], 0x60) 21:31:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10100c000000000]}) 21:31:06 executing program 1: shmget(0x1, 0x4000, 0x20, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2896.458806] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:06 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:06 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x300000000000000}}], 0x60) 21:31:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x10}, 0x0) 21:31:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d564b00000000]}) 21:31:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getpeername(r0, &(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, &(0x7f00000000c0)=0x80) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r1, r2) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:06 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:06 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x400000000000000}}], 0x60) [ 2896.829723] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2896.858848] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:06 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x500000000000000}}], 0x60) [ 2896.926936] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2896.963054] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x300}, 0x0) 21:31:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:07 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f0000000080)=@un=@abs, &(0x7f0000000100)=0x80) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e22, 0x80, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}, {0xa, 0x4e20, 0xf91a, @dev={0xfe, 0x80, [], 0x29}, 0x200}, 0x0, [0x2, 0x2, 0x5, 0x8, 0x6, 0x5, 0x48000, 0x5]}, 0x5c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000040)={0x7, 0x5}) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}) 21:31:07 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x800000000000000}}], 0x60) [ 2897.167420] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2897.202070] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2897.247177] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2897.261461] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x42540, 0x0) bind$can_raw(r1, &(0x7f0000000080), 0x10) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") accept4$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c, 0x80800) 21:31:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0xffffff1f}, 0x0) 21:31:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:07 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x80ffffff00000000}}], 0x60) 21:31:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20100c000000000]}) 21:31:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406d5f02f937228094ee2040204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df70f0f618958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666619230f258dd48def0004747d7dc60f1a12895252470f383f894f000000") dup3(r0, r0, 0x80000) 21:31:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x2}, 0x0) 21:31:07 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x81ffffff00000000}}], 0x60) 21:31:07 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000000c0)={0x3, 0x10001, 0x10001, 0x81, 0x1, 0x6}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r2 = getpgid(0x0) open(&(0x7f0000000040)='./file0\x00', 0xe1c957551e5c2412, 0x8) r3 = fcntl$getown(r1, 0x9) tgkill(r3, r2, 0x25) 21:31:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24d564b00000000]}) 21:31:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x3}, 0x0) 21:31:07 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x92ffffff00000000}}], 0x60) 21:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) syz_execute_func(&(0x7f0000000300)="b1c191cd8069b15169dc00d9660f3a400f12f99bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fc4e1ff5fecefef000474c6c60f1a12895252470f383f894f000000") 21:31:08 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x93ffffff00000000}}], 0x60) 21:31:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x4}, 0x0) 21:31:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30001c000000000]}) 21:31:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x94ffffff00000000}}], 0x60) 21:31:08 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xa}, 0x0) 21:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x402) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000080)=0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x100, 0x401, 0x40, 0x1, 0x7fffffff, 0x10000, {0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xf4, 0x8, 0x1, 0xffffffffffffff81, 0xabe}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, &(0x7f0000000200)=0x4) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xe}, 0x0) 21:31:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30100c000000000]}) 21:31:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0xfdffffff00000000}}], 0x60) 21:31:08 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = accept$inet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="7da6d7c280d0f1b144e39b1a15545666458101008b567caf1c3d49856271cff3b06a82448e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x10) 21:31:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:08 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0xfeffffff00000000}}], 0x60) 21:31:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf}, 0x0) 21:31:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000180)=0x1, 0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_extract_tcp_res(&(0x7f0000000100), 0x6b, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0xec}, 0x1, 0x0, 0x0, 0x240080c0}, 0x8040) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:09 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d564b00000000]}) 21:31:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x60}, 0x0) 21:31:09 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x60) 21:31:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x80000002f, &(0x7f0000001300)="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", 0x158e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001c000000000]}) 21:31:09 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x2}}], 0x60) 21:31:09 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf0}, 0x0) 21:31:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x36) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) setuid(0xee01) rmdir(&(0x7f0000000100)='./file0/file1\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x404442, 0x0) write$P9_RSTATFS(r0, &(0x7f00000001c0)={0x43, 0x9, 0x1, {0xffffffffffffffc1, 0x285, 0x80000000, 0x935b, 0xb7e1add, 0x9, 0x9, 0x1000, 0x8}}, 0x43) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@empty, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0/file1\x00', &(0x7f0000000300)='9p\x00', 0x4410, &(0x7f0000000500)={'trans=unix,', {[{@privport='privport'}, {@cache_none='cache=none'}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_gt={'euid>', r1}}, {@fowner_lt={'fowner<', r2}}, {@obj_role={'obj_role', 0x3d, '/dev/hwrng\x00'}}, {@pcr={'pcr', 0x3d, 0x16}}, {@dont_appraise='dont_appraise'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@hash='hash'}]}}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:09 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3}}], 0x60) 21:31:09 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x300}, 0x0) 21:31:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44d564b00000000]}) 21:31:09 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x4}}], 0x60) 21:31:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000080)={'veth1_to_bridge\x00', {0x2, 0xc, @empty}}) syz_execute_func(&(0x7f0000000600)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9400f38ca5043c4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fefefce7074c6c60f1a128952c4470f383f894f000000") r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x200000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x6, 0x62c}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x1, 0x8001, 0x4, 0x8000, 0x10001}, &(0x7f00000001c0)=0x14) 21:31:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xa00}, 0x0) 21:31:09 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:10 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x5}}], 0x60) 21:31:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70001c000000000]}) 21:31:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xe00}, 0x0) 21:31:10 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:10 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x8}}], 0x60) 21:31:10 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x42000, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x282d}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r2, 0xff, 0x2}, 0xc) write$cgroup_pid(r0, &(0x7f00000000c0)=r1, 0x12) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000300)) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000200)={0x100000000, 0x81, 0x401, 0x401, 0x3ff, 0x7}) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000001c0)={0xc487, 0x8}) 21:31:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf00}, 0x0) 21:31:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801004000000000]}) 21:31:10 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:10 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x300}}], 0x60) 21:31:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x3f00}, 0x0) 21:31:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x1024) ioctl(r0, 0x1000000912, &(0x7f00000000c0)="0adc1f1234123f3108d0703d2bf0c0001213b2085c3e35c69bba20c9dfc34cc89b8fdad25bf212226a33846bef623d4e19832f8781ac8f34000000") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x29, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:10 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x500}}], 0x60) 21:31:10 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803000000000000]}) 21:31:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x4000}, 0x0) 21:31:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clock_adjtime(0x4, &(0x7f0000000040)={0x3f, 0x7, 0xaa, 0x1ff, 0x800, 0xffffffff, 0xffff, 0x4, 0xb5f, 0x9, 0x80000001, 0x5, 0x80, 0xfffffffffffffe00, 0x6, 0xfffffffffffffffe, 0x4, 0x8, 0x1, 0xf9c, 0xb5, 0x2, 0x7, 0x2, 0x0, 0x1f}) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000180)=""/184) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400580, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000300)={0x6, @output={0x1000, 0x1, {0x6c8, 0x425}, 0x4, 0x487}}) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:10 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x60) 21:31:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa01000000000000]}) 21:31:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x4458}, 0x0) 21:31:11 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x40000) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000140)={0x8, 'syz0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000080)={{0x0, 0x2, 0x1f, 0x2, 0x9}, 0xffffffffffff7fff, 0x2, 0x2}) 21:31:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x60) 21:31:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2901.275171] validate_nla: 56 callbacks suppressed [ 2901.275180] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2901.372752] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2901.410610] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x3000000}}], 0x60) 21:31:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200002, 0x0) getsockopt$rose(r1, 0x104, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000080)=0x1, 0x4) [ 2901.435870] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}) 21:31:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x5844}, 0x0) 21:31:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x4000000}}], 0x60) 21:31:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfda3, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpeername$unix(r1, &(0x7f0000000080), &(0x7f0000000100)=0x6e) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000300)=[{0x7fffffff, 0x1, 0x200, 0xaf7, @time, {0x6, 0x93}, {0x5b, 0x2}, @control={0x3, 0x0, 0x5}}, {0x6, 0x4, 0x7ff, 0xc78, @tick=0x3, {0xffffffff, 0xffffffffffffff01}, {0x1}, @note={0x4, 0x5, 0xf4, 0x85, 0x9}}, {0x80000001, 0x6, 0x4358, 0x9, @tick=0x4, {0x1, 0x6}, {}, @raw32={[0x7fff, 0x8000, 0x9]}}, {0x8, 0x1000, 0x1ff, 0xfffffffffffffffe, @time={r2, r3+10000000}, {0x1, 0xffffffff}, {0xfffffffffffff7c1, 0x2}, @queue={0xfffffffffffffffe, {0x4, 0x200}}}, {0x7fff, 0x3, 0x8, 0x0, @tick, {0x8, 0x7}, {0x7, 0x1}, @ext={0x25, &(0x7f0000000180)="63207f419f85de38b66ee7601eb1cab1a9d35bfe95ca38514929908049edcfb70586424f69"}}, {0x27, 0x2, 0x96, 0xfffffffffffff71f, @tick=0x4, {0x1, 0x2a27}, {0x5}, @result={0x6, 0x100000000}}, {0x1, 0xffff, 0x7, 0x3, @time={0x77359400}, {0x1, 0x9}, {0x7, 0x6}, @raw32={[0x4, 0x5, 0x3]}}, {0x7, 0x7, 0x1, 0x0, @tick=0x1, {0x6, 0x7}, {0x9, 0x6}, @addr={0x9, 0xffffffffffff4c7b}}], 0x180) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") [ 2901.723036] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2901.772873] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2901.815359] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0x60) 21:31:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}) [ 2901.913481] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0xfffffffffffffffd) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x3) openat$cgroup_ro(r1, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 21:31:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x6000}, 0x0) 21:31:12 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00<\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:12 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x8000000}}], 0x60) [ 2902.205767] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fgetxattr(r0, &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000300)=""/4096, 0x1000) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = dup(r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000001300)=@nat={'nat\x00', 0x1b, 0x5, 0x650, 0x170, 0x170, 0x2b8, 0x2b8, 0x0, 0x580, 0x580, 0x580, 0x580, 0x580, 0x5, &(0x7f0000000080), {[{{@ipv6={@dev={0xfe, 0x80, [], 0x14}, @loopback, [0xffffff00, 0xffffffff, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff, 0xffffff00], 'bridge_slave_0\x00', 'vxcan1\x00', {0xff}, {}, 0x0, 0x67, 0x2, 0x40}, 0x0, 0x128, 0x170, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x3a, 0x5, 0x7a25, 0x100000001, 0x8, 0x0, 0x4d0}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x0, 0x9, 0xf6c, 0x2a}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x1b, @ipv4=@dev={0xac, 0x14, 0x14, 0x18}, @ipv6=@empty, @port=0x4e21, @gre_key=0x4}}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@unspec=@quota={0x38, 'quota\x00', 0x0, {0x1, 0x0, 0xfffffffffffffff9, 0x877f}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@loopback, 'ip_vti0\x00', 0xcad}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x3, 0x9, 0x1}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x12, 0x100, 0x2, 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x2, @ipv4=@broadcast, @ipv4=@broadcast, @port=0x4e23, @icmp_id=0x66}}}, {{@ipv6={@mcast2, @local, [0xff000000, 0xffffff00, 0xff000000, 0xff000000], [0xffffffff, 0xffffff00, 0xff000000, 0xffffffff], 'erspan0\x00', 'veth0_to_bridge\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x1, 0x48}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@frag={0x30, 'frag\x00', 0x0, {0xfffffffffffffffe, 0x4e, 0x7, 0x0, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x2, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv6=@local, @icmp_id=0x64, @gre_key=0x40}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) [ 2902.245965] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:12 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:12 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x80ffffff}}], 0x60) 21:31:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}) 21:31:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf000}, 0x0) 21:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bd070") ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/snmp\x00') ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000140)=""/74) r2 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000040)=""/189) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:12 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:12 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x81ffffff}}], 0x60) 21:31:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x30000}, 0x0) 21:31:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150001c000000000]}) 21:31:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x4, 0x2000) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000000c0)="a00465451e388d03178b6e1680a9fa1ae71cbdfa78e3f1073a72841f906089b176b62a6ab01bc2eb77c1292e0055f0e5fb52b4e06aaabd6843949fc5ce0283fe79f30c96db67e0b813f43d898dae83570681a1851cd02044d496eb435d39fb9d02e1239b2b77a0ce947807f0e08f5ba5a8b5aef690d1ce2dfd993e810ae0ca9840bbc981e6b11efcd70c9bc81197784156a34e8f22174718a02e6e1fe23581a2a4e6feaa206695f06ab9f01e4f79c7c3ae51e257cfbd86b16426cdf1a6db014f1de6e9a39b51268ba56307043581f25b3d5b59e0d3b53fd404a1a46775cde69278b8dec21bb3e9817d8a8f", 0xeb) recvfrom$ax25(r1, &(0x7f00000001c0)=""/71, 0x47, 0x100, &(0x7f0000000240)={{0x3, @bcast, 0x7}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$TCFLSH(r1, 0x540b, 0x38a) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f12aca1d2b00ad723a03aa8a23c123f319bd070") 21:31:12 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x92ffffff}}], 0x60) 21:31:12 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x34000}, 0x0) 21:31:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:13 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x93ffffff}}], 0x60) 21:31:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) 21:31:13 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00C\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x400300}, 0x0) 21:31:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x170101c000000000]}) 21:31:13 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x94ffffff}}], 0x60) 21:31:13 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0xa, 0x0, 0x0, 0x0, 0x8906}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00') syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x102) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x100, 0x32, 0x3, 0x9, 0x2}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0xfffffffffffffff9, 0x8, 0x7fffffff, 0x6, 0xaa}, 0x14) 21:31:13 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00D\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf0ffff}, 0x0) 21:31:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000]}) 21:31:13 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfdffffff}}], 0x60) 21:31:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x1000000}, 0x0) 21:31:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4800, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000200)=0x6) write$FUSE_STATFS(r1, &(0x7f0000000140)={0x60, 0x0, 0x6, {{0x6, 0x3, 0x9, 0x8, 0x3, 0x5, 0x7, 0x7}}}, 0x60) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f00000001c0)={0x91, &(0x7f0000000080)=""/145}) 21:31:13 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:13 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfeffffff}}], 0x60) 21:31:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b0001c000000000]}) 21:31:13 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x2000000}, 0x0) 21:31:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ustat(0xfffffffffffffffb, &(0x7f0000000040)) ioctl(r0, 0x4, &(0x7f0000000000)="0adc1f123c1255f219da9d") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:14 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xffffff80}}], 0x60) 21:31:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x3000000}, 0x0) 21:31:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10040, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x19c00000000000}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x6ad}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="f5c401dde0fc5169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r3 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x8ce, 0x102) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="73797adc9e8276c1"], 0x8) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000380)=0x2, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x5, 0x101000) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x2}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x100, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x4, 0x83, 0x83, 0x3, 0x9}, 0x10) 21:31:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01000000000000]}) 21:31:14 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xffffff81}}], 0x60) 21:31:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x4000000}, 0x0) 21:31:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:14 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="0700002069c6c4f229ec2172672c28fcc03b57dece29f419eb", @ANYRES16=r1, @ANYBLOB="00042abd7000fcdbdf2502000000380002000800020081000000080002000900000004000400080002000600000004000400040004000400040004000400080002000700000008000200040004009000040054000700080002000004000008000400ff030000080002000900000008000100010000000800040097090000080002004d4c000008000200020000000800040000000000080004000600000008000200030000000c00070008000200fcffffff0c00010073797a31000000000c00070008000100110000001400070008000300ff01000008000200060000001800070008000200ff0100000c00040005000000000000007400050024000200080001001c000000080001000f00000008000100040000000800030026f1ffff08000100657468003c0002000800030059eb157f080002000000000008000100110000000800020008000000080002000200000008000400000001000800030007000000080001007564700034000700080001000700000008000100020000000c00030008000000000000000c0004000400000000000000080001000800000014000100100001007564703a73797a32000000001400070008000100f90a000008000100000000002c00060008000100040000000400020008000100000001000800010007000000080001004f000000040002001c00070008000100c0ffffff0800010008a100000800010006000000"], 0x214}, 0x1, 0x0, 0x0, 0xc0}, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:14 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xffffff92}}], 0x60) 21:31:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f0001c000000000]}) 21:31:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r2, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000200)) 21:31:14 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xffffff93}}], 0x60) 21:31:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xa000000}, 0x0) 21:31:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:14 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xffffff94}}], 0x60) 21:31:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c000000000]}) 21:31:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4004900}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x2, 0x70bd26, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xe000000}, 0x0) 21:31:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:15 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfffffffd}}], 0x60) 21:31:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf000000}, 0x0) 21:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x2, 0x0, @ioapic={0x6000, 0x2, 0x40d, 0x9, 0x0, [{0x7, 0x64, 0x2, [], 0x7f}, {0x5, 0x611e, 0x4, [], 0x7}, {0x7, 0x0, 0xfffffffffffffffb, [], 0x100000000000}, {0x1, 0xffffffffffffffff, 0x5c, [], 0x1ff}, {0x0, 0x3ff, 0x0, [], 0x7146}, {0x1, 0x8, 0x100000001, [], 0x1bea8052}, {0x401, 0x1ff, 0x6, [], 0x4}, {0x1000000000000, 0x10001, 0x6, [], 0x4}, {0x7, 0x200, 0x30e0, [], 0x1f}, {0x0, 0x7, 0x5, [], 0x1f67}, {0x0, 0x5eb, 0x200, [], 0x9}, {0x1f, 0xfffffffffffffff7, 0xfd5, [], 0x401}, {0x7, 0xfffffffffffffff9, 0x8, [], 0x1}, {0x8, 0x3ff, 0x3, [], 0x5}, {0x4, 0x9, 0x6, [], 0xfdec}, {0xb3f7, 0x2, 0x401, [], 0x5}, {0x7f, 0xb8, 0x80, [], 0x20}, {0x6, 0x5, 0x3, [], 0x5}, {0x80000001, 0x4, 0x6, [], 0x3}, {0xebd, 0xeed2, 0x1, [], 0xfffffffffffffeff}, {0xa3b, 0x3, 0x6, [], 0x200}, {0x10000, 0x4, 0x1, [], 0x5}, {0x40, 0xffffffffa23f1020, 0x3, [], 0x6}, {0xfff, 0x7f, 0x9, [], 0x1}]}}) shmget(0x0, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) recvfrom$unix(r1, &(0x7f0000000080)=""/138, 0x8a, 0x21, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 21:31:15 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x221001c000000000]}) 21:31:15 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfffffffe}}], 0x60) 21:31:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x3f000000}, 0x0) 21:31:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc16543c0b606000000f3ad58f34390b05852b05ff9f2406df046f6583d8094ee46984238440fba3608c1ea01c48192558dc3c366450f188f4834a25edef646f2b4aeaed3be1f31df7095c442791356008faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3dfd9ffd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:15 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x60) 21:31:15 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a1001c000000000]}) 21:31:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x40000000}, 0x0) 21:31:15 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x200000000000000}}], 0x60) 21:31:15 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") pause() 21:31:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x58440000}, 0x0) 21:31:15 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x300000000000000}}], 0x60) 21:31:15 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c1001c000000000]}) 21:31:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x60000000}, 0x0) 21:31:16 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x400000000000000}}], 0x60) 21:31:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000]}) 21:31:16 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x500000000000000}}], 0x60) [ 2906.345063] validate_nla: 62 callbacks suppressed [ 2906.345073] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2906.398094] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2906.432778] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2906.475426] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x10000) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000080)={0xfffffffffffff800}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x9effffff}, 0x0) 21:31:16 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x800000000000000}}], 0x60) 21:31:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00000000000000]}) [ 2906.806971] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2906.818494] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:16 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}}], 0x60) [ 2906.898128] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b00000000000000]}) [ 2906.938657] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf0ffffff}, 0x0) 21:31:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:17 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x81ffffff00000000}}], 0x60) 21:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xff, 0x100) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) sendmsg$key(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="0216019b08f2bf672bbd7000fedbdf0802000100000004d6000e6202010000a0100018000122720056348eb272da0743388db1e2a0357a7fe100f4a70200004fdfa5712c10c62d41bd08270c8fc6d5c6b1a302c0f526f44d5d00b7d6aaa78f30dcc7309fb6b42a8008b0397ac7a6f7ef9516b0af876d9c95826a4486f88387ab77000000000000000000000000ff000000000000000000000000000000000000ed12d177be45d4052473324d88bc275e426aa496f1238341fe07dff1e7ae34d7d248f07c871de20c0ba1deb61515841f4405ad4a071b3471b45e843f455f72273df7950467f9d6e8622153bdbec07743bb"], 0xa0}}, 0x40000) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4ef09000474c6c60f1a12895252470f383f894f000000") 21:31:17 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x84\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2907.253432] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2907.269428] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001000000000000]}) 21:31:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xfffff000}, 0x0) 21:31:17 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x92ffffff00000000}}], 0x60) 21:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x2, 0x8, &(0x7f0000000080)=0xff}) 21:31:17 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x87\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400101c000000000]}) 21:31:17 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x93ffffff00000000}}], 0x60) 21:31:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xffffff7f}, 0x0) 21:31:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:17 executing program 1: r0 = getpgid(0xffffffffffffffff) process_vm_writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/239, 0xef}, {&(0x7f0000000140)=""/78, 0x4e}, {&(0x7f00000001c0)=""/25, 0x19}, {&(0x7f0000000300)=""/84, 0x54}], 0x4, &(0x7f0000000640)=[{&(0x7f0000000380)=""/124, 0x7c}, {&(0x7f0000000400)=""/231, 0xe7}, {&(0x7f0000000500)=""/45, 0x2d}, {&(0x7f0000000540)=""/255, 0xff}], 0x4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:17 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xffffff9e}, 0x0) 21:31:17 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0x94ffffff00000000}}], 0x60) 21:31:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x8001) setsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f0000000080)=0x8001, 0x4) fchmodat(r1, &(0x7f00000000c0)='./file0\x00', 0x40) ioctl(r0, 0x1000008912, &(0x7f0000000000)="ecdb1f123c123f31bbd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x410101c000000000]}) 21:31:18 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f00000000c0)={0x5}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 21:31:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:18 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:18 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000}}], 0x60) 21:31:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xfffffff0}, 0x0) 21:31:18 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:18 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}], 0x60) 21:31:18 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x121000) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)={0x80000008}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000001c0)={0x33, 0x6, 0x0, {0x1, 0x1, 0xa, 0x0, '/dev/cuse\x00'}}, 0x33) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000680)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x9, 0x3, 0x320, 0x120, 0x0, 0x120, 0x120, 0x120, 0x250, 0x250, 0x250, 0x250, 0x250, 0x3, &(0x7f0000000200), {[{{@ipv6={@mcast2, @mcast1, [0xffffffff, 0xff, 0xffffffff, 0xff], [0xff000000, 0xff000000, 0xffffffff, 0xff], 'bridge_slave_0\x00', 'dummy0\x00', {0xff}, {0xff}, 0x3b, 0x0, 0x4, 0x10}, 0x0, 0xf0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x2, 0x0, 0x5}}}, {{@ipv6={@mcast2, @rand_addr="9edcaa8074c6d9e720c90ba03eae8717", [0xff, 0x0, 0xffffffff, 0xffffffff], [0xff000000, 0x0, 0xffffffff], 'team_slave_0\x00', 'veth0\x00', {0xff}, {0x51643431d7696e85}, 0x0, 0x1, 0x1, 0x1}, 0x0, 0xc8, 0x130}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0xc05e, 0x4, 0x1, 'snmp_trap\x00', 'syz1\x00', 0x400}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) socketpair(0xa, 0x2, 0xffffffffffff3615, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0xfffffffffffffef7) 21:31:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}) 21:31:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x3000000000000}, 0x0) 21:31:18 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:18 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @note={0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x60) 21:31:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0xffffffff00000001, 0x4) 21:31:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x40030000000000}, 0x0) 21:31:18 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4900000000000000]}) 21:31:18 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x3) 21:31:18 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)="9210eae8d245837cb94c1fb8c586aa71efc7316111dcaf7f0d95bf5c1064eacbe5d34f09f96cb91fa3ffadeb32f220ddb7cd783b310ed01b05d6fb5421", 0x3d}, {&(0x7f0000000440)="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", 0x114}], 0x2, &(0x7f0000000200)}, 0x800) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(r0, 0x409, 0x2) ioctl(r1, 0x2, &(0x7f0000000040)="911ad07000000000000000") r2 = getuid() ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000300)={0x3, @bcast, r2}) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000140)=0x7f, 0x2) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") getsockname(r1, &(0x7f0000000080)=@alg, &(0x7f0000000000)=0x80) 21:31:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf0ffffffffffff}, 0x0) 21:31:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:19 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x7) 21:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fadvise64(r0, 0x0, 0x55c, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x100000000000000}, 0x0) 21:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x580001c000000000]}) 21:31:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:19 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x200001a0) 21:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") syslog(0x55ccd6ab, &(0x7f0000000040)=""/57, 0x39) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000080)=ANY=[]) 21:31:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x200000000000000}, 0x0) 21:31:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7401000000000000]}) 21:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) accept4$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x1c, 0x0) 21:31:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x300000000000000}, 0x0) 21:31:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7501000000000000]}) 21:31:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x40402, 0x0) write$9p(r1, &(0x7f0000000240)="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", 0x1000) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x800) accept$unix(r2, &(0x7f0000000140), &(0x7f0000001240)=0x6e) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000040)={0x2, 0x10d000, 0x1355, 0xfff, 0x800}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000014c0)=0xe8) sendto$packet(r1, &(0x7f0000001300)="880034f3e67fa3e97cc2d47f45a598d58d32f60eae111711a301beff4f11b4838912f41d1703e44d330dad2691d0763be02633e5c6f323798cb41f89199a87109cc80eed45389c9bc2356286c140e3dee17a986266b1a33be0a75cd03c83ea7c28daee99e7f352c564ab2264f7e9730b8a3ccd7c6ba6882d07aa45c6e4def955555774269e669a06f1425b6f4a44967ae1e59e674165bef0af7463ffb3964333308561", 0xa3, 0x800, &(0x7f0000001500)={0x11, 0x3, r3, 0x1, 0x3f}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000001540)=ANY=[@ANYBLOB="0200000061add30276e8a7e7c733c19d2d3fa17d39f60923e37b62ce1611154806ecef687aa2b5b6f6c67c691af69ded0d611d77504cb7460cb85871cb181e2198d873faaa78e41dc97384", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000001280)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000012c0)={r4, 0x1}, 0x8) 21:31:23 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}}) 21:31:23 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:23 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="b1c181cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc13666d26c66140fc4014cad58f34390b05852b05ff9f2406dd4d4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746aed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4ef50ff6fff6f74c6c60f1a12895252470f383f894f000000") 21:31:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7601000000000000]}) 21:31:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x400000000000000}, 0x0) [ 2913.227884] validate_nla: 42 callbacks suppressed [ 2913.227894] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6erspan0\x00') syz_execute_func(&(0x7f0000000480)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2c012c4224d3e460f8094ee2042410fbdd5440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095950f380a815ef3fd9ac401fe5ff6e3df6467b667efef0004741a12895252470f383f894f000000") [ 2913.274692] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:23 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:23 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x4, 'syz0\x00', @default, 0x6, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000100)=0x4415, 0x4) [ 2913.326800] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2913.401534] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7702000000000000]}) 21:31:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xa00000000000000}, 0x0) 21:31:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xfffffffffffffc1a, 0x4041) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000100)={0x4, 0x2}) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000080)=0x6) 21:31:23 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/147, 0x93}, {&(0x7f00000001c0)=""/38, 0x26}, {&(0x7f0000000200)=""/182, 0xb6}, {&(0x7f00000002c0)=""/51, 0x33}, {&(0x7f0000000300)=""/172, 0xac}], 0x5, &(0x7f0000000440)=""/196, 0xc4}, 0x103) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xff, 0x20000) 21:31:23 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2913.687681] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2913.742149] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:23 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) [ 2913.814565] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2913.829357] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7900000000000000]}) 21:31:23 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x4044, 0x0) write$sndseq(r0, &(0x7f0000000140), 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040)=0x800, 0x9) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000100)={r1, &(0x7f00000001c0)=""/4096}) 21:31:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:23 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xe00000000000000}, 0x0) 21:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0xa400, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x300c81ae}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x10000, 0x3}, 0x8) 21:31:24 executing program 0: write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2914.138495] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2914.195061] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a01000000000000]}) 21:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0xc91a, 0x6, 0x0, 0x101}) 21:31:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf00000000000000}, 0x0) 21:31:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x5, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000001c0)={0x4, 0x0, 0x2, 0xffffffff, 0xe, 0x100000001, 0xffffffffffffff41, 0x7ff, 0x9a, 0x7, 0x1, 0x5}) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x7, 0x1848}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="fe074e780ab80300f40000000000"], &(0x7f0000000200)=0xe) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0xffffffffffffffe1, 0x1ff, 0x2, 0x9, 0x3, 0x9, 0x4, {r2, @in={{0x2, 0x4e24, @empty}}, 0x4e8, 0x6, 0x7, 0x9, 0x5}}, &(0x7f0000000300)=0xb0) 21:31:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b01000000000000]}) 21:31:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x3f00000000000000}, 0x0) 21:31:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @time, {0x8}}], 0x60) 21:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20800, 0x0) connect$unix(r1, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x4000000000000000}, 0x0) 21:31:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x0, 0xd000000000000000}, {0x100, 0x1000000}, @connect}, {0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {0x8}, {0x48000000000}, @queue={0x8, {0x7fffffff, 0x8}}}], 0x60) 21:31:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000080)) 21:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f04000000000000]}) 21:31:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x5844000000000000}, 0x0) 21:31:25 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x100000000, 0x1, 0x0, 0x2, @tick, {0x0, 0xfffffffffffffffc}, {}, @ext={0x0, &(0x7f0000000040)="8a4fadc3000cc6dde5"}}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x7) 21:31:25 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:25 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x805, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x6000000000000000}, 0x0) 21:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000c000000000]}) 21:31:25 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x1, 0x0) sendto$isdn(r0, &(0x7f0000000140)={0x40, 0x4, "2134f77375a005ae2aa2427b6c016036c188ba519ce1268dc8285a901f905c31a712ef859f569cbecdee668b6a49ceafa739422c92866336d918928b6368cfea2cea7521d7a69ae611f03c09378d1d6477211ff1a80f6e4f53aa0bc84fb261f4be03a1ddcca627e7cd8f37fc4ba10b98bc50721e44737ff057bbade33bea73278bb0fc00fa2de2adc4e53ff753d3615bebebc5a9e7cf26d67f89c61d1ab35ef21514c681fa4297c76da2d12e3b80bb461dcdec65"}, 0xbc, 0x4, &(0x7f0000000200)={0x22, 0x401, 0x3, 0x1, 0x5}, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x7}) r2 = fcntl$dupfd(r1, 0x406, r1) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000080)=0x5, 0x4) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x77359400}, 0x10) 21:31:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:25 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:25 executing program 0: write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101200, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000001c0)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0xc}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, 0x9, 0x66, 0x7, 0x100, 0x8, 0x80, r1}) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000200)={0x63, "79b80e674700b71e736c950010f68112b3eb2fd6d137ed30cad3d5a5bb8abda87b8ab97083ab435a44a82eaaf18841970fd3ff7d8e09fab6caefed97f9d8b8e92e92abdcf474d8b9d4951c9e682f301ae1790e4d4e1dc7343509b272b10efc62c15a43f06f50d30f67841813ef9a6d0babbce8e1940a67988ffb11e1208b620f"}) 21:31:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x9effffff00000000}, 0x0) 21:31:25 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000180)={@loopback, @empty, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$can_bcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x1d, r2}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x7, 0x240, 0x0, {}, {0x77359400}, {0x4, 0x81, 0xb, 0x867}, 0x1, @canfd={{0x2, 0x3, 0x800, 0x5}, 0x1e, 0x1, 0x0, 0x0, "368b6c784f6e3a4ebc8ad2d7df5b69db3dd95e4808e6dd7f363c2e6f75e2e3f8be7270c646b14b49474451c22e0337808fb17d59d9b9b122ec3103d391110dd1"}}, 0x80}, 0x1, 0x0, 0x0, 0x1}, 0x801) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x1) 21:31:25 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8460}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=@newqdisc={0x35c, 0x24, 0x400, 0x70bd28, 0x25dfdbfb, {0x0, r1, {0x8, 0xf}, {0xb}, {0xfff7, 0x8}}, [@qdisc_kind_options=@q_choke={{0xc, 0x1, 'choke\x00'}, {0x32c, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x8}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x0, 0x101, 0x7fff, 0x1f, 0x1f, 0x4, 0x8}}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}]}}]}, 0x35c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 21:31:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xf0ffffff00000000}, 0x0) 21:31:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004000000000000]}) 21:31:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xfffffe56, &(0x7f00000001c0)={&(0x7f0000000140)=@canfd={{0x2, 0x0, 0x0, 0x1000}, 0x38, 0x3, 0x0, 0x0, "d6239f98d3786c712a524bbd3cc1b79cd825ac85d8900795ca2054fa2e9928ec10333907ed0b3dacda14e1ef4de9ae49fc06b30e28a78bf9293476b5ff540722"}, 0x11}, 0x1, 0x0, 0x0, 0x8045}, 0x48040) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000080)={0x2, 0x8}, 0x2) 21:31:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:25 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:25 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r1) 21:31:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xffffff7f00000000}, 0x0) 21:31:26 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000300)="b1c1666536f341a5cd8069b15169dc00d9660f3a1919c44139fd5bf91cc1c7c7e4c653dbc461255eda66660f380731f34390b05852b05ff9f2406dc4224d3e460f8094ee20422042381c81440fba3608360801c48192558dc3c366450f186746f2b4aeaed3be1f31df70d5f04419298faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667660f6b8600000000d407ef000474c6c60f1a12895252470f383f894f000000") 21:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810000c000000000]}) 21:31:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:26 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000200)=""/55) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x2, 0x70bd25, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) 21:31:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xffffffff00000000}, 0x0) 21:31:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820000c000000000]}) 21:31:26 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0xfffffffffffff000}, 0x0) 21:31:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x2}, 0x0) 21:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000140)={0x2, 0x9, {0x51, 0x0, 0x8dfb, {0x4, 0x3}, {0x4, 0x1}, @const={0x4, {0x1, 0x80, 0x8000, 0x5efd}}}, {0x57, 0xa4, 0xda, {0x3, 0x40}, {0xeb, 0x400}, @rumble={0x10000, 0x1}}}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2400, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x2) 21:31:26 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x100, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x830000c000000000]}) 21:31:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x3}, 0x0) 21:31:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = open(&(0x7f0000000140)='./file0\x00', 0x4200, 0x61) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x75912611fdc90758}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x108, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xee1763c}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffeffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x33}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xafe}]}, 0x108}, 0x1, 0x0, 0x0, 0x800}, 0x44080) socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000080)) readahead(r3, 0x80000001, 0xfffffffffffffff9) 21:31:26 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$KDENABIO(r0, 0x4b36) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xffc000, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:27 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x4}, 0x0) 21:31:27 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x802, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x840000c000000000]}) 21:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8df8, 0x10080) ioctl$KDADDIO(r1, 0x4b34, 0x7fffffff) 21:31:27 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xa}, 0x0) 21:31:27 executing program 0: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x400000) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:27 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x4, 0x400) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) bind(r0, &(0x7f0000001300)=@ipx={0x4, 0x5, 0x5, "710a7171d049", 0xffffffff}, 0x80) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0xa000) write$vnet(r2, &(0x7f0000000140)={0x1, {&(0x7f0000000080)=""/136, 0x88, &(0x7f0000000300)=""/4096, 0x2, 0x2}}, 0x68) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8501000000000000]}) 21:31:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xe}, 0x0) 21:31:27 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x1, 0x0) dup3(r0, r1, 0x80000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0)=0x8, 0x4) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfe00000000000000, 0x0, 0x0, 0x3, 0x8, 0x1}, &(0x7f0000000100)=0x20) write$sndseq(r2, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000040), &(0x7f0000000080)) 21:31:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:27 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf}, 0x0) 21:31:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r1, 0x7004) 21:31:27 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x7fe, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000001c0)=0x7fff) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {0xfffffffffffffffc}, @connect}, {0x0, 0x0, 0x2, 0x0, @tick, {0x7}, {0x1c94149c, 0x4}}], 0x60) socket$inet6(0xa, 0xf, 0x400) open(&(0x7f0000000100)='./file0\x00', 0x1, 0xfffffbffffffffff) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0xe4, "7d2fc98871725c71def150612dd2d1dbecca6d732f7391c7fa1d4147bcec34e6afa48e2153b18adc458b7cbc023c713126428ad2df09df008f13979665e1cf6789b34b02dadb7e56e9d2607b7302800d6431d3de47b574a87d4721ecc90c48fb51faf883d12d59799ea476383eaf17258baeba5f1305434c3a2a8a3817cd9a7024f43d7456e8e065f6ca424bf262259718f2cb22f1f28222fd89db7cd6a545d4198d1363056bbbd2bdf3640b1c160dcb9ac54ec38bc572a0d7291566f91eb55fd21c9be6883a0876c474282e7b572415e0b4782390d5a6f6bfd0b48a4852273320da580a"}, &(0x7f0000000300)=0xec) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={r1, 0x6, 0x30}, 0xc) 21:31:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8601000000000000]}) 21:31:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x60}, 0x0) 21:31:28 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x70000, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000180)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x80800, 0x0) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x40000) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0x8, 0x9, 0xc2, 0x20, 0x616, 0x7, 0xffffffff, 0xd5], 0x8, 0x9, 0x3, 0x2, 0x7fffffff, 0x4, {0x7, 0x5, 0x3, 0x2, 0x0, 0x3, 0x1, 0x3, 0xa2, 0x1f, 0x100000000, 0x4b2, 0xffffffffffffffe0, 0x4, "3649d7c03d9784f5fd31d0a7fe52f722f7501f236d40ab7ab777771e0ead705e"}}) 21:31:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:28 executing program 0: r0 = socket(0xb, 0xb, 0xfffffffffffffff9) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8701000000000000]}) 21:31:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf0}, 0x0) 21:31:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() ptrace$getenv(0x4201, r1, 0x4000, &(0x7f0000000040)) ioctl(r0, 0x7ff, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="c1cd806bb15169dc00d9668f3a141987bfecfc0000c44139fd5bf90f183ec7c7e4c653db0fc4014cad58f34390b05852b05ff9c442253f8e3c000000c4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c36645f2d9edf2b4aeaed3be1f31df7043639034f9bd1a958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3dfc4419571e47a666642230fd4deefef000474c6c60f1a1265f00fc1aa44a8d220470f383f894f000000") 21:31:28 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x100000001, 0x401, 0x3ab}) pipe(&(0x7f0000000080)) write$sndseq(r0, &(0x7f0000000140)=[{0x7f, 0x1, 0x0, 0x0, @tick, {}, {0x0, 0x7ba1}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x300}, 0x0) 21:31:28 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2000, 0x0) write$9p(r0, &(0x7f0000000180)="e1e59bd8f877b829ac4d2730a52913e9a517b253d44d66dc85ebf5de035a118573d97ef941c055ea8f9abfe4ccec8ea18e3b6689a305cce6984d969ee9843c3f043fa0e066981092da3f22186fdfbf9de6d4e808870c2faea8a12bac983fa8043836a242be007cb2a15116d8435e7fc3d95517db023b2a050043805b4bfd809ad09844686b7cc041eb0b46b314f2a1140d85d4c7408f8d", 0x97) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000100)=r3, 0x12) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000540)="b1c191cd0069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad5882f3354bb04bb052b05ff2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746621eaec4a38d7e2300d3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") syz_init_net_socket$ax25(0x3, 0x7, 0x5) 21:31:28 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x801, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000100)) 21:31:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b00000000000000]}) 21:31:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00<\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xa00}, 0x0) 21:31:28 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x7, 0x3, 0x2, 0x2, 'syz1\x00', 0xed3}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:28 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000100)=@bcast) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xe00}, 0x0) 21:31:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900d000000000000]}) 21:31:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:28 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x145000) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000001c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) pwritev(r0, &(0x7f00000000c0), 0xef, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) open_by_handle_at(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) 21:31:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x80) 21:31:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf00}, 0x0) 21:31:29 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9104000000000000]}) 21:31:29 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x9, 0x800}) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000000c0)) 21:31:29 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r1, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x82}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000200)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) 21:31:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x3f00}, 0x0) 21:31:29 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x4000}, 0x0) 21:31:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e00000000000000]}) 21:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffff, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") writev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="4fc62adef037c6ffe3af865f8ebb709de07ef096357e550215406f03e9016da968aedd1545b2674c87a3906868661844654c4ff01fbaeb287c4eabf2d7c782076c55f8175c5ea564f4d0d95b30ae44b599688c8d4accbb6894", 0x59}, {&(0x7f0000000100)="b118d9011ab1f788cded87f8fc31353cdc7e6f45a78b952ae9024f2cccebfef9a2f756832e4ca4a0742b5406bf502ae5de2adec8ca26e2f11ef6450c1458ebb1e92231c25deb06b67989b9a90a05ad2f1f9ca26beed07984f46505d41395e77c33c15cebef967d85f8cc78b54d95008e56253715ca99e2894e103c92b97aa93b41376170562ae105c724b6dcdec2766ef4cfd133321b666e6a4a0f0ecdcda5af5b5e23d6a7cbb849d276ded419c5e5741edfa505af67a12d191a3dc642640bd15c0f55403525e65b12f6c0400e5bf484f68b167b2f3d761ea4d3e00e489ef8111e344e0f206261bb4a929f798f22ba8b31dfb0486a2ccc", 0xf7}], 0x2) pipe(&(0x7f0000000300)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f00000018c0)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000003c0)=""/162, 0xa2}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/183, 0xfffffffffffffde5}, {&(0x7f0000000640)=""/186, 0xba}, {&(0x7f0000000700)=""/139, 0x8b}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x6, &(0x7f0000001840)=""/125, 0x7d}, 0x1) lseek(r0, 0x1000000000000, 0x3) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0xfffffffffffffffe, 0x0) 21:31:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:29 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00C\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x4458}, 0x0) 21:31:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x50000) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000080)={0xff, 0x5}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000000c0)={0x8, 0x4}) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:29 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00D\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f00004000000000]}) 21:31:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x5844}, 0x0) 21:31:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000380)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf9c4c2f9227300c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000300)={0xffffffffffff8001, 0x9, 0x5, {}, 0x0, 0x7}) ioctl$int_in(r1, 0x5421, &(0x7f00000000c0)=0x102) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 21:31:30 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:30 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000001200)={0x3, 0x0, &(0x7f0000000040)=""/195, &(0x7f00000001c0), &(0x7f0000000200)=""/4096, 0xf000}) write$sndseq(r0, &(0x7f0000000140)=[{0x7f, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe, @time={0x0, 0x1c9c380}, {0x8}, {0x3}}], 0x60) 21:31:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x6000}, 0x0) 21:31:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa001000000000000]}) 21:31:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x100) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f00000000c0)={0x5, 0xfff}) 21:31:30 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:30 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x58) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x100000001, 0x401}]}, 0xc, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf000}, 0x0) 21:31:30 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40000801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00d000000000000]}) 21:31:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x30000}, 0x0) 21:31:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sync_file_range(r0, 0x1ff, 0x8001, 0x2) syz_execute_func(&(0x7f0000000040)="b1c10facaf0a0000001ecd80c4e211f74f0014199bc44139fd5bf91cc165470faefe0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958f66aa28108607000000cd22a02323380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:30 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:30 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x201c2, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f00000000c0)) 21:31:30 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000680), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) getgroups(0x9, &(0x7f0000000300)=[0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee01]) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x820401, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fsuuid={'fsuuid', 0x3d, {[0x77, 0x0, 0x32, 0x39, 0x32, 0x76, 0x36], 0x2d, [0x37, 0x77, 0x37, 0x14c177ca673630e5], 0x2d, [0x37, 0x32, 0x32, 0x75], 0x2d, [0x77, 0x0, 0x39, 0x67], 0x2d, [0x32, 0x77, 0x64, 0x61, 0x7f, 0x73, 0x33, 0x3f]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/ubi_ctrl\x00'}}, {@euid_lt={'euid<', r4}}, {@fowner_gt={'fowner>', r5}}, {@smackfsroot={'smackfsroot', 0x3d, 'userGPL-md5sumcgroup]'}}]}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x34000}, 0x0) 21:31:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:30 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000004000000000]}) 21:31:31 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xfffffffffffffeff, 0xf3d4, 0x3, 0xffffffffffffffe0, 0x0, 0x3, 0x8000, 0x17, 0x38, 0x399, 0x7fffffff, 0x7ff, 0x20, 0x2, 0x1, 0x4, 0x7}, [{0x70000000, 0x8001, 0xffffffff, 0x5, 0x1, 0x6de, 0x5, 0x3}], "081abb4aa05eb6e08ac6f0f11389eecd79e36120cf8567dd92a858efe55d3124e09bae236e4c4971835a885a3a249a671d7dec896c2981fbe6c902146f4c4d1bfe9458fb02707b99c4e50a816871bd120afb9f9a7727be33958e16a95630940afedb7c07ccaba580327fd4bc7497008aa45b913067aac53bdba96abd397348b973a37b48e44b57621c71290d270eabf97e"}, 0xe9) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000040)=@caif=@util, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, &(0x7f0000000100)=""/56, 0x38}, 0x8}, {{&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000001300)=""/119, 0x77}, {&(0x7f0000001380)=""/21, 0x15}, {&(0x7f00000013c0)=""/50, 0x32}], 0x4, &(0x7f0000001440)=""/176, 0xb0}, 0x1}], 0x2, 0x10060, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000001580)={0x4, 0x1, 0x0, 0xf2a, 0x7fffffff}, 0xc) syz_execute_func(&(0x7f00000015c0)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x400300}, 0x0) 21:31:31 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:31 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40000000801, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x5a, 0x400) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000100)={0x2, 0x1, [0x7fffffff, 0xbd7, 0x0, 0x3f9, 0x8, 0x0, 0x9, 0x4]}) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000001c0), 0x4) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb700004000000000]}) 21:31:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=@ipv6_getaddr={0xac, 0x16, 0x10, 0x70bd25, 0x25dfdbff, {0xa, 0x38, 0x302, 0xc8, r2}, [@IFA_LOCAL={0x14, 0x2, @local}, @IFA_CACHEINFO={0x14, 0x6, {0x2, 0x1, 0x7, 0x7}}, @IFA_CACHEINFO={0x14, 0x6, {0x5, 0xffffffffffffffe0, 0x40, 0x3}}, @IFA_ADDRESS={0x14, 0x1, @local}, @IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}, @IFA_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFA_FLAGS={0x8, 0x8, 0x10}, @IFA_CACHEINFO={0x14, 0x6, {0xb64, 0x3, 0xbc, 0xffffffff}}]}, 0xac}}, 0x8084) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf0ffff}, 0x0) 21:31:31 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x801, 0x0) r1 = shmget(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/101) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001480)={0x0, 0x3, 0x4, 0x6}, &(0x7f00000014c0)=0x10) sendmsg$inet_sctp(r0, &(0x7f00000015c0)={&(0x7f0000000100)=@in6={0xa, 0x4e21, 0x60000000, @loopback, 0x63b4}, 0x1c, &(0x7f0000001440)=[{&(0x7f00000001c0)="fe591f22cbc43b5b646726f10a81f3b7c8e4a90a488e01013a1469f58fb501485599c929aa789eebf4b3a3fe4b1f80c245c573bbd4cc396ff1618eafa0217c33c56818a02c54dd99dde66afce53da40203b01b32b259bc25b95e61f6a815c53b4aa160f645c1f04d70404a2b7720023b8199a185d5ef6cd085a4eb33cd1a79e1725d04", 0x83}, {&(0x7f0000000280)="d67e8a043e474e73bcfd61abb01dbc8854bcdcf0bd700e0364ab38d51e3a90d1cf34a3db49fbc70f655cb2ba02ee19b0f9672573116e9643646b7513dbfc6d6f71f7a833751c6513ce78ae9fed9a535d920661aa2202fc5d0cafaa13f5f30ebe5407988e0ddcd8b25dee5189e24af357e7ded21ce688ef853a200e90aa0a916ea641f6e6", 0x84}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="ddd3af45bf6ba93585b26e89683e5280263fba73ec6a2bfa25e9fc2162a67a51c02bc99f947d7b40bc22aff59c7f2fc5700c33f967a941fd51c4e3a14b6e69d1d39cc7f166dd65b6df8e6533a458fbd1b8ddc84b241a196d4785511de224cc61f7bc3f8cda96b1f660d6970aada10e653b814500983b5faf07a44b308bc3bc18bb819b7023917a18ac134af781f6602b939e3358832002e3a3f983baee41a0d8e191b02e89d228ba27b9f49cd48660607c084d6bae964cb282f07fb1499c1d0fc278ac62522c6c9e7fd46a61062bb9fb4e1eb651dd80c1510629a0102d72ef2ce54425786217315d7d10101e7202ddc5b472f85ee4e3fbdcad02", 0xfa}], 0x4, &(0x7f0000001500)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x3fb7}}, @init={0x18, 0x84, 0x0, {0x1f, 0x5063fabb, 0xff, 0x1}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x4}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x1, 0x6, 0x101, 0x1, 0x7ff, 0x8, 0x80000001, r2}}], 0x90, 0x8081}, 0x20004080) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) clock_gettime(0x7, &(0x7f0000000000)) 21:31:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x1000000}, 0x0) 21:31:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl(r0, 0x1, &(0x7f0000000040)="aef5e003d286") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:31 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:31 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8c082, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000]}) 21:31:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x2000000}, 0x0) 21:31:31 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:31 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x101, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0xc, 0x2}, 0x14) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={r1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000140)={0x7, 0x6, 0x1, 'queue0\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:32 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000200)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r1}) 21:31:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100000000000000]}) 21:31:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x3000000}, 0x0) 21:31:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000080)) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1b77, 0x200080) 21:31:32 executing program 0: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000006c0)=0x6e, 0x80800) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000700)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000002c0)=[{0x8, 0x40, 0x3, 0x5, @tick=0x9, {0x32e6a255, 0xd8}, {0x2, 0x81}, @raw8={"82c467e134f16b20a87b88c3"}}, {0x6, 0x1, 0xb9c3, 0x4, @tick=0x4, {0xfff, 0x400}, {0xfffffffffffffff7, 0x3}, @quote={{0x26c, 0x1f}, 0xe7a7}}, {0x1, 0x6e, 0x4, 0x6b, @tick=0x10000, {0x3ddf, 0x5}, {0x5, 0x8}, @queue={0x1, {0x3, 0x3}}}, {0x91e, 0xfffffffffffffff7, 0x7fffffff, 0x10000, @time={0x77359400}, {0x9, 0x800}, {0x8c0, 0x2}, @control={0x25a, 0x5, 0x401}}, {0x1, 0x4, 0x1, 0xffffffffffffffe0, @time={r2, r3+30000000}, {0x6, 0x8}, {0x1f, 0x7}, @raw8={"4f053c701e6c0ead94478016"}}, {0xffffffff, 0x7, 0x0, 0xfffffffffffffffd, @tick=0x569, {0x2, 0x4fb6}, {0xbb, 0x4}, @control={0x8000, 0x3, 0x69}}, {0xfffffffffffff800, 0xca5, 0x80000000, 0x0, @time, {0x9, 0x9}, {0x0, 0x8001}, @raw8={"791ddc8a1915cccd283459a5"}}, {0xb3c, 0x6973, 0x80, 0x8000, @tick=0x1f, {0x7, 0x8}, {0x80, 0x7d}, @control={0x0, 0x89, 0x8}}, {0x0, 0x1, 0x7, 0x7, @tick=0x1, {0x8}, {0x7, 0x3}, @ext={0xd0, &(0x7f00000001c0)="9f9c4169df7a0241eb5aa026bd1af61a043f779ef6954781d8c4e1e066c236435e36268945b39c2a0e8ea7317d7c17d65b9df4f9b2407532436b1a8235fb618d6f01f4416727ef488b8009dbb637ea2e9ed2f2ab6ed9e770df61c861058c4c7006fb646d42d3a79d8a1056bd07bbd491a24b5aae676b1cd54b7c5afdfd9ad7a33dcb6dc96627791b1cd236adad90e719b5668dafffcac55e4be62067ba34224e4436c048ac5a59a30c2180620adb41e3d9f1bd3486756176aded38167b68e7db945a98d3d6f2b3b96409fc6527345278"}}, {0x581c, 0xff, 0xffffffffffffff73, 0x4, @time, {0x0, 0x8}, {0x60000000000000, 0xef4}, @queue={0x9, {0xeb, 0x9}}}], 0x1e0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x802, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x38, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in6={0xa, 0x4e22, 0x100000001, @rand_addr="07a0437ea30e62cadae8940426e1dfaa", 0x1196}]}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000500)={r5, 0x3}, &(0x7f0000000540)=0x8) write$sndseq(r4, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000580)={0x0, 0x7, 0x100000000, 'queue0\x00', 0x4000400000}) 21:31:32 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x4000000}, 0x0) 21:31:32 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000280)={0x1, 0x0, {0x3b, 0x0, 0x1000, 0x3}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x2, 0x100000001, 0x400, {}, 0x1, 0x9a1f}) prctl$PR_SET_SECUREBITS(0x1c, 0x39) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x4202) getsockname$ax25(r0, &(0x7f00000001c0)={{}, [@netrom, @rose, @default, @rose, @bcast, @netrom, @remote, @null]}, &(0x7f0000000100)=0x48) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x34, 0x7, 0x8, "ceb8e68add6b73cafbfd2bc91c73f818", "aed2bedf25a4c478db4bce77a90b73e6206b9d8ebdfd252856b9a7d180ef01"}, 0x34, 0x0) 21:31:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1000, 0x400) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x2, 0x6}) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:32 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc200000000000000]}) 21:31:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xa000000}, 0x0) 21:31:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:32 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x9, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x0) 21:31:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40, 0x0) syz_execute_func(&(0x7f0000000300)="b1c191cd8069b15169dc00d9660f3a141994944139fd5bf91cc13666430f5ae50fc4014c9858f3439006b05858b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:32 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xe000000}, 0x0) 21:31:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00000000000000]}) 21:31:32 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000040)) 21:31:33 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0xe}}, 0x10) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0af3b85cc96cd41fe6448f1d") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf000000}, 0x0) 21:31:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000040)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="0180000055000000d8b9107837e1fc9772a8a81bf8a180b3ae939e37974717aabba30071b73a47352479d3577791d9743643a68901e227619e1bc1c31de138eadf7aeec489ba26178635a32e9220f44a740b779466bc7d8ba0789f2c6a"]) 21:31:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd004000000000000]}) 21:31:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:33 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x3f000000}, 0x0) 21:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x80400, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) 21:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") flock(r0, 0x2) r1 = syz_open_dev$sndpcmp(&(0x7f0000001a80)='/dev/snd/pcmC#D#p\x00', 0x400, 0x680) write$FUSE_LSEEK(r1, &(0x7f0000001c00)={0x18, 0xffffffffffffffda, 0x1, {0x7fffffff}}, 0x18) openat$cgroup_ro(r1, &(0x7f0000001bc0)='cpu.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") recvmmsg(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000040)=@rc, 0x80, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000180)=""/173, 0xad}, {&(0x7f0000000300)=""/7, 0x7}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/2, 0x2}, {&(0x7f0000001380)=""/37, 0x25}, {&(0x7f00000013c0)=""/60, 0x3c}, {&(0x7f0000001400)=""/132, 0x84}], 0x8, &(0x7f0000001540)=""/244, 0xf4}, 0x9}, {{&(0x7f0000001640)=@caif=@dbg, 0x80, &(0x7f0000001980)=[{&(0x7f00000016c0)=""/192, 0xc0}, {&(0x7f0000001780)=""/248, 0xf8}, {&(0x7f0000001880)=""/3, 0x3}, {&(0x7f00000018c0)=""/171, 0xab}], 0x4, &(0x7f00000019c0)=""/181, 0xb5}, 0x6}, {{0x0, 0x0, &(0x7f0000001a80)}, 0xc4}], 0x3, 0x140, &(0x7f0000001b80)) 21:31:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x40000000}, 0x0) 21:31:33 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd901000000000000]}) 21:31:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x40, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x55, 0x40000) openat$cgroup_procs(r1, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15969dc00c3d9660f3a3a199bc44139fd5bf91cc1c7c7e4c653dbf26643c6f800ad428d8d4390b058b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4ae42dccd9595c401ad654d000f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef0004741a12895252470f383f894f000000") ioctl$TUNSETLINK(r1, 0x400454cd, 0x18) 21:31:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x58440000}, 0x0) 21:31:33 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@initdev, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000340)={0x1, 0x1, [@random="71ffd88bdb80"]}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000000c0), &(0x7f00000002c0)=0x68) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:33 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x84\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe006000000000000]}) 21:31:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000140)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x24de) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0xb36, 0xfffffffe, 0x8, 0x20}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000340)={0x0, @empty, @dev}, &(0x7f0000000380)=0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000003c0)=r3) 21:31:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x60000000}, 0x0) 21:31:34 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {0x80000000}, @connect}, {0x0, 0x0, 0x0, 0x400, @tick, {0x8}}], 0x60) 21:31:34 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x87\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x400fff, 0x2405fc) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0xffffffffffffffc1, 0xffffffff]) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x601, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x5a98, 0x140c0) 21:31:34 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x9effffff}, 0x0) 21:31:34 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000000000805, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x6, 0xa7, 0x3, 0x8}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x3}, 0x8) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) sync_file_range(r0, 0x4, 0x9, 0x1) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r1, 0x8}, 0x8) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000240)=r0) 21:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff02000000000000]}) 21:31:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 21:31:34 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") 21:31:34 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) clock_getres(0x5, &(0x7f0000000040)) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:34 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0b000000000000]}) 21:31:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x103003, 0x0) write$capi20_data(r1, &(0x7f0000000080)={{0x10, 0x8, 0x43, 0x81, 0x80000000, 0x7}, 0x78, "9c87a57f5278f16ebbd652af414eff47214c66669460aff09d99ae79bf3ebf12557330c59889982514c1a1bf94190930f11bd82ece2cfc394e102f69da35ca5363c39a27790d4c1f39e8461571d8a0e8dc09c68ae184f15ae9cdd1eb23cecb003c2f99d8cb947530d7217df99b918685cb8f5ed46ca32866"}, 0x8a) 21:31:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xfffff000}, 0x0) 21:31:34 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x1, r0}) 21:31:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a7007fc78c6d0a9ef2fac33f2ce1eac8a04cb18a680bad8bc3fdf3631b026ec50c2017287a6170c3d4558a247341a71c05128f7a76555670ca960376ff4c5f5a2c78e86d1e65457767d9e587b7a3b705ad62179ad53f3789274ea379706") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x60000, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000000c0)) 21:31:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xffffff7f}, 0x0) 21:31:35 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 21:31:35 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x204000, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="50c01d5e9d7064a334d9bc498c40eb4f", 0x10) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x0, 0x1000}, {}, @connect}, {0x0, 0x0, 0x6, 0x0, @tick, {0x8}}], 0x60) 21:31:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xffffff9e}, 0x0) 21:31:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7095958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef020474c6c60f1a12895252470f383f894f000000") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000080)={0x8, 0x0, 0x3, 'queue0\x00', 0x8}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) 21:31:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)={0x0, @aes256, 0x1, "c18c3503d2bf2649"}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) pread64(r1, &(0x7f0000000040)=""/160, 0xa0, 0x46) 21:31:35 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 21:31:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xfffffff0}, 0x0) 21:31:35 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000200)=0x2, &(0x7f0000000240)=0x2) r2 = memfd_create(&(0x7f00000002c0)=':\'proccpusetmd5sumvboxnet1\x00', 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x1, 0x5}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000280)={'veth1\x00', 0x5}) fcntl$addseals(r2, 0x409, 0x4) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:35 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:35 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0xfffffffffffffffb, 0x4, 0x0, 0xec, 0x9}) 21:31:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x3000000000000}, 0x0) 21:31:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) 21:31:35 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:36 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0x6, 0x4) 21:31:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x40030000000000}, 0x0) 21:31:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:36 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:36 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 21:31:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 21:31:36 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:36 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x3, 0x6, [0x4, 0x5, 0x8001, 0x9, 0x4, 0x6]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x4, 0x30}, &(0x7f0000000100)=0xc) 21:31:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x100000000000000}, 0x0) 21:31:36 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 21:31:36 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140), 0xfd9f) 21:31:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x200000000000000}, 0x0) 21:31:36 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}) 21:31:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x300000000000000}, 0x0) 21:31:37 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:37 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x8, 0x0, 0xdb, 0x3f91, @tick, {0x8}}], 0x33d) 21:31:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x400000000000000}, 0x0) 21:31:37 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) socket$inet6(0xa, 0x1, 0x5) 21:31:37 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b]}) 21:31:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xa00000000000000}, 0x0) 21:31:37 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xe00000000000000}, 0x0) 21:31:37 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000080)=0xe8) connect$packet(r0, &(0x7f00000000c0)={0x11, 0xf7, r1, 0x1, 0x37, 0x6, @random="c1b727458495"}, 0x14) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400, 0x0) write$sndseq(r2, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x1f}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) socket$inet_smc(0x2b, 0x1, 0x0) 21:31:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34]}) 21:31:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 21:31:37 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:38 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x802, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000240)={0x2, 0x0, 0x1008, 0xfffffffffffffff7, 0x2, {0xd52, 0x3}}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x70, r1, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x800}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3ff}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xff}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="3bcbd770b0c10e376f08111a70a718a4"}]}, 0x70}, 0x1, 0x0, 0x0, 0x55}, 0x804) accept4$ax25(r0, &(0x7f0000000280)={{0x3, @bcast}, [@remote, @bcast, @bcast, @remote, @netrom, @default, @netrom, @rose]}, &(0x7f0000000300)=0x48, 0x80000) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 21:31:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}) 21:31:38 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:38 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) r1 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x7c00000000, 0x80, 0x6, 0xace, 0x9bf}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) 21:31:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r2, &(0x7f00000002c0), 0x10000000000002f3) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x4000000000000000}, 0x0) 21:31:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:38 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) tee(r0, r0, 0x2, 0x9) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffd54b, 0x8000, 0x0, 0xa, 0x11, 0x10, "c662b9012c2c527173358b11ae8028979d5e22f30c85fa5e703d56c22219942676704f8d4c894478960585fc204690b4d3f9dee82250d73d1a78b5eca1cf33c7", "c923f0284e0a0445358537187aea0b0b0813e7316ec90025d0f6ec310709a62d6a4c15ba4b38f0e36f780922170ad1e826d24b0de5de3cff74a1a3cb6c96b74a", "95afd2e7bfcc481db0a24286ba7aa482ef00debc14019c3f45ba0f1ce0fe93ef", [0x1c, 0x9]}) 21:31:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b]}) 21:31:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x5844000000000000}, 0x0) 21:31:38 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:38 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0xb}}], 0x60) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000240)={0x1, 0x8b}, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000300)) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000880)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100008}, 0xc, &(0x7f0000000540)={&(0x7f0000000640)={0x22c, r1, 0x208, 0x70bd29, 0x25dfdbf8, {}, [@TIPC_NLA_LINK={0xc4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x926}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff00000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf68b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2346}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0x22c}, 0x1, 0x0, 0x0, 0x40}, 0x8801) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x2}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r2, 0x81}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x3, 0x0, 0x26f, 0x4, r3}, &(0x7f0000000600)=0x10) 21:31:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x6000000000000000}, 0x0) 21:31:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:38 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}) 21:31:38 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x6, &(0x7f0000ffd000/0x1000)=nil, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000001c0)={{0x0, 0x2, 0x9, 0xffffffffffffffff, '\x00', 0x2}, 0x0, [0xffff, 0x54, 0x6dcb, 0x2, 0x393e, 0x7, 0x7, 0x6, 0x1, 0x8000, 0x8001, 0x6de, 0x2, 0x0, 0x2, 0xfffffffffffffffd, 0x7414, 0x1000, 0x2, 0x10000, 0x401, 0x6, 0x6cf, 0x3, 0xffffffff, 0x9, 0x3, 0x81, 0x196200, 0x101, 0xeab, 0x2, 0xff, 0x8, 0x8, 0x6, 0x3, 0x2, 0x80, 0x2, 0x8, 0x8, 0x2, 0x1, 0x7, 0x6, 0x0, 0xdd, 0x9, 0x100000001, 0x80, 0xffff, 0x800, 0x80, 0x2, 0xfffffffffffffffb, 0x40, 0x0, 0x1, 0x230c4712, 0x0, 0x100, 0x0, 0x20, 0xfffffffffffffffa, 0x8000, 0x7, 0x1, 0xffffffffd0c2c5b7, 0x3, 0x6, 0x7, 0x1, 0x1, 0xd9, 0x4, 0x3, 0x8, 0x9, 0x4, 0x1ff, 0x5, 0x9, 0x1, 0x8, 0x3, 0x187eb4f0, 0x6, 0x1000, 0xffffffff, 0x68ae, 0x6, 0x2, 0x4, 0x7ff, 0x7, 0x3, 0x100000000, 0x4, 0x7, 0x4, 0x0, 0x101, 0x6, 0x0, 0x7f, 0xffffffffffffffc0, 0x86c0, 0x3ff, 0xaf86, 0xfffffffffffffff8, 0x9, 0x4, 0x8, 0xf8, 0x7, 0xfff, 0xfffffffffffffff7, 0x0, 0x1, 0xe6, 0x0, 0x400, 0x101, 0x5, 0x4, 0x0, 0x40], {r1, r2+10000000}}) 21:31:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 21:31:39 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r3, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) 21:31:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 21:31:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49]}) 21:31:39 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r2, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x6, 0x3, @tick, {0x0, 0x2}, {}, @raw8={"76c2c4fb3c997ec37ee8e395"}}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000040)="5f3aa9dde2c4decb0d0441983b503bebf54df44220f4d0eae83d1435475aa5dbbfd48e4f8e8fea6c3f7d93cc6da1f1fb9f57d6684f2112e4c1ff880b53f6dfb023be7476eb03ef486c8defd0de157ffe2c90b2dee754a9f4191ca364814ea8", 0x5f}, {&(0x7f00000011c0)="68728cff8c3cd7a10e72150154ccc593b6955ba6d95f7218c9b64cec188e0f2d7afb3dbdaf6fda804a121856d32ebb84fe8a48fd75b21c836a4001942459259037471ed0db0b869d6b042e0522ca9a2754282e88cc49a23e18757adc7198e314466bdcc1caaf0e26a9946e174c8825f18cb6e4e2878810b286abb8260b1e6e09f6a0e3f2acf49e1ef65aa3b1a9d9dbdcdabdf3d89608c44b890d518c2e3b659e6b9b92c6b95f4d3fd5fb64db9751c2d14522278838cc7733de4daec9a9211ddac9f2bc382860971bf42f0dc766e8ca094ea3fbec0e5866eab2d57cc90e0db2", 0xdf}], 0x3) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000100)) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f0000001300)={@dev={0xac, 0x14, 0x14, 0x13}, @dev={0xac, 0x14, 0x14, 0x1a}, @multicast1}, 0xc) openat$snapshot(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/snapshot\x00', 0x40000, 0x0) 21:31:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 21:31:39 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:39 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000040)={0x66806c74, "20a90267e37550d5322852015d5e03a04f3dd18a4b82951a0fae45e130a8828d", 0x2, 0x3d, 0x7, 0x13780e7, 0x2040401, 0xa}) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 21:31:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79]}) 21:31:39 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x200040, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000040)=0xffffffffffff163e, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x4, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48801}, 0x80) write$sndseq(r0, &(0x7f0000000140), 0x0) 21:31:39 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 21:31:40 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:40 executing program 0: syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b]}) 21:31:40 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 21:31:40 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:40 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x2) 21:31:40 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2930.471813] validate_nla: 42 callbacks suppressed [ 2930.471823] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:40 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e]}) 21:31:40 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) ptrace$pokeuser(0x6, r1, 0x3, 0x7) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) [ 2930.576185] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2930.652923] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2930.661055] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:40 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:40 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 21:31:40 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) io_pgetevents(r1, 0x9, 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000100), &(0x7f0000000200)={&(0x7f00000001c0)={0x7}, 0x8}) write$sndseq(r0, &(0x7f0000000140)=[{0x7f, 0x1, 0x0, 0xd952, @tick, {0x0, 0x400}, {0x1}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {0x1000}, @raw32={[0x4, 0xfffffffffffff800, 0x3f]}}], 0x60) 21:31:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:40 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:40 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) [ 2930.912774] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2930.920317] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0]}) 21:31:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x7e, 0x0) fcntl$setpipe(r0, 0x407, 0x4) write$sndseq(r0, &(0x7f0000000140), 0xfffffffffffffe03) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x7fff, 0x2}) 21:31:41 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) [ 2931.137424] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2931.170764] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1]}) 21:31:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x0, 0x28d9414a}) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) socket$inet_udp(0x2, 0x2, 0x0) pwrite64(r0, &(0x7f0000000080)="cc70e75b2d415f1ebc84bdddd7a046296f472b2cdff2cb3bb12e255df89ae868c1f8dbdfebb0930f0c2933fa1cf53c51c2d164e37c3cbc61465d4b54d654413f7ad42fbd8a183f90ced110633c96ebdafd797df90ef4df", 0x57, 0x0) 21:31:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 21:31:41 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000240)={'bridge_slave_0\x00', 0x2}) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1, 0x5, 0x6}}, 0x28) [ 2931.543500] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:41 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2931.593498] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2]}) 21:31:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa}, 0x0) 21:31:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x200001, 0x0, 0x0, @tick, {}, {0x20}, @connect}, {0x0, 0x0, 0x4, 0x0, @tick, {0x8, 0xfffffffffffffffc}}], 0x60) 21:31:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:41 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe}, 0x0) 21:31:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce]}) 21:31:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) syz_open_dev$ndb(&(0x7f0000000740)='/dev/nbd#\x00', 0x0, 0x200000) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='system)5\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000001c0)={0x0, @frame_sync}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000280)) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x12000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000340)={0x370, r1, 0x104, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x81, @mcast1, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x80000000, @loopback, 0x1}}}}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9cb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x31a3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x164, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9e24}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1d18655e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x37}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe3e9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff71}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6ab5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcb5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x988}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x60, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x6c8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x370}, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0xfff7fff, 0xffff, 0x1000, [], &(0x7f00000007c0)={0xbb096b, 0x0, [], @p_u16=&(0x7f0000000780)=0x10001}}) 21:31:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 21:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:42 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:42 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x7, 0x2, {0x3, 0x3, 0x4, 0x3, 0x2}}) 21:31:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10a]}) 21:31:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 21:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:42 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00<\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:42 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ppoll(&(0x7f0000000040)=[{r0, 0x6406}, {r0, 0x88}, {r0, 0x1}], 0x3, &(0x7f0000000080), &(0x7f00000000c0)={0x7fffffff}, 0x8) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000100)=0x310b) 21:31:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 21:31:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:42 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/153) 21:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11e]}) 21:31:42 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 21:31:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:43 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5, 0x90000) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f00000001c0)=0xb) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x14e, @time={0x77359400}, 0x40e, {0x5, 0x100000001}, 0x6, 0x0, 0x840}) syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x111400) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:43 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}) 21:31:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 21:31:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:43 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x400000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x10000, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x60ebdc94, 0x3ff, 0x3, 0x3ff, @tick=0x9, {0x4, 0x5}, {0x100, 0xffffffff}, @quote={{0x7, 0xef18}, 0x8, &(0x7f0000000040)={0x7fffffff, 0x8, 0x0, 0x100, @time, {0x6529, 0xdfe}, {0x0, 0x15}, @control={0x2, 0xffffffffffffffff, 0x8}}}}, {0x7, 0x32a9000000, 0x0, 0xffffffffffff1222, @time={0x77359400}, {0x9, 0x7}, {0x100000000, 0x2}, @note={0x10001, 0x8, 0x8001, 0x6}}, {0x5, 0x2, 0x7fff, 0x1f, @time={0x0, 0x989680}, {0x9, 0xfffffffffffffffe}, {0x7, 0x46}, @result={0x790a, 0x7}}, {0x2, 0x1, 0xdfc8, 0x9, @tick=0x1ff, {0x0, 0x4}, {0x4, 0x3}, @quote={{0x8001, 0x6}, 0x4, &(0x7f0000000080)={0x80000000, 0x6, 0x90, 0xffffffff, @tick=0x5, {0x4, 0x2}, {0xf8d4, 0x3}, @control={0x9, 0x1, 0xfffffffffffffff7}}}}], 0xc0) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10000) 21:31:43 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x174]}) 21:31:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 21:31:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:43 executing program 0: clone(0x1000500002c100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x7) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:43 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00C\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:43 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000040), 0xffffffffffffff69) 21:31:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 21:31:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x175]}) 21:31:43 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00D\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:43 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x2}}, 0x18) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x1) ioctl$BLKRRPART(r0, 0x125f, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x402, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000001c0)=0xc) ptrace$getenv(0x4201, r2, 0x5fe5, &(0x7f0000000240)) 21:31:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 21:31:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 21:31:44 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x2, 0x0, 0x0, 0x0, @time={0x77359400}, {0x8}}], 0x60) 21:31:44 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x176]}) 21:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4458}, 0x0) 21:31:44 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) r1 = dup3(r0, r0, 0x80000) r2 = getpid() ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000240)=r2) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0xfff, 0x40, 0x5, 0x5, 0x8, 0x7fff}) sendto(r1, &(0x7f0000000180)="fb782e63096c22a39a8776882b9b3465f6b96468c690d10a86d0bd57aec1dbfd41d90fe0e4225c17a14bb34822a3538ff5c28098368900d621616be5eeeeef47", 0x40, 0x885, 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000140)={r1, 0x0, 0x2, 0x8000, 0x3}) 21:31:44 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17a]}) 21:31:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5844}, 0x0) 21:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:44 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) getpeername(r0, &(0x7f00000029c0)=@can={0x1d, 0x0}, &(0x7f0000002a40)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002a80)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000002b80)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@empty, @in6=@local, 0x4e22, 0x3, 0x4e20, 0x200, 0x0, 0x80, 0x20, 0x7e, r1, r2}, {0x3, 0x7, 0x1, 0x1, 0x1f, 0x3, 0x6, 0x5}, {0xffffffff94d9bce7, 0x10000, 0x81, 0x400}, 0x6, 0x6e6bb7, 0x1, 0x1, 0x2, 0x2}, {{@in=@empty, 0x4d6, 0x32}, 0x2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x0, 0x5, 0x5, 0x6}}, 0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x867}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x3f, 0xdaa4}, 0x8) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r3, 0x1000, "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"}, &(0x7f0000000100)=0x1008) 21:31:44 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 21:31:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17b]}) 21:31:44 executing program 0: ustat(0x4, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:45 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 21:31:45 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0xff, 0x9, 0x5, 0x7, 0x3, 0x101}) 21:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:45 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x185]}) 21:31:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x30000}, 0x0) 21:31:45 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:45 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'ve\x16h1]to_bond\x00', 0x8}) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000000c0)=""/2, &(0x7f0000000100)=0x2) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) [ 2935.572131] validate_nla: 60 callbacks suppressed [ 2935.572141] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:45 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x186]}) [ 2935.622850] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) [ 2935.682622] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2935.697406] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:45 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$can_bcm(0x1d, 0x2, 0x2) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:45 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 21:31:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x187]}) 21:31:46 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000100), &(0x7f00000001c0)=0x4) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000040)={0x3, "651ba49993fe259d4bd50afbf14baf95d5fb3b6d0a3634e7267f78fe06a9c536", 0x400, 0x6, 0x80, 0x6}) [ 2936.033646] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2936.064570] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:46 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}) 21:31:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 21:31:46 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) execveat(r0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000500)=[&(0x7f0000000380)='trusted!bdev,-\x00', &(0x7f00000003c0)='/dev/sequencer\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='-/vboxnet1vmnet1\x00', &(0x7f0000000480)='/dev/sequencer\x00', &(0x7f00000004c0)='/dev/sequencer\x00'], &(0x7f00000007c0)=[&(0x7f0000000540)='\x00', &(0x7f0000000580)='\\/\x00', &(0x7f00000005c0)=']cgroupwlan1]--.system#selinux\x00', &(0x7f0000000600)='/dev/sequencer\x00', &(0x7f0000000640)='mime_typeL\x00', &(0x7f0000000680), &(0x7f00000006c0)='/dev/sequencer\x00', &(0x7f0000000700)='/dev/sequencer\x00', &(0x7f0000000740)='/dev/sequencer\x00', &(0x7f0000000780)='/dev/sequencer\x00'], 0x1000) lchown(&(0x7f0000000000)='./file0\x00', r1, r2) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) write$sndseq(r0, &(0x7f0000000080)=[{0x8001, 0x7fff, 0x2, 0x3ff, @time={0x77359400}, {0x3ff, 0x12d5e17a}, {0x7, 0x4}, @ext={0x14, &(0x7f0000000040)="414e532ac24ffa885a7e1bbb4cbc06a572574639"}}], 0x30) 21:31:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:46 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2936.410397] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2936.432363] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2936.480957] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:46 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) modify_ldt$write(0x1, &(0x7f0000000040)={0x400, 0xffffffffffffffff, 0x0, 0x9, 0x7, 0x5, 0x9, 0xf794, 0x2, 0x3}, 0x10) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x8) 21:31:46 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2936.617704] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0]}) 21:31:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 21:31:46 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000040)) 21:31:46 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 21:31:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0xcb, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x1}, {}, @connect}, {0xb1, 0x0, 0x7fffffff, 0x0, @tick, {0x8, 0x9}}], 0x243) 21:31:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d9]}) 21:31:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 21:31:47 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:47 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8}}], 0x60) 21:31:47 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 21:31:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x402c542d, &(0x7f0000000040)) 21:31:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x277]}) 21:31:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:47 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 21:31:47 executing program 0: 21:31:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff]}) 21:31:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:47 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x84\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:47 executing program 0: 21:31:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 21:31:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x308]}) 21:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:48 executing program 0: 21:31:48 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x87\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 21:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:48 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:48 executing program 0: 21:31:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 21:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}, {0x0, 0x0, 0x0, 0x0, @tick, {0x8, 0x3}}], 0x60) 21:31:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47f]}) 21:31:48 executing program 0: 21:31:48 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, 0x0, 0x0) 21:31:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 21:31:48 executing program 0: 21:31:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480]}) 21:31:48 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 21:31:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, 0x0, 0x0) 21:31:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0xa0003}) ioctl$KVM_SMI(r2, 0xaeb7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0x62) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="b800008ee8260f01cf0f00d96423570f66b9800000c00f326635008000000f3066b9800000c00f326635000400000f30f466b8000000000f23d80f21f86635800000f00f23f866b9800000c00f326635000100000f300f8cbfc6", 0x5a}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:31:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:49 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x58440000}, 0x0) 21:31:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, 0x0, 0x0) 21:31:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x491]}) 21:31:49 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:49 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x1}}, 0xa) 21:31:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 21:31:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) 21:31:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d0]}) 21:31:49 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 21:31:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r1, r1, 0x0, 0x88001) 21:31:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140), 0x0) 21:31:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 21:31:49 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e0]}) 21:31:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140), 0x0) 21:31:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0x12}]}, 0x18}}, 0x0) 21:31:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 21:31:50 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140), 0x0) 21:31:50 executing program 0: clone(0x800000409ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="795d11f55b0300000000e6852bf4c11b0300000000005c703f605c5bb72600b0f9ea894d57221250b5a10ccd90323eeb9f17da79be98b13e9589a2f638e5c474d1b69c4c2424ae5959f62b0dbca40400000000000000f8d4f13756de115d1b25708cab41d3d51bb5da231186f75310fc13bf435a91c78df6821c78c2d9dcd900b8fc8631e303a967c3337df846cd73c2b3"], 0x91) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) capget(&(0x7f0000000000)={0x20080522, r1}, &(0x7f0000000040)={0x0, 0x20, 0x101, 0x401, 0xa000000000000000, 0xfffffffffffff800}) 21:31:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 21:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803]}) 21:31:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x0, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) 21:31:50 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 21:31:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x0, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) 21:31:50 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa01]}) [ 2940.716735] validate_nla: 64 callbacks suppressed [ 2940.716745] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2940.732901] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2940.769146] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2940.837189] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 21:31:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x0, 0x1, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) 21:31:50 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbff]}) 21:31:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2941.128873] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x0, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) 21:31:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2941.180612] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:51 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2941.258413] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2941.305906] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd90]}) 21:31:51 executing program 0: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3000000000000}, 0x0) 21:31:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x0, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) [ 2941.546444] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2941.563889] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:51 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc55123c123f319bd07048966494d9277a806ccb303b4d8568996d2cd0609220e59ab9bb0bd634b6e00cc72a46e1ab41") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) syz_execute_func(&(0x7f0000000140)="b1c191cd8069b15169dc00d9660f3a14199bc44139fd5bf91cc1c7c7e4c653db0fc4014cad58f34390b05852b05ff9f2406dc4224d3e460f8094ee2042204238440fba3608c1ea01c48192558dc3c366450f186746f2b4aeaed3be1f31df7085958faa28128607000000cd22a0230f380a815ef3fd9ac401fe5ff6e3df6467b667666642230fd4efef000474c6c60f1a12895252470f383f894f000000") fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000200)=@sha1={0x1, "9727f16436402f2bc0d4939b9ffa4b1d5d1b0da8"}, 0x15, 0x2) 21:31:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x0, 0x0, 0x0, @tick, {0x55c5ba16}, {}, @connect}], 0x30) 21:31:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 21:31:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda0]}) 21:31:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:51 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:51 executing program 0 (fault-call:12 fault-nth:0): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 21:31:52 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:52 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}) 21:31:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) [ 2942.190318] FAULT_INJECTION: forcing a failure. [ 2942.190318] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.203307] CPU: 1 PID: 14852 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2942.210351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.219717] Call Trace: [ 2942.222335] dump_stack+0x172/0x1f0 [ 2942.225995] should_fail.cold+0xa/0x1b [ 2942.229883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2942.234996] ? lock_downgrade+0x810/0x810 [ 2942.239141] ? ___might_sleep+0x163/0x280 [ 2942.243291] __should_failslab+0x121/0x190 [ 2942.247528] should_failslab+0x9/0x14 [ 2942.251323] kmem_cache_alloc_trace+0x2cf/0x760 [ 2942.256005] loop_add+0x51/0x8d0 [ 2942.259379] ? idr_find+0x47/0x60 [ 2942.262829] loop_control_ioctl+0x165/0x360 [ 2942.267145] ? loop_add+0x8d0/0x8d0 [ 2942.270770] ? __might_sleep+0x95/0x190 [ 2942.274742] ? loop_add+0x8d0/0x8d0 [ 2942.278367] do_vfs_ioctl+0xd6e/0x1390 [ 2942.282256] ? selinux_file_ioctl+0x46f/0x5e0 [ 2942.286745] ? selinux_file_ioctl+0x125/0x5e0 [ 2942.291235] ? ioctl_preallocate+0x210/0x210 [ 2942.295642] ? selinux_file_mprotect+0x620/0x620 [ 2942.300398] ? iterate_fd+0x360/0x360 [ 2942.304198] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2942.308952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.314483] ? security_file_ioctl+0x93/0xc0 [ 2942.318896] ksys_ioctl+0xab/0xd0 [ 2942.322350] __x64_sys_ioctl+0x73/0xb0 [ 2942.326281] ? do_syscall_64+0x5b/0x610 [ 2942.330265] do_syscall_64+0x103/0x610 [ 2942.334165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.339640] RIP: 0033:0x458da9 [ 2942.342844] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2942.361738] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2942.369447] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2942.376713] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2942.384024] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2942.391300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2942.398561] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:31:52 executing program 0 (fault-call:12 fault-nth:1): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 21:31:52 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}) 21:31:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x2, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) [ 2942.805453] FAULT_INJECTION: forcing a failure. [ 2942.805453] name failslab, interval 1, probability 0, space 0, times 0 [ 2942.820508] CPU: 1 PID: 15014 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2942.827484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2942.836846] Call Trace: [ 2942.839437] dump_stack+0x172/0x1f0 [ 2942.843064] should_fail.cold+0xa/0x1b [ 2942.846949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2942.852045] ? lock_downgrade+0x810/0x810 [ 2942.856188] ? ___might_sleep+0x163/0x280 [ 2942.860349] __should_failslab+0x121/0x190 [ 2942.864621] should_failslab+0x9/0x14 [ 2942.868415] kmem_cache_alloc_node_trace+0x277/0x720 [ 2942.873514] __kmalloc_node+0x3d/0x80 [ 2942.877313] blk_mq_alloc_tag_set+0x331/0x960 [ 2942.881809] loop_add+0x286/0x8d0 [ 2942.885257] ? idr_find+0x47/0x60 [ 2942.889514] loop_control_ioctl+0x165/0x360 [ 2942.893829] ? loop_add+0x8d0/0x8d0 [ 2942.897446] ? __might_sleep+0x95/0x190 [ 2942.901412] ? loop_add+0x8d0/0x8d0 [ 2942.905035] do_vfs_ioctl+0xd6e/0x1390 [ 2942.908913] ? selinux_file_ioctl+0x46f/0x5e0 [ 2942.913432] ? selinux_file_ioctl+0x125/0x5e0 [ 2942.917923] ? ioctl_preallocate+0x210/0x210 [ 2942.922375] ? selinux_file_mprotect+0x620/0x620 [ 2942.927131] ? iterate_fd+0x360/0x360 [ 2942.930921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2942.935671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2942.941204] ? security_file_ioctl+0x93/0xc0 [ 2942.945610] ksys_ioctl+0xab/0xd0 [ 2942.949059] __x64_sys_ioctl+0x73/0xb0 [ 2942.952955] ? do_syscall_64+0x5b/0x610 [ 2942.956942] do_syscall_64+0x103/0x610 [ 2942.960824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2942.966002] RIP: 0033:0x458da9 [ 2942.969188] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2942.988088] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2942.995802] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2943.003066] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2943.010325] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2943.017597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2943.024858] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:31:53 executing program 0 (fault-call:12 fault-nth:2): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 21:31:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x4, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:53 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00]}) 21:31:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) [ 2943.376565] FAULT_INJECTION: forcing a failure. [ 2943.376565] name failslab, interval 1, probability 0, space 0, times 0 [ 2943.415496] CPU: 0 PID: 15113 Comm: syz-executor.0 Not tainted 4.19.36 #4 21:31:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x223, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2943.422474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2943.431845] Call Trace: [ 2943.434460] dump_stack+0x172/0x1f0 [ 2943.438123] should_fail.cold+0xa/0x1b [ 2943.442016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2943.447133] ? __should_failslab+0x45/0x190 [ 2943.451475] __should_failslab+0x121/0x190 [ 2943.455726] should_failslab+0x9/0x14 [ 2943.459539] kmem_cache_alloc_node_trace+0x277/0x720 [ 2943.464651] ? kasan_unpoison_shadow+0x35/0x50 [ 2943.469228] __kmalloc_node+0x3d/0x80 [ 2943.473037] blk_mq_alloc_tag_set+0x3c1/0x960 [ 2943.477550] loop_add+0x286/0x8d0 [ 2943.481014] ? loop_lookup+0xb4/0xc0 [ 2943.484749] loop_control_ioctl+0x165/0x360 [ 2943.489077] ? loop_add+0x8d0/0x8d0 [ 2943.492706] ? __might_sleep+0x95/0x190 [ 2943.496690] ? loop_add+0x8d0/0x8d0 [ 2943.500337] do_vfs_ioctl+0xd6e/0x1390 [ 2943.504244] ? selinux_file_ioctl+0x46f/0x5e0 [ 2943.508849] ? selinux_file_ioctl+0x125/0x5e0 [ 2943.513373] ? ioctl_preallocate+0x210/0x210 [ 2943.517803] ? selinux_file_mprotect+0x620/0x620 [ 2943.522592] ? iterate_fd+0x360/0x360 [ 2943.526544] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2943.532073] ? fput+0x128/0x1a0 [ 2943.535711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2943.541255] ? security_file_ioctl+0x93/0xc0 [ 2943.545659] ksys_ioctl+0xab/0xd0 [ 2943.549109] __x64_sys_ioctl+0x73/0xb0 [ 2943.553001] do_syscall_64+0x103/0x610 [ 2943.556911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2943.562098] RIP: 0033:0x458da9 [ 2943.565279] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2943.584174] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2943.591876] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2943.599133] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2943.606399] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2943.613666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2943.620933] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:31:53 executing program 0 (fault-call:12 fault-nth:3): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:53 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x2, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e01]}) 21:31:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 21:31:53 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x3, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2943.976120] FAULT_INJECTION: forcing a failure. [ 2943.976120] name failslab, interval 1, probability 0, space 0, times 0 [ 2944.017953] CPU: 1 PID: 15267 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2944.024936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.034310] Call Trace: [ 2944.036921] dump_stack+0x172/0x1f0 [ 2944.040573] should_fail.cold+0xa/0x1b [ 2944.044496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2944.049621] ? lock_downgrade+0x810/0x810 [ 2944.053792] ? ___might_sleep+0x163/0x280 [ 2944.057964] __should_failslab+0x121/0x190 [ 2944.062216] should_failslab+0x9/0x14 [ 2944.066035] kmem_cache_alloc_node_trace+0x277/0x720 [ 2944.071168] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2944.076721] ? find_next_bit+0x107/0x130 [ 2944.080801] blk_mq_init_tags+0x73/0x2c0 [ 2944.084863] blk_mq_alloc_rq_map+0xa4/0x230 [ 2944.089191] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2944.094145] blk_mq_alloc_tag_set+0x582/0x960 [ 2944.098669] loop_add+0x286/0x8d0 [ 2944.102141] ? idr_find+0x47/0x60 [ 2944.105595] loop_control_ioctl+0x165/0x360 [ 2944.109952] ? loop_add+0x8d0/0x8d0 [ 2944.113578] ? __might_sleep+0x95/0x190 [ 2944.117544] ? loop_add+0x8d0/0x8d0 [ 2944.121196] do_vfs_ioctl+0xd6e/0x1390 [ 2944.125088] ? selinux_file_ioctl+0x46f/0x5e0 [ 2944.129608] ? selinux_file_ioctl+0x125/0x5e0 [ 2944.134112] ? ioctl_preallocate+0x210/0x210 [ 2944.138617] ? selinux_file_mprotect+0x620/0x620 [ 2944.143479] ? iterate_fd+0x360/0x360 [ 2944.147281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.152815] ? security_file_ioctl+0x93/0xc0 [ 2944.157220] ksys_ioctl+0xab/0xd0 [ 2944.160669] __x64_sys_ioctl+0x73/0xb0 [ 2944.164580] do_syscall_64+0x103/0x610 [ 2944.168465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.173643] RIP: 0033:0x458da9 [ 2944.176832] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2944.195722] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2944.203434] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2944.210691] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 21:31:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) [ 2944.217949] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2944.225230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2944.232513] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2944.246913] blk-mq: reduced tag depth (128 -> 64) 21:31:54 executing program 0 (fault-call:12 fault-nth:4): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x4, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:54 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 21:31:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400]}) 21:31:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:54 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x5, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2944.744303] FAULT_INJECTION: forcing a failure. [ 2944.744303] name failslab, interval 1, probability 0, space 0, times 0 [ 2944.811460] CPU: 0 PID: 15457 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2944.818442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2944.827801] Call Trace: [ 2944.830405] dump_stack+0x172/0x1f0 [ 2944.834050] should_fail.cold+0xa/0x1b [ 2944.837952] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2944.843070] ? lock_downgrade+0x810/0x810 [ 2944.847225] ? ___might_sleep+0x163/0x280 [ 2944.851386] __should_failslab+0x121/0x190 [ 2944.855630] should_failslab+0x9/0x14 [ 2944.859433] kmem_cache_alloc_node_trace+0x277/0x720 [ 2944.864549] __kmalloc_node+0x3d/0x80 [ 2944.868355] sbitmap_init_node+0x294/0x470 [ 2944.872600] sbitmap_queue_init_node+0x3a/0x6c0 [ 2944.877274] ? find_next_bit+0x107/0x130 [ 2944.881350] blk_mq_init_tags+0x119/0x2c0 [ 2944.886107] blk_mq_alloc_rq_map+0xa4/0x230 [ 2944.890428] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2944.894935] blk_mq_alloc_tag_set+0x582/0x960 [ 2944.899440] loop_add+0x286/0x8d0 [ 2944.902895] ? idr_find+0x47/0x60 [ 2944.906369] loop_control_ioctl+0x165/0x360 [ 2944.910691] ? loop_add+0x8d0/0x8d0 [ 2944.914327] ? __might_sleep+0x95/0x190 [ 2944.918313] ? loop_add+0x8d0/0x8d0 [ 2944.921952] do_vfs_ioctl+0xd6e/0x1390 [ 2944.925843] ? selinux_file_ioctl+0x46f/0x5e0 [ 2944.930346] ? selinux_file_ioctl+0x125/0x5e0 [ 2944.934852] ? ioctl_preallocate+0x210/0x210 [ 2944.939263] ? selinux_file_mprotect+0x620/0x620 [ 2944.944045] ? iterate_fd+0x360/0x360 [ 2944.947859] ? __fget_light+0x55/0x230 [ 2944.951756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2944.957306] ? security_file_ioctl+0x93/0xc0 [ 2944.961729] ksys_ioctl+0xab/0xd0 [ 2944.965193] __x64_sys_ioctl+0x73/0xb0 [ 2944.969086] do_syscall_64+0x103/0x610 [ 2944.972988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2944.978179] RIP: 0033:0x458da9 [ 2944.981375] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.000277] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2945.007999] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2945.015270] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2945.022547] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2945.029832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2945.037111] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:31:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) [ 2945.073194] blk-mq: reduced tag depth (128 -> 64) 21:31:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a00]}) 21:31:55 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:55 executing program 0 (fault-call:12 fault-nth:5): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x5844000000000000}, 0x0) 21:31:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x8, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:55 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b00]}) [ 2945.517456] FAULT_INJECTION: forcing a failure. [ 2945.517456] name failslab, interval 1, probability 0, space 0, times 0 [ 2945.545519] CPU: 0 PID: 15566 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2945.552509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2945.552518] Call Trace: 21:31:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2945.552544] dump_stack+0x172/0x1f0 [ 2945.552566] should_fail.cold+0xa/0x1b [ 2945.552589] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2945.552610] ? lock_downgrade+0x810/0x810 [ 2945.552629] ? ___might_sleep+0x163/0x280 [ 2945.552652] __should_failslab+0x121/0x190 [ 2945.552674] should_failslab+0x9/0x14 [ 2945.593826] kmem_cache_alloc_node_trace+0x277/0x720 [ 2945.598944] ? check_preemption_disabled+0x48/0x290 [ 2945.603952] ? sbitmap_init_node+0x330/0x470 [ 2945.608441] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2945.613630] ? find_next_bit+0x107/0x130 [ 2945.617685] sbitmap_queue_init_node+0x23e/0x6c0 [ 2945.622769] blk_mq_init_tags+0x119/0x2c0 [ 2945.626924] blk_mq_alloc_rq_map+0xa4/0x230 [ 2945.631253] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2945.635744] blk_mq_alloc_tag_set+0x582/0x960 [ 2945.640301] loop_add+0x286/0x8d0 [ 2945.643753] ? idr_find+0x47/0x60 [ 2945.647204] loop_control_ioctl+0x165/0x360 [ 2945.651526] ? loop_add+0x8d0/0x8d0 [ 2945.655159] ? loop_add+0x8d0/0x8d0 [ 2945.658778] do_vfs_ioctl+0xd6e/0x1390 [ 2945.662680] ? ioctl_preallocate+0x210/0x210 [ 2945.667089] ? selinux_file_mprotect+0x620/0x620 [ 2945.671840] ? iterate_fd+0x360/0x360 [ 2945.675633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2945.681159] ? fput+0x128/0x1a0 [ 2945.684452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2945.690002] ? security_file_ioctl+0x93/0xc0 [ 2945.694406] ksys_ioctl+0xab/0xd0 [ 2945.697852] __x64_sys_ioctl+0x73/0xb0 [ 2945.701731] do_syscall_64+0x103/0x610 [ 2945.705611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2945.710799] RIP: 0033:0x458da9 [ 2945.713981] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2945.732893] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2945.740609] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2945.747896] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2945.755173] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2945.762445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2945.769725] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2945.789987] blk-mq: reduced tag depth (128 -> 64) [ 2945.800057] validate_nla: 46 callbacks suppressed [ 2945.800067] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x300, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2945.827928] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2945.893047] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2945.900472] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 21:31:56 executing program 0 (fault-call:12 fault-nth:6): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x500, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001]}) 21:31:56 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2946.162933] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2946.198565] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2946.229888] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2946.246705] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) [ 2946.286817] FAULT_INJECTION: forcing a failure. [ 2946.286817] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.308267] CPU: 0 PID: 15701 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2946.315586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2946.324942] Call Trace: [ 2946.327557] dump_stack+0x172/0x1f0 [ 2946.331199] should_fail.cold+0xa/0x1b [ 2946.335093] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2946.340213] ? lock_downgrade+0x810/0x810 [ 2946.344409] ? ___might_sleep+0x163/0x280 [ 2946.348580] __should_failslab+0x121/0x190 [ 2946.352841] should_failslab+0x9/0x14 [ 2946.356658] kmem_cache_alloc_node_trace+0x277/0x720 [ 2946.361762] ? __lockdep_init_map+0x10c/0x5b0 [ 2946.366277] sbitmap_queue_init_node+0x23e/0x6c0 [ 2946.371145] blk_mq_init_tags+0x17b/0x2c0 [ 2946.375290] blk_mq_alloc_rq_map+0xa4/0x230 [ 2946.379634] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2946.384163] blk_mq_alloc_tag_set+0x582/0x960 [ 2946.388676] loop_add+0x286/0x8d0 [ 2946.392127] ? idr_find+0x47/0x60 [ 2946.395600] loop_control_ioctl+0x165/0x360 [ 2946.399924] ? loop_add+0x8d0/0x8d0 [ 2946.403567] ? __might_sleep+0x95/0x190 [ 2946.407908] ? loop_add+0x8d0/0x8d0 [ 2946.412156] do_vfs_ioctl+0xd6e/0x1390 [ 2946.416051] ? selinux_file_ioctl+0x46f/0x5e0 [ 2946.420578] ? selinux_file_ioctl+0x125/0x5e0 [ 2946.425268] ? ioctl_preallocate+0x210/0x210 [ 2946.429694] ? selinux_file_mprotect+0x620/0x620 [ 2946.434459] ? iterate_fd+0x360/0x360 [ 2946.438437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2946.443213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2946.448873] ? security_file_ioctl+0x93/0xc0 [ 2946.453320] ksys_ioctl+0xab/0xd0 [ 2946.456805] __x64_sys_ioctl+0x73/0xb0 [ 2946.460731] ? do_syscall_64+0x5b/0x610 [ 2946.464719] do_syscall_64+0x103/0x610 [ 2946.468639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2946.473841] RIP: 0033:0x458da9 [ 2946.477032] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2946.496464] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2946.504204] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2946.511483] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2946.518752] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.526117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 21:31:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x1000000, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2946.533631] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2946.549100] blk-mq: reduced tag depth (128 -> 64) 21:31:56 executing program 0 (fault-call:12 fault-nth:7): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2946.741313] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:31:56 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x2000000, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2946.850668] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:31:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}) 21:31:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 21:31:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2947.004499] FAULT_INJECTION: forcing a failure. [ 2947.004499] name failslab, interval 1, probability 0, space 0, times 0 [ 2947.036421] CPU: 1 PID: 15853 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2947.043413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:31:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x3000000, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2947.052814] Call Trace: [ 2947.055525] dump_stack+0x172/0x1f0 [ 2947.059197] should_fail.cold+0xa/0x1b [ 2947.063153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2947.068299] ? ___might_sleep+0x163/0x280 [ 2947.072486] __should_failslab+0x121/0x190 [ 2947.077270] should_failslab+0x9/0x14 [ 2947.081258] kmem_cache_alloc_node_trace+0x277/0x720 [ 2947.086405] ? sbitmap_queue_init_node+0x53/0x6c0 [ 2947.091263] __kmalloc_node+0x3d/0x80 [ 2947.095097] blk_mq_alloc_rq_map+0xd5/0x230 [ 2947.099437] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2947.104122] blk_mq_alloc_tag_set+0x582/0x960 [ 2947.108640] loop_add+0x286/0x8d0 [ 2947.112090] ? idr_find+0x47/0x60 [ 2947.115566] loop_control_ioctl+0x165/0x360 [ 2947.119901] ? loop_add+0x8d0/0x8d0 [ 2947.123524] ? __might_sleep+0x95/0x190 [ 2947.127510] ? loop_add+0x8d0/0x8d0 [ 2947.131148] do_vfs_ioctl+0xd6e/0x1390 [ 2947.135037] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2947.139803] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2947.144408] ? ioctl_preallocate+0x210/0x210 [ 2947.148855] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2947.153636] ? retint_kernel+0x2d/0x2d [ 2947.157531] ksys_ioctl+0xab/0xd0 [ 2947.160986] __x64_sys_ioctl+0x73/0xb0 [ 2947.164875] do_syscall_64+0x103/0x610 [ 2947.168787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2947.174170] RIP: 0033:0x458da9 [ 2947.180936] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2947.201789] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2947.209507] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2947.216790] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2947.224073] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2947.231344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2947.238618] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2947.257666] blk-mq: reduced tag depth (128 -> 64) 21:31:57 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:57 executing program 0 (fault-call:12 fault-nth:8): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:57 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 21:31:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x4000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4900]}) 21:31:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2947.713636] FAULT_INJECTION: forcing a failure. [ 2947.713636] name failslab, interval 1, probability 0, space 0, times 0 [ 2947.734238] CPU: 1 PID: 15947 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2947.741217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2947.750591] Call Trace: [ 2947.753332] dump_stack+0x172/0x1f0 [ 2947.757009] should_fail.cold+0xa/0x1b [ 2947.760939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2947.766085] ? ___might_sleep+0x163/0x280 [ 2947.770364] __should_failslab+0x121/0x190 [ 2947.774646] should_failslab+0x9/0x14 [ 2947.779815] kmem_cache_alloc_node_trace+0x277/0x720 [ 2947.784956] ? sbitmap_queue_init_node+0x53/0x6c0 [ 2947.789850] ? kasan_unpoison_shadow+0x35/0x50 [ 2947.794486] __kmalloc_node+0x3d/0x80 [ 2947.798326] blk_mq_alloc_rq_map+0x116/0x230 [ 2947.802822] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 2947.807336] blk_mq_alloc_tag_set+0x582/0x960 [ 2947.811839] loop_add+0x286/0x8d0 [ 2947.815303] ? idr_find+0x47/0x60 [ 2947.818773] loop_control_ioctl+0x165/0x360 [ 2947.823108] ? loop_add+0x8d0/0x8d0 [ 2947.826866] ? __inode_security_revalidate+0x71/0x120 [ 2947.832082] ? __inode_security_revalidate+0x8a/0x120 [ 2947.837293] ? loop_add+0x8d0/0x8d0 [ 2947.840927] do_vfs_ioctl+0xd6e/0x1390 [ 2947.844913] ? selinux_file_ioctl+0x46f/0x5e0 [ 2947.849406] ? selinux_file_ioctl+0x125/0x5e0 [ 2947.853939] ? ioctl_preallocate+0x210/0x210 [ 2947.858355] ? selinux_file_mprotect+0x620/0x620 [ 2947.863119] ? iterate_fd+0x360/0x360 [ 2947.866929] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2947.871687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2947.877223] ? security_file_ioctl+0x93/0xc0 [ 2947.881671] ksys_ioctl+0xab/0xd0 [ 2947.885128] __x64_sys_ioctl+0x73/0xb0 [ 2947.889013] ? do_syscall_64+0x5b/0x610 [ 2947.893255] do_syscall_64+0x103/0x610 [ 2947.897150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2947.902516] RIP: 0033:0x458da9 [ 2947.905737] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2947.924640] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2947.932392] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2947.939660] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2947.946933] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2947.954210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 21:31:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 21:31:57 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2947.961496] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2947.975252] blk-mq: reduced tag depth (128 -> 64) 21:31:58 executing program 0 (fault-call:12 fault-nth:9): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 21:31:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x5000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:58 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7401]}) 21:31:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x8000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:31:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2948.489339] FAULT_INJECTION: forcing a failure. [ 2948.489339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2948.521779] CPU: 1 PID: 16140 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2948.528777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2948.538162] Call Trace: [ 2948.540782] dump_stack+0x172/0x1f0 [ 2948.544453] should_fail.cold+0xa/0x1b [ 2948.548372] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2948.553498] ? ___might_sleep+0x163/0x280 [ 2948.557668] ? __might_sleep+0x95/0x190 [ 2948.561662] __alloc_pages_nodemask+0x1ee/0x760 [ 2948.566356] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2948.571472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2948.577031] ? __cpu_to_node+0x7e/0xa0 [ 2948.580935] ? blk_mq_hw_queue_to_node+0xcf/0x110 [ 2948.585811] blk_mq_alloc_rqs+0x23e/0x820 [ 2948.589974] ? __kmalloc_node+0x51/0x80 [ 2948.593974] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 2948.598588] blk_mq_alloc_tag_set+0x582/0x960 [ 2948.603107] loop_add+0x286/0x8d0 [ 2948.606570] ? idr_find+0x47/0x60 [ 2948.610037] loop_control_ioctl+0x165/0x360 [ 2948.614395] ? loop_add+0x8d0/0x8d0 [ 2948.618038] ? __might_sleep+0x95/0x190 [ 2948.622056] ? loop_add+0x8d0/0x8d0 [ 2948.625800] do_vfs_ioctl+0xd6e/0x1390 [ 2948.632915] ? selinux_file_ioctl+0x46f/0x5e0 [ 2948.637599] ? selinux_file_ioctl+0x125/0x5e0 [ 2948.642109] ? ioctl_preallocate+0x210/0x210 [ 2948.646536] ? selinux_file_mprotect+0x620/0x620 [ 2948.651323] ? iterate_fd+0x360/0x360 [ 2948.655142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2948.660692] ? fput+0x128/0x1a0 [ 2948.663998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2948.669555] ? security_file_ioctl+0x93/0xc0 [ 2948.673982] ksys_ioctl+0xab/0xd0 [ 2948.677536] __x64_sys_ioctl+0x73/0xb0 [ 2948.681441] do_syscall_64+0x103/0x610 [ 2948.685346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2948.690553] RIP: 0033:0x458da9 [ 2948.693755] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2948.712678] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2948.720436] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2948.727733] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2948.735031] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2948.742339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2948.749882] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:31:58 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00<\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7501]}) 21:31:58 executing program 0 (fault-call:12 fault-nth:10): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x80ffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:31:59 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7601]}) 21:31:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x81ffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2949.264504] FAULT_INJECTION: forcing a failure. [ 2949.264504] name failslab, interval 1, probability 0, space 0, times 0 [ 2949.278359] CPU: 0 PID: 16267 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2949.285321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2949.294684] Call Trace: [ 2949.297284] dump_stack+0x172/0x1f0 [ 2949.300919] should_fail.cold+0xa/0x1b [ 2949.304810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2949.309910] ? ___might_sleep+0x75/0x280 [ 2949.313975] ? ___might_sleep+0x163/0x280 [ 2949.318133] __should_failslab+0x121/0x190 [ 2949.322376] should_failslab+0x9/0x14 [ 2949.326190] kmem_cache_alloc_node+0x26f/0x710 [ 2949.330769] ? lockdep_init_map+0x9/0x10 [ 2949.334836] ? debug_mutex_init+0x2d/0x60 [ 2949.339000] blk_alloc_queue_node+0x35/0xb70 [ 2949.343415] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2949.348110] blk_mq_init_queue+0x4c/0xb0 [ 2949.352181] loop_add+0x2dd/0x8d0 [ 2949.355648] loop_control_ioctl+0x165/0x360 [ 2949.360065] ? loop_add+0x8d0/0x8d0 [ 2949.363703] ? __might_sleep+0x95/0x190 [ 2949.367696] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2949.372463] ? loop_add+0x8d0/0x8d0 [ 2949.376100] do_vfs_ioctl+0xd6e/0x1390 [ 2949.379994] ? selinux_file_ioctl+0x46f/0x5e0 [ 2949.384579] ? selinux_file_ioctl+0x125/0x5e0 [ 2949.389079] ? ioctl_preallocate+0x210/0x210 [ 2949.393492] ? selinux_file_mprotect+0x620/0x620 [ 2949.398262] ? retint_kernel+0x2d/0x2d [ 2949.402172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2949.407742] ? security_file_ioctl+0x93/0xc0 [ 2949.412191] ksys_ioctl+0xab/0xd0 [ 2949.415662] __x64_sys_ioctl+0x73/0xb0 [ 2949.419565] ? do_syscall_64+0xda/0x610 [ 2949.423662] do_syscall_64+0x103/0x610 [ 2949.427571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2949.432771] RIP: 0033:0x458da9 [ 2949.435982] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2949.455076] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2949.462811] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2949.470091] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2949.477362] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2949.484637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2949.491915] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:31:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:31:59 executing program 0 (fault-call:12 fault-nth:11): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:31:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x92ffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:31:59 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00C\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:31:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7702]}) 21:31:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2949.995796] FAULT_INJECTION: forcing a failure. [ 2949.995796] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2950.007653] CPU: 0 PID: 16418 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2950.014682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.024058] Call Trace: [ 2950.026668] dump_stack+0x172/0x1f0 [ 2950.030329] should_fail.cold+0xa/0x1b [ 2950.034236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2950.039027] ? fault_create_debugfs_attr+0x1e0/0x1e0 21:32:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x93ffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7900]}) [ 2950.044158] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2950.049111] __alloc_pages_nodemask+0x1ee/0x760 [ 2950.049131] ? retint_kernel+0x2d/0x2d [ 2950.049146] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2950.049175] cache_grow_begin+0x9c/0x8c0 [ 2950.057753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2950.057772] ? check_preemption_disabled+0x48/0x290 [ 2950.057799] kmem_cache_alloc_node+0x650/0x710 [ 2950.082015] ? lockdep_init_map+0x9/0x10 [ 2950.086114] blk_alloc_queue_node+0x35/0xb70 [ 2950.090540] ? blk_mq_alloc_tag_set+0x4a8/0x960 21:32:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:00 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00D\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2950.095236] blk_mq_init_queue+0x4c/0xb0 [ 2950.099334] loop_add+0x2dd/0x8d0 [ 2950.102820] loop_control_ioctl+0x165/0x360 [ 2950.107157] ? loop_add+0x8d0/0x8d0 [ 2950.110801] ? __might_sleep+0x95/0x190 [ 2950.114784] ? loop_add+0x8d0/0x8d0 [ 2950.118419] do_vfs_ioctl+0xd6e/0x1390 [ 2950.122302] ? selinux_file_ioctl+0x46f/0x5e0 [ 2950.126805] ? selinux_file_ioctl+0x125/0x5e0 [ 2950.131320] ? ioctl_preallocate+0x210/0x210 [ 2950.135726] ? selinux_file_mprotect+0x620/0x620 [ 2950.140498] ? iterate_fd+0x360/0x360 [ 2950.144317] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2950.149099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.154745] ? security_file_ioctl+0x93/0xc0 [ 2950.159184] ksys_ioctl+0xab/0xd0 [ 2950.162666] __x64_sys_ioctl+0x73/0xb0 [ 2950.166577] ? do_syscall_64+0x5b/0x610 [ 2950.170590] do_syscall_64+0x103/0x610 [ 2950.174511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2950.179734] RIP: 0033:0x458da9 [ 2950.182949] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2950.201857] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2950.209584] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2950.216856] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2950.224133] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2950.231420] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2950.238688] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:00 executing program 0 (fault-call:12 fault-nth:12): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:00 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x94ffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a01]}) 21:32:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2950.705301] FAULT_INJECTION: forcing a failure. [ 2950.705301] name failslab, interval 1, probability 0, space 0, times 0 [ 2950.725438] CPU: 1 PID: 16516 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2950.732437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2950.741823] Call Trace: [ 2950.744441] dump_stack+0x172/0x1f0 [ 2950.748109] should_fail.cold+0xa/0x1b [ 2950.752012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2950.757142] __should_failslab+0x121/0x190 [ 2950.761406] should_failslab+0x9/0x14 [ 2950.765228] kmem_cache_alloc_node_trace+0x277/0x720 [ 2950.770358] ? __lockdep_init_map+0x10c/0x5b0 [ 2950.774890] __kmalloc_node+0x3d/0x80 [ 2950.778709] ? mempool_alloc+0x380/0x380 [ 2950.782788] ? mempool_free+0x380/0x380 [ 2950.786780] mempool_init_node+0x138/0x560 [ 2950.791028] ? wait_for_completion+0x440/0x440 [ 2950.795625] ? mempool_alloc+0x380/0x380 [ 2950.799694] ? mempool_free+0x380/0x380 [ 2950.804020] mempool_init+0x3d/0x50 [ 2950.807660] bioset_init+0x33a/0x710 [ 2950.811406] blk_alloc_queue_node+0x188/0xb70 [ 2950.815909] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2950.820592] blk_mq_init_queue+0x4c/0xb0 [ 2950.824663] loop_add+0x2dd/0x8d0 [ 2950.828120] ? idr_find+0x47/0x60 [ 2950.831586] loop_control_ioctl+0x165/0x360 [ 2950.835919] ? loop_add+0x8d0/0x8d0 [ 2950.839553] ? loop_add+0x8d0/0x8d0 [ 2950.843196] do_vfs_ioctl+0xd6e/0x1390 [ 2950.847091] ? selinux_file_ioctl+0x46f/0x5e0 [ 2950.851590] ? selinux_file_ioctl+0x125/0x5e0 [ 2950.856105] ? ioctl_preallocate+0x210/0x210 [ 2950.861040] ? selinux_file_mprotect+0x620/0x620 [ 2950.865818] ? iterate_fd+0x360/0x360 [ 2950.869636] ? __fget_light+0x55/0x230 [ 2950.873551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2950.879125] ? security_file_ioctl+0x93/0xc0 [ 2950.883558] ksys_ioctl+0xab/0xd0 [ 2950.888188] __x64_sys_ioctl+0x73/0xb0 [ 2950.892186] do_syscall_64+0x103/0x610 [ 2950.896183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2950.901399] RIP: 0033:0x458da9 [ 2950.904601] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2950.923547] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2950.931280] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2950.938573] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2950.945899] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2950.953188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2950.960475] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2950.981831] validate_nla: 38 callbacks suppressed [ 2950.981841] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2950.996766] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:01 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:01 executing program 0 (fault-call:12 fault-nth:13): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2951.123454] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2951.132641] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xfdffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:01 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2951.343566] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b01]}) 21:32:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xfeffffff, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2951.391891] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2951.410178] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2951.418907] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2951.464840] FAULT_INJECTION: forcing a failure. [ 2951.464840] name failslab, interval 1, probability 0, space 0, times 0 [ 2951.493721] CPU: 1 PID: 16701 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2951.500711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2951.510090] Call Trace: [ 2951.512706] dump_stack+0x172/0x1f0 [ 2951.516369] should_fail.cold+0xa/0x1b [ 2951.520298] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2951.525439] ? lock_downgrade+0x810/0x810 [ 2951.529638] ? ___might_sleep+0x163/0x280 [ 2951.533835] ? mempool_free+0x380/0x380 [ 2951.537846] __should_failslab+0x121/0x190 [ 2951.542118] should_failslab+0x9/0x14 [ 2951.545950] kmem_cache_alloc+0x2b1/0x700 [ 2951.550127] ? kasan_unpoison_shadow+0x35/0x50 [ 2951.554738] ? kasan_kmalloc+0xce/0xf0 [ 2951.558653] ? mempool_free+0x380/0x380 [ 2951.562646] mempool_alloc_slab+0x47/0x60 [ 2951.566819] ? mempool_alloc+0x380/0x380 [ 2951.571024] mempool_init_node+0x2e1/0x560 [ 2951.575323] ? mempool_alloc+0x380/0x380 [ 2951.579401] ? mempool_free+0x380/0x380 [ 2951.583393] mempool_init+0x3d/0x50 [ 2951.587045] bioset_init+0x33a/0x710 [ 2951.590813] blk_alloc_queue_node+0x188/0xb70 [ 2951.595448] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2951.600149] blk_mq_init_queue+0x4c/0xb0 [ 2951.604233] loop_add+0x2dd/0x8d0 [ 2951.607719] ? idr_find+0x47/0x60 [ 2951.611198] loop_control_ioctl+0x165/0x360 [ 2951.615541] ? loop_add+0x8d0/0x8d0 [ 2951.619188] ? __might_sleep+0x95/0x190 [ 2951.623179] ? loop_add+0x8d0/0x8d0 [ 2951.626833] do_vfs_ioctl+0xd6e/0x1390 [ 2951.630740] ? selinux_file_ioctl+0x46f/0x5e0 [ 2951.635253] ? selinux_file_ioctl+0x125/0x5e0 [ 2951.639783] ? ioctl_preallocate+0x210/0x210 [ 2951.644225] ? selinux_file_mprotect+0x620/0x620 [ 2951.649021] ? iterate_fd+0x360/0x360 [ 2951.652853] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2951.658416] ? fput+0x128/0x1a0 [ 2951.661746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2951.667329] ? security_file_ioctl+0x93/0xc0 [ 2951.671768] ksys_ioctl+0xab/0xd0 [ 2951.675249] __x64_sys_ioctl+0x73/0xb0 [ 2951.679259] do_syscall_64+0x103/0x610 [ 2951.683170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2951.688368] RIP: 0033:0x458da9 [ 2951.691573] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:32:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xffffff80, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2951.710509] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2951.718249] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2951.725545] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2951.732970] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2951.740258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2951.747569] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2951.834975] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:01 executing program 0 (fault-call:12 fault-nth:14): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:01 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2951.886150] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xffffff81, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f04]}) 21:32:02 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xffffff92, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2952.205215] FAULT_INJECTION: forcing a failure. [ 2952.205215] name failslab, interval 1, probability 0, space 0, times 0 [ 2952.242383] CPU: 1 PID: 16842 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2952.249379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2952.258769] Call Trace: [ 2952.261400] dump_stack+0x172/0x1f0 [ 2952.265075] should_fail.cold+0xa/0x1b [ 2952.268999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2952.274129] ? lock_downgrade+0x810/0x810 [ 2952.278312] ? ___might_sleep+0x163/0x280 [ 2952.282488] __should_failslab+0x121/0x190 [ 2952.286745] should_failslab+0x9/0x14 [ 2952.290661] kmem_cache_alloc+0x2b1/0x700 [ 2952.294834] ? kasan_unpoison_shadow+0x35/0x50 [ 2952.294853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2952.294870] ? __phys_addr+0xa4/0x120 [ 2952.294884] ? mempool_init+0x3d/0x50 [ 2952.294903] mempool_alloc_slab+0x47/0x60 [ 2952.294917] ? mempool_alloc+0x380/0x380 [ 2952.294931] mempool_init_node+0x2e1/0x560 [ 2952.294952] ? mempool_alloc+0x380/0x380 [ 2952.294965] ? mempool_free+0x380/0x380 [ 2952.294979] mempool_init+0x3d/0x50 [ 2952.294999] bioset_init+0x33a/0x710 [ 2952.340555] blk_alloc_queue_node+0x188/0xb70 [ 2952.345342] ? blk_mq_init_queue+0x12/0xb0 [ 2952.349624] blk_mq_init_queue+0x4c/0xb0 [ 2952.353706] loop_add+0x2dd/0x8d0 [ 2952.357175] ? idr_find+0x47/0x60 [ 2952.360680] loop_control_ioctl+0x165/0x360 [ 2952.365030] ? loop_add+0x8d0/0x8d0 [ 2952.368676] ? __inode_security_revalidate+0x71/0x120 [ 2952.373895] ? __inode_security_revalidate+0x8a/0x120 [ 2952.379122] ? loop_add+0x8d0/0x8d0 [ 2952.382773] do_vfs_ioctl+0xd6e/0x1390 [ 2952.386702] ? selinux_file_ioctl+0x46f/0x5e0 [ 2952.391218] ? selinux_file_ioctl+0x125/0x5e0 [ 2952.395734] ? ioctl_preallocate+0x210/0x210 [ 2952.400171] ? selinux_file_mprotect+0x620/0x620 [ 2952.404980] ? iterate_fd+0x360/0x360 [ 2952.408919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2952.414483] ? fput+0x128/0x1a0 [ 2952.417791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2952.423358] ? security_file_ioctl+0x93/0xc0 [ 2952.427793] ksys_ioctl+0xab/0xd0 [ 2952.431272] __x64_sys_ioctl+0x73/0xb0 [ 2952.435178] do_syscall_64+0x103/0x610 [ 2952.439080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2952.444306] RIP: 0033:0x458da9 [ 2952.447512] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2952.466439] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2952.474167] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2952.481479] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2952.488763] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2952.496053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2952.503357] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:02 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8004]}) 21:32:02 executing program 0 (fault-call:12 fault-nth:15): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xffffff93, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:02 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xffffff94, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8501]}) [ 2953.077653] FAULT_INJECTION: forcing a failure. [ 2953.077653] name failslab, interval 1, probability 0, space 0, times 0 [ 2953.089968] CPU: 1 PID: 16993 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2953.096929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.106303] Call Trace: [ 2953.109063] dump_stack+0x172/0x1f0 [ 2953.112716] should_fail.cold+0xa/0x1b [ 2953.116628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2953.121744] ? lock_downgrade+0x810/0x810 [ 2953.125913] ? ___might_sleep+0x163/0x280 [ 2953.130080] __should_failslab+0x121/0x190 [ 2953.134347] should_failslab+0x9/0x14 [ 2953.138162] kmem_cache_alloc_node_trace+0x277/0x720 [ 2953.143279] ? __lockdep_init_map+0x10c/0x5b0 [ 2953.147790] __kmalloc_node+0x3d/0x80 [ 2953.151627] ? mempool_alloc+0x380/0x380 [ 2953.155698] ? mempool_free+0x380/0x380 [ 2953.159705] mempool_init_node+0x138/0x560 [ 2953.163968] ? mempool_alloc+0x380/0x380 [ 2953.168043] ? mempool_free+0x380/0x380 [ 2953.172026] mempool_init+0x3d/0x50 [ 2953.175671] bioset_init+0x547/0x710 [ 2953.179400] blk_alloc_queue_node+0x188/0xb70 [ 2953.183930] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2953.188618] blk_mq_init_queue+0x4c/0xb0 [ 2953.192690] loop_add+0x2dd/0x8d0 [ 2953.196331] ? idr_find+0x47/0x60 [ 2953.199811] loop_control_ioctl+0x165/0x360 [ 2953.204231] ? loop_add+0x8d0/0x8d0 [ 2953.207897] ? loop_add+0x8d0/0x8d0 [ 2953.211551] do_vfs_ioctl+0xd6e/0x1390 [ 2953.215455] ? selinux_file_ioctl+0x46f/0x5e0 [ 2953.220054] ? selinux_file_ioctl+0x125/0x5e0 [ 2953.224595] ? ioctl_preallocate+0x210/0x210 [ 2953.229028] ? selinux_file_mprotect+0x620/0x620 [ 2953.233948] ? iterate_fd+0x360/0x360 [ 2953.237774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2953.243506] ? security_file_ioctl+0x93/0xc0 [ 2953.247932] ksys_ioctl+0xab/0xd0 [ 2953.251403] __x64_sys_ioctl+0x73/0xb0 [ 2953.255311] do_syscall_64+0x103/0x610 [ 2953.259218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2953.264418] RIP: 0033:0x458da9 [ 2953.267622] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2953.286537] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2953.294261] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2953.301537] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2953.308841] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2953.316124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2953.323405] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:03 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:03 executing program 0 (fault-call:12 fault-nth:16): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xfffffffd, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xfffffffe, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8601]}) 21:32:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:03 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2953.781107] FAULT_INJECTION: forcing a failure. [ 2953.781107] name failslab, interval 1, probability 0, space 0, times 0 [ 2953.810180] CPU: 1 PID: 17116 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2953.817318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2953.826688] Call Trace: [ 2953.829298] dump_stack+0x172/0x1f0 [ 2953.832939] should_fail.cold+0xa/0x1b [ 2953.836857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2953.842101] ? lock_downgrade+0x810/0x810 [ 2953.846415] ? ___might_sleep+0x163/0x280 [ 2953.850838] ? mempool_free+0x380/0x380 [ 2953.854968] __should_failslab+0x121/0x190 [ 2953.859211] should_failslab+0x9/0x14 [ 2953.863019] kmem_cache_alloc+0x2b1/0x700 [ 2953.867191] ? mempool_alloc_slab+0x13/0x60 [ 2953.871530] ? mempool_free+0x380/0x380 [ 2953.875503] mempool_alloc_slab+0x47/0x60 [ 2953.879651] ? mempool_alloc+0x380/0x380 [ 2953.883731] mempool_init_node+0x2e1/0x560 [ 2953.888107] ? mempool_alloc+0x380/0x380 [ 2953.892274] ? mempool_free+0x380/0x380 [ 2953.896255] mempool_init+0x3d/0x50 [ 2953.899943] bioset_init+0x547/0x710 [ 2953.903670] blk_alloc_queue_node+0x188/0xb70 [ 2953.908279] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2953.913169] blk_mq_init_queue+0x4c/0xb0 [ 2953.917253] loop_add+0x2dd/0x8d0 [ 2953.920718] ? idr_find+0x47/0x60 [ 2953.924194] loop_control_ioctl+0x165/0x360 [ 2953.928522] ? loop_add+0x8d0/0x8d0 [ 2953.932208] ? __might_sleep+0x95/0x190 [ 2953.936357] ? loop_add+0x8d0/0x8d0 [ 2953.939997] do_vfs_ioctl+0xd6e/0x1390 [ 2953.943908] ? selinux_file_ioctl+0x46f/0x5e0 [ 2953.948404] ? selinux_file_ioctl+0x125/0x5e0 [ 2953.952909] ? ioctl_preallocate+0x210/0x210 [ 2953.957329] ? selinux_file_mprotect+0x620/0x620 [ 2953.962090] ? iterate_fd+0x360/0x360 [ 2953.966004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2953.971554] ? security_file_ioctl+0x93/0xc0 [ 2953.975963] ksys_ioctl+0xab/0xd0 [ 2953.979414] __x64_sys_ioctl+0x73/0xb0 [ 2953.983315] do_syscall_64+0x103/0x610 [ 2953.987226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2953.992512] RIP: 0033:0x458da9 [ 2953.995711] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.014732] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2954.022441] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2954.029707] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2954.036975] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2954.044252] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2954.051535] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:04 executing program 0 (fault-call:12 fault-nth:17): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x100000000000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:04 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8701]}) 21:32:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x200000000000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2954.515965] FAULT_INJECTION: forcing a failure. [ 2954.515965] name failslab, interval 1, probability 0, space 0, times 0 [ 2954.552793] CPU: 0 PID: 17272 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2954.559782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2954.569156] Call Trace: [ 2954.569187] dump_stack+0x172/0x1f0 [ 2954.575404] should_fail.cold+0xa/0x1b [ 2954.575423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2954.575441] ? lock_downgrade+0x810/0x810 [ 2954.575457] ? ___might_sleep+0x163/0x280 [ 2954.575478] __should_failslab+0x121/0x190 [ 2954.575498] should_failslab+0x9/0x14 [ 2954.600881] kmem_cache_alloc+0x2b1/0x700 [ 2954.605051] ? kasan_unpoison_shadow+0x35/0x50 [ 2954.609653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2954.615213] ? __phys_addr+0xa4/0x120 [ 2954.619034] ? mempool_init+0x3d/0x50 [ 2954.622864] mempool_alloc_slab+0x47/0x60 [ 2954.627033] ? mempool_alloc+0x380/0x380 [ 2954.631109] mempool_init_node+0x2e1/0x560 [ 2954.635365] ? mempool_alloc+0x380/0x380 [ 2954.639440] ? mempool_free+0x380/0x380 [ 2954.643452] mempool_init+0x3d/0x50 [ 2954.647101] bioset_init+0x547/0x710 [ 2954.650838] blk_alloc_queue_node+0x188/0xb70 [ 2954.655350] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2954.660035] blk_mq_init_queue+0x4c/0xb0 [ 2954.664107] loop_add+0x2dd/0x8d0 [ 2954.667574] loop_control_ioctl+0x165/0x360 [ 2954.671900] ? loop_add+0x8d0/0x8d0 [ 2954.675535] ? __might_sleep+0x95/0x190 [ 2954.679516] ? loop_add+0x8d0/0x8d0 [ 2954.683165] do_vfs_ioctl+0xd6e/0x1390 [ 2954.687059] ? selinux_file_ioctl+0x46f/0x5e0 [ 2954.691561] ? selinux_file_ioctl+0x125/0x5e0 [ 2954.696068] ? ioctl_preallocate+0x210/0x210 [ 2954.700482] ? selinux_file_mprotect+0x620/0x620 [ 2954.705255] ? iterate_fd+0x360/0x360 [ 2954.709067] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2954.714614] ? fput+0x128/0x1a0 [ 2954.717912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2954.723459] ? security_file_ioctl+0x93/0xc0 [ 2954.727881] ksys_ioctl+0xab/0xd0 [ 2954.731346] __x64_sys_ioctl+0x73/0xb0 [ 2954.735247] do_syscall_64+0x103/0x610 [ 2954.739155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2954.745583] RIP: 0033:0x458da9 [ 2954.753368] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2954.772283] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2954.780017] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2954.787318] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2954.794612] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2954.801894] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2954.809186] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x300000000000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:04 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b00]}) 21:32:05 executing program 0 (fault-call:12 fault-nth:18): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:05 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x400000000000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900d]}) 21:32:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2955.375820] FAULT_INJECTION: forcing a failure. [ 2955.375820] name failslab, interval 1, probability 0, space 0, times 0 21:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x500000000000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:05 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2955.462797] CPU: 1 PID: 17422 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2955.469789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2955.479169] Call Trace: [ 2955.481783] dump_stack+0x172/0x1f0 [ 2955.485457] should_fail.cold+0xa/0x1b [ 2955.489463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2955.494594] ? lock_downgrade+0x810/0x810 [ 2955.498764] ? ___might_sleep+0x163/0x280 [ 2955.503132] __should_failslab+0x121/0x190 [ 2955.507425] should_failslab+0x9/0x14 [ 2955.511247] kmem_cache_alloc_node_trace+0x277/0x720 [ 2955.516374] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 2955.521162] bdi_alloc_node+0x64/0xe0 [ 2955.525175] blk_alloc_queue_node+0x1ae/0xb70 [ 2955.529690] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2955.534391] blk_mq_init_queue+0x4c/0xb0 [ 2955.538471] loop_add+0x2dd/0x8d0 [ 2955.541942] ? idr_find+0x47/0x60 [ 2955.545420] loop_control_ioctl+0x165/0x360 [ 2955.549872] ? loop_add+0x8d0/0x8d0 [ 2955.553521] ? __might_sleep+0x95/0x190 [ 2955.557509] ? loop_add+0x8d0/0x8d0 [ 2955.561156] do_vfs_ioctl+0xd6e/0x1390 [ 2955.565060] ? selinux_file_ioctl+0x46f/0x5e0 [ 2955.569623] ? selinux_file_ioctl+0x125/0x5e0 [ 2955.574144] ? ioctl_preallocate+0x210/0x210 [ 2955.578570] ? selinux_file_mprotect+0x620/0x620 [ 2955.583354] ? iterate_fd+0x360/0x360 [ 2955.587181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2955.592744] ? security_file_ioctl+0x93/0xc0 [ 2955.597172] ksys_ioctl+0xab/0xd0 [ 2955.600646] __x64_sys_ioctl+0x73/0xb0 [ 2955.604550] do_syscall_64+0x103/0x610 [ 2955.608472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2955.613714] RIP: 0033:0x458da9 [ 2955.616919] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2955.635840] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2955.643597] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2955.650882] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2955.658173] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2955.665458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2955.672747] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:05 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x84\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x800000000000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2956.180867] validate_nla: 46 callbacks suppressed [ 2956.180877] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2956.213135] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:06 executing program 0 (fault-call:12 fault-nth:19): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9104]}) 21:32:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:06 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x87\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x80ffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2956.255082] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2956.264298] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:06 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x81ffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e00]}) [ 2956.523825] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2956.539925] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2956.560770] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2956.568444] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2956.596737] FAULT_INJECTION: forcing a failure. [ 2956.596737] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2956.608604] CPU: 0 PID: 17661 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2956.615556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2956.625016] Call Trace: [ 2956.627638] dump_stack+0x172/0x1f0 [ 2956.631317] should_fail.cold+0xa/0x1b [ 2956.635253] ? bioset_init+0x547/0x710 [ 2956.639176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2956.645112] ? mark_held_locks+0x100/0x100 [ 2956.649352] __alloc_pages_nodemask+0x1ee/0x760 [ 2956.654021] ? mark_held_locks+0xb1/0x100 [ 2956.658167] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2956.662744] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2956.667765] cache_grow_begin+0x9c/0x8c0 [ 2956.671825] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2956.677361] ? check_preemption_disabled+0x48/0x290 [ 2956.682379] kmem_cache_alloc+0x63e/0x700 [ 2956.686533] mempool_alloc_slab+0x47/0x60 [ 2956.690676] ? mempool_alloc+0x380/0x380 [ 2956.694732] mempool_init_node+0x2e1/0x560 [ 2956.698984] ? mempool_alloc+0x380/0x380 [ 2956.703051] ? mempool_free+0x380/0x380 [ 2956.707030] mempool_init+0x3d/0x50 [ 2956.710657] bioset_init+0x547/0x710 [ 2956.714386] blk_alloc_queue_node+0x188/0xb70 [ 2956.718895] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2956.723666] blk_mq_init_queue+0x4c/0xb0 [ 2956.727728] loop_add+0x2dd/0x8d0 [ 2956.731177] ? idr_find+0x47/0x60 [ 2956.734639] loop_control_ioctl+0x165/0x360 [ 2956.738998] ? loop_add+0x8d0/0x8d0 [ 2956.742639] ? __might_sleep+0x95/0x190 [ 2956.753541] ? loop_add+0x8d0/0x8d0 [ 2956.757276] do_vfs_ioctl+0xd6e/0x1390 [ 2956.761176] ? selinux_file_ioctl+0x46f/0x5e0 [ 2956.765685] ? selinux_file_ioctl+0x125/0x5e0 [ 2956.770205] ? ioctl_preallocate+0x210/0x210 [ 2956.774619] ? selinux_file_mprotect+0x620/0x620 [ 2956.779387] ? iterate_fd+0x360/0x360 [ 2956.783187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2956.788720] ? fput+0x128/0x1a0 [ 2956.792001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2956.797634] ? security_file_ioctl+0x93/0xc0 [ 2956.802054] ksys_ioctl+0xab/0xd0 [ 2956.805533] __x64_sys_ioctl+0x73/0xb0 [ 2956.809508] do_syscall_64+0x103/0x610 [ 2956.813408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2956.818592] RIP: 0033:0x458da9 [ 2956.821797] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2956.840699] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2956.848406] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2956.855670] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2956.862946] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.870230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2956.881167] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:06 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2957.101127] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:07 executing program 0 (fault-call:12 fault-nth:20): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2957.162632] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x92ffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa001]}) 21:32:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x93ffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2957.441398] FAULT_INJECTION: forcing a failure. [ 2957.441398] name failslab, interval 1, probability 0, space 0, times 0 [ 2957.469891] CPU: 1 PID: 17821 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2957.476880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2957.486256] Call Trace: 21:32:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2957.488878] dump_stack+0x172/0x1f0 [ 2957.492543] should_fail.cold+0xa/0x1b [ 2957.496464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2957.501598] ? lock_downgrade+0x810/0x810 [ 2957.505811] ? ___might_sleep+0x163/0x280 [ 2957.509960] __should_failslab+0x121/0x190 [ 2957.514190] should_failslab+0x9/0x14 [ 2957.517998] kmem_cache_alloc_trace+0x2cf/0x760 [ 2957.522789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2957.528336] blk_alloc_queue_stats+0x40/0x100 [ 2957.532831] blk_alloc_queue_node+0x1ea/0xb70 [ 2957.537331] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2957.542007] blk_mq_init_queue+0x4c/0xb0 [ 2957.546065] loop_add+0x2dd/0x8d0 [ 2957.549513] ? idr_find+0x47/0x60 [ 2957.552992] loop_control_ioctl+0x165/0x360 [ 2957.557315] ? loop_add+0x8d0/0x8d0 [ 2957.560936] ? __might_sleep+0x95/0x190 [ 2957.564905] ? loop_add+0x8d0/0x8d0 [ 2957.568526] do_vfs_ioctl+0xd6e/0x1390 [ 2957.572403] ? selinux_file_ioctl+0x46f/0x5e0 [ 2957.576903] ? selinux_file_ioctl+0x125/0x5e0 [ 2957.581400] ? ioctl_preallocate+0x210/0x210 [ 2957.585806] ? selinux_file_mprotect+0x620/0x620 [ 2957.590563] ? iterate_fd+0x360/0x360 [ 2957.594371] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2957.599124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2957.604657] ? security_file_ioctl+0x93/0xc0 [ 2957.609077] ksys_ioctl+0xab/0xd0 [ 2957.612540] __x64_sys_ioctl+0x73/0xb0 [ 2957.616432] ? do_syscall_64+0x5b/0x610 [ 2957.620395] do_syscall_64+0x103/0x610 [ 2957.624286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2957.629467] RIP: 0033:0x458da9 [ 2957.632664] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2957.651576] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2957.659289] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2957.666559] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2957.673842] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2957.681104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2957.688364] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:07 executing program 0 (fault-call:12 fault-nth:21): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x94ffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00d]}) 21:32:07 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xfdffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:08 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000]}) [ 2958.273900] FAULT_INJECTION: forcing a failure. [ 2958.273900] name failslab, interval 1, probability 0, space 0, times 0 [ 2958.289350] CPU: 1 PID: 17970 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2958.296310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2958.305674] Call Trace: [ 2958.308283] dump_stack+0x172/0x1f0 [ 2958.311952] should_fail.cold+0xa/0x1b [ 2958.315876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2958.320994] ? lock_downgrade+0x810/0x810 [ 2958.325167] ? ___might_sleep+0x163/0x280 [ 2958.329339] __should_failslab+0x121/0x190 [ 2958.333595] should_failslab+0x9/0x14 [ 2958.337421] kmem_cache_alloc_node_trace+0x277/0x720 [ 2958.342546] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 2958.348134] blkg_alloc+0x93/0x640 [ 2958.351705] blkcg_init_queue+0x27/0x550 [ 2958.355777] blk_alloc_queue_node+0x788/0xb70 [ 2958.360282] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2958.365063] blk_mq_init_queue+0x4c/0xb0 [ 2958.369138] loop_add+0x2dd/0x8d0 [ 2958.372609] ? idr_find+0x47/0x60 [ 2958.376084] loop_control_ioctl+0x165/0x360 [ 2958.380413] ? loop_add+0x8d0/0x8d0 [ 2958.384043] ? __might_sleep+0x95/0x190 [ 2958.388026] ? loop_add+0x8d0/0x8d0 [ 2958.391647] do_vfs_ioctl+0xd6e/0x1390 [ 2958.395541] ? selinux_file_ioctl+0x46f/0x5e0 [ 2958.400047] ? selinux_file_ioctl+0x125/0x5e0 [ 2958.404569] ? ioctl_preallocate+0x210/0x210 [ 2958.408996] ? selinux_file_mprotect+0x620/0x620 [ 2958.413767] ? iterate_fd+0x360/0x360 [ 2958.417582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2958.423123] ? fput+0x128/0x1a0 [ 2958.426428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2958.431977] ? security_file_ioctl+0x93/0xc0 [ 2958.436384] ksys_ioctl+0xab/0xd0 [ 2958.439834] __x64_sys_ioctl+0x73/0xb0 [ 2958.443731] do_syscall_64+0x103/0x610 [ 2958.447642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2958.452847] RIP: 0033:0x458da9 [ 2958.456043] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2958.475053] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2958.482780] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2958.490058] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2958.497319] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2958.504588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2958.511858] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:08 executing program 0 (fault-call:12 fault-nth:22): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xfeffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:08 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100]}) 21:32:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0xffffffff00000000, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2958.974377] FAULT_INJECTION: forcing a failure. [ 2958.974377] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.014726] CPU: 0 PID: 18098 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2959.021888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.031255] Call Trace: [ 2959.033847] dump_stack+0x172/0x1f0 [ 2959.037478] should_fail.cold+0xa/0x1b [ 2959.041389] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2959.046517] ? lock_downgrade+0x810/0x810 [ 2959.050668] ? ___might_sleep+0x163/0x280 [ 2959.055257] __should_failslab+0x121/0x190 [ 2959.059494] should_failslab+0x9/0x14 [ 2959.063290] kmem_cache_alloc_trace+0x2cf/0x760 [ 2959.067962] ? lock_downgrade+0x810/0x810 [ 2959.072104] blk_iolatency_init+0x4e/0x2d0 [ 2959.076348] blkcg_init_queue+0x1c7/0x550 [ 2959.080523] blk_alloc_queue_node+0x788/0xb70 [ 2959.085123] blk_mq_init_queue+0x4c/0xb0 [ 2959.089183] loop_add+0x2dd/0x8d0 [ 2959.092640] ? idr_find+0x47/0x60 [ 2959.096092] loop_control_ioctl+0x165/0x360 [ 2959.100408] ? loop_add+0x8d0/0x8d0 [ 2959.104028] ? __might_sleep+0x95/0x190 [ 2959.107998] ? loop_add+0x8d0/0x8d0 [ 2959.111623] do_vfs_ioctl+0xd6e/0x1390 [ 2959.115514] ? selinux_file_ioctl+0x46f/0x5e0 [ 2959.120012] ? selinux_file_ioctl+0x125/0x5e0 [ 2959.124518] ? ioctl_preallocate+0x210/0x210 [ 2959.128926] ? selinux_file_mprotect+0x620/0x620 [ 2959.133685] ? iterate_fd+0x360/0x360 [ 2959.137500] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2959.142287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2959.147840] ? security_file_ioctl+0x93/0xc0 [ 2959.152259] ksys_ioctl+0xab/0xd0 [ 2959.155750] __x64_sys_ioctl+0x73/0xb0 [ 2959.159647] ? do_syscall_64+0x5b/0x610 [ 2959.163615] do_syscall_64+0x103/0x610 [ 2959.167497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2959.172677] RIP: 0033:0x458da9 [ 2959.175885] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2959.194855] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2959.205761] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2959.216747] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2959.225408] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2959.232768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2959.240392] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:09 executing program 0 (fault-call:12 fault-nth:23): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:09 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x2, @tick, {}, {}, @connect}], 0x30) 21:32:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc200]}) 21:32:09 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x3, @tick, {}, {}, @connect}], 0x30) 21:32:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2959.691349] FAULT_INJECTION: forcing a failure. [ 2959.691349] name failslab, interval 1, probability 0, space 0, times 0 [ 2959.710770] CPU: 1 PID: 18234 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2959.717742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2959.727095] Call Trace: [ 2959.729938] dump_stack+0x172/0x1f0 [ 2959.733592] should_fail.cold+0xa/0x1b [ 2959.737503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2959.742884] ? lock_downgrade+0x810/0x810 [ 2959.747036] ? ___might_sleep+0x163/0x280 [ 2959.751278] __should_failslab+0x121/0x190 [ 2959.755861] should_failslab+0x9/0x14 [ 2959.759658] kmem_cache_alloc_node_trace+0x277/0x720 [ 2959.764764] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2959.769349] ? trace_hardirqs_on+0x67/0x230 [ 2959.774810] iolatency_pd_alloc+0x72/0x130 [ 2959.780114] ? blk_queue_bypass_start+0x193/0x2c0 [ 2959.784974] ? blkcg_iolatency_throttle+0x1be0/0x1be0 [ 2959.790193] blkcg_activate_policy+0x11f/0x5c0 [ 2959.794786] blk_iolatency_init+0x135/0x2d0 [ 2959.799116] blkcg_init_queue+0x1c7/0x550 [ 2959.803352] blk_alloc_queue_node+0x788/0xb70 [ 2959.807850] blk_mq_init_queue+0x4c/0xb0 [ 2959.811914] loop_add+0x2dd/0x8d0 [ 2959.815364] ? idr_find+0x47/0x60 [ 2959.818822] loop_control_ioctl+0x165/0x360 [ 2959.823145] ? loop_add+0x8d0/0x8d0 [ 2959.826846] ? __might_sleep+0x95/0x190 [ 2959.830849] ? retint_kernel+0x2d/0x2d [ 2959.834837] ? loop_add+0x8d0/0x8d0 [ 2959.838465] do_vfs_ioctl+0xd6e/0x1390 [ 2959.842351] ? selinux_file_ioctl+0x46f/0x5e0 [ 2959.846849] ? selinux_file_ioctl+0x125/0x5e0 [ 2959.851346] ? ioctl_preallocate+0x210/0x210 [ 2959.855749] ? selinux_file_mprotect+0x620/0x620 [ 2959.860510] ? iterate_fd+0x360/0x360 [ 2959.864308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2959.869838] ? fput+0x128/0x1a0 [ 2959.873116] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2959.878653] ? security_file_ioctl+0x93/0xc0 [ 2959.883094] ksys_ioctl+0xab/0xd0 [ 2959.886587] __x64_sys_ioctl+0x73/0xb0 [ 2959.890515] do_syscall_64+0x103/0x610 [ 2959.894441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2959.899657] RIP: 0033:0x458da9 [ 2959.902889] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2959.921789] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2959.929501] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2959.936770] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2959.944054] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2959.951334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2959.958610] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:10 executing program 0 (fault-call:12 fault-nth:24): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x4, @tick, {}, {}, @connect}], 0x30) 21:32:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:10 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00]}) 21:32:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x5, @tick, {}, {}, @connect}], 0x30) 21:32:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2960.427861] FAULT_INJECTION: forcing a failure. [ 2960.427861] name failslab, interval 1, probability 0, space 0, times 0 [ 2960.461855] CPU: 1 PID: 18467 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2960.468844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2960.478312] Call Trace: [ 2960.481033] dump_stack+0x172/0x1f0 [ 2960.484709] should_fail.cold+0xa/0x1b [ 2960.488647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2960.493789] ? retint_kernel+0x2d/0x2d [ 2960.497715] __should_failslab+0x121/0x190 [ 2960.502101] should_failslab+0x9/0x14 [ 2960.505922] kmem_cache_alloc_node_trace+0x277/0x720 [ 2960.511071] ? lockdep_init_map+0x9/0x10 [ 2960.515153] ? init_timer_key+0x122/0x370 [ 2960.519317] blk_throtl_init+0x7d/0x640 [ 2960.523318] blkcg_init_queue+0x1e9/0x550 [ 2960.527483] blk_alloc_queue_node+0x788/0xb70 [ 2960.532337] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2960.537029] blk_mq_init_queue+0x4c/0xb0 [ 2960.541108] loop_add+0x2dd/0x8d0 [ 2960.544577] ? idr_find+0x47/0x60 [ 2960.548044] loop_control_ioctl+0x165/0x360 [ 2960.552385] ? loop_add+0x8d0/0x8d0 [ 2960.556033] ? loop_add+0x8d0/0x8d0 [ 2960.559677] do_vfs_ioctl+0xd6e/0x1390 [ 2960.563593] ? selinux_file_ioctl+0x46f/0x5e0 [ 2960.568096] ? selinux_file_ioctl+0x125/0x5e0 [ 2960.572779] ? ioctl_preallocate+0x210/0x210 [ 2960.577204] ? selinux_file_mprotect+0x620/0x620 [ 2960.581982] ? iterate_fd+0x360/0x360 [ 2960.585797] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2960.591350] ? fput+0x128/0x1a0 [ 2960.594650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2960.600203] ? security_file_ioctl+0x93/0xc0 [ 2960.604634] ksys_ioctl+0xab/0xd0 [ 2960.608107] __x64_sys_ioctl+0x73/0xb0 [ 2960.612007] do_syscall_64+0x103/0x610 [ 2960.616005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2960.621206] RIP: 0033:0x458da9 [ 2960.624424] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2960.643337] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2960.651065] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2960.658352] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2960.665632] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2960.672910] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2960.680194] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:10 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:10 executing program 0 (fault-call:12 fault-nth:25): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd004]}) 21:32:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x8, @tick, {}, {}, @connect}], 0x30) 21:32:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd901]}) 21:32:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x300, @tick, {}, {}, @connect}], 0x30) 21:32:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2961.315390] FAULT_INJECTION: forcing a failure. [ 2961.315390] name failslab, interval 1, probability 0, space 0, times 0 [ 2961.352972] CPU: 0 PID: 18567 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2961.359949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2961.369312] Call Trace: [ 2961.371927] dump_stack+0x172/0x1f0 [ 2961.375590] should_fail.cold+0xa/0x1b [ 2961.379506] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2961.384645] ? lock_downgrade+0x810/0x810 [ 2961.388821] ? ___might_sleep+0x163/0x280 [ 2961.393095] __should_failslab+0x121/0x190 [ 2961.397357] should_failslab+0x9/0x14 [ 2961.401184] kmem_cache_alloc_node_trace+0x277/0x720 [ 2961.406329] ? blk_throtl_dispatch_work_fn+0x320/0x320 [ 2961.411642] throtl_pd_alloc+0x6e/0x940 [ 2961.415650] ? blk_throtl_dispatch_work_fn+0x320/0x320 [ 2961.420954] blkcg_activate_policy+0x11f/0x5c0 [ 2961.425566] blk_throtl_init+0x430/0x640 [ 2961.429661] ? blk_iolatency_init+0x1ce/0x2d0 [ 2961.434184] blkcg_init_queue+0x1e9/0x550 [ 2961.438354] blk_alloc_queue_node+0x788/0xb70 [ 2961.442868] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2961.447738] blk_mq_init_queue+0x4c/0xb0 [ 2961.451791] loop_add+0x2dd/0x8d0 [ 2961.455335] loop_control_ioctl+0x165/0x360 [ 2961.459646] ? loop_add+0x8d0/0x8d0 [ 2961.463279] ? do_vfs_ioctl+0xca/0x1390 [ 2961.467255] ? loop_add+0x8d0/0x8d0 [ 2961.470880] do_vfs_ioctl+0xd6e/0x1390 [ 2961.474766] ? selinux_file_ioctl+0x46f/0x5e0 [ 2961.479254] ? selinux_file_ioctl+0x125/0x5e0 [ 2961.483743] ? ioctl_preallocate+0x210/0x210 [ 2961.488150] ? selinux_file_mprotect+0x620/0x620 [ 2961.492905] ? iterate_fd+0x360/0x360 [ 2961.496717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2961.502266] ? security_file_ioctl+0x93/0xc0 [ 2961.506672] ksys_ioctl+0xab/0xd0 [ 2961.510124] __x64_sys_ioctl+0x73/0xb0 [ 2961.514007] do_syscall_64+0x103/0x610 [ 2961.517891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2961.523069] RIP: 0033:0x458da9 [ 2961.526251] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2961.545233] RSP: 002b:00007fcd0ebf7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2961.552937] RAX: ffffffffffffffda RBX: 00007fcd0ebf7c90 RCX: 0000000000458da9 21:32:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2961.560194] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2961.567452] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2961.574710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebf86d4 [ 2961.581972] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2961.642147] validate_nla: 46 callbacks suppressed [ 2961.642157] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x500, @tick, {}, {}, @connect}], 0x30) 21:32:11 executing program 0 (fault-call:12 fault-nth:26): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2961.707431] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2961.781158] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe006]}) [ 2961.831046] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x1000000, @tick, {}, {}, @connect}], 0x30) 21:32:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:11 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2962.015750] FAULT_INJECTION: forcing a failure. [ 2962.015750] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.045799] CPU: 1 PID: 18816 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2962.052785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.052793] Call Trace: [ 2962.052825] dump_stack+0x172/0x1f0 [ 2962.052852] should_fail.cold+0xa/0x1b [ 2962.052880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2962.064879] ? lock_downgrade+0x810/0x810 [ 2962.064902] ? ___might_sleep+0x163/0x280 [ 2962.085852] __should_failslab+0x121/0x190 [ 2962.090139] should_failslab+0x9/0x14 [ 2962.093958] kmem_cache_alloc_node_trace+0x277/0x720 [ 2962.093986] ? blk_throtl_dispatch_work_fn+0x320/0x320 [ 2962.094006] throtl_pd_alloc+0x6e/0x940 [ 2962.094022] ? blk_throtl_dispatch_work_fn+0x320/0x320 21:32:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2962.094041] blkcg_activate_policy+0x11f/0x5c0 [ 2962.094062] ? lockdep_init_map+0x9/0x10 [ 2962.094078] ? throtl_pd_offline+0x210/0x210 [ 2962.094095] blk_throtl_init+0x430/0x640 [ 2962.094116] blkcg_init_queue+0x1e9/0x550 [ 2962.104520] blk_alloc_queue_node+0x788/0xb70 [ 2962.104536] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2962.104556] blk_mq_init_queue+0x4c/0xb0 [ 2962.104572] loop_add+0x2dd/0x8d0 [ 2962.104586] ? idr_find+0x47/0x60 [ 2962.104604] loop_control_ioctl+0x165/0x360 [ 2962.104618] ? loop_add+0x8d0/0x8d0 [ 2962.104635] ? __might_sleep+0x95/0x190 [ 2962.104650] ? loop_add+0x8d0/0x8d0 [ 2962.104671] do_vfs_ioctl+0xd6e/0x1390 [ 2962.104686] ? selinux_file_ioctl+0x46f/0x5e0 [ 2962.104705] ? selinux_file_ioctl+0x125/0x5e0 [ 2962.184601] ? ioctl_preallocate+0x210/0x210 [ 2962.189038] ? selinux_file_mprotect+0x620/0x620 [ 2962.193852] ? iterate_fd+0x360/0x360 [ 2962.197689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2962.202461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2962.207994] ? security_file_ioctl+0x93/0xc0 [ 2962.212403] ksys_ioctl+0xab/0xd0 [ 2962.215859] __x64_sys_ioctl+0x73/0xb0 [ 2962.219855] ? do_syscall_64+0x5b/0x610 [ 2962.223854] do_syscall_64+0x103/0x610 [ 2962.228085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2962.233365] RIP: 0033:0x458da9 [ 2962.236560] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.255456] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:32:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff02]}) [ 2962.263157] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2962.270644] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2962.277905] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2962.285165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2962.292723] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:12 executing program 0 (fault-call:12 fault-nth:27): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2962.441894] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2962.466046] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x2000000, @tick, {}, {}, @connect}], 0x30) [ 2962.528242] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:12 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2962.577345] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0b]}) 21:32:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:12 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00!\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x3000000, @tick, {}, {}, @connect}], 0x30) [ 2962.777009] FAULT_INJECTION: forcing a failure. [ 2962.777009] name failslab, interval 1, probability 0, space 0, times 0 [ 2962.805745] CPU: 1 PID: 18975 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2962.812719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2962.812726] Call Trace: [ 2962.812751] dump_stack+0x172/0x1f0 [ 2962.812777] should_fail.cold+0xa/0x1b [ 2962.812813] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2962.812839] ? lock_downgrade+0x810/0x810 [ 2962.812860] ? ___might_sleep+0x163/0x280 [ 2962.812880] ? plug_ctx_cmp+0x110/0x110 [ 2962.812901] __should_failslab+0x121/0x190 [ 2962.812920] should_failslab+0x9/0x14 [ 2962.812938] kmem_cache_alloc_trace+0x2cf/0x760 [ 2962.812959] ? retint_kernel+0x2d/0x2d [ 2962.812980] ? plug_ctx_cmp+0x110/0x110 [ 2962.812999] blk_stat_alloc_callback+0x58/0x270 [ 2962.813015] ? blk_mq_can_queue+0x50/0x50 [ 2962.813040] blk_mq_init_allocated_queue+0x8b/0x1380 [ 2962.832515] ? blkcg_init_queue+0x203/0x550 [ 2962.832538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2962.832552] ? blk_alloc_queue_node+0x79c/0xb70 [ 2962.832574] blk_mq_init_queue+0x64/0xb0 [ 2962.832590] loop_add+0x2dd/0x8d0 [ 2962.832603] ? idr_find+0x47/0x60 [ 2962.832620] loop_control_ioctl+0x165/0x360 [ 2962.832637] ? loop_add+0x8d0/0x8d0 [ 2962.862712] ? do_vfs_ioctl+0xca/0x1390 [ 2962.862733] ? write_comp_data+0x17/0x70 [ 2962.862748] ? loop_add+0x8d0/0x8d0 [ 2962.862767] do_vfs_ioctl+0xd6e/0x1390 [ 2962.862792] ? selinux_file_ioctl+0x46f/0x5e0 [ 2962.862812] ? selinux_file_ioctl+0x125/0x5e0 [ 2962.862832] ? ioctl_preallocate+0x210/0x210 [ 2962.862846] ? selinux_file_mprotect+0x620/0x620 [ 2962.862870] ? iterate_fd+0x360/0x360 [ 2962.862888] ? check_memory_region+0x112/0x190 [ 2962.862912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2962.862929] ? security_file_ioctl+0x93/0xc0 [ 2962.862950] ksys_ioctl+0xab/0xd0 [ 2962.875974] __x64_sys_ioctl+0x73/0xb0 [ 2962.875996] do_syscall_64+0x103/0x610 [ 2962.876018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2962.904546] RIP: 0033:0x458da9 [ 2962.904562] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2962.904571] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2962.904587] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2962.904597] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2962.904607] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2962.904615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2962.904624] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10040]}) 21:32:13 executing program 0 (fault-call:12 fault-nth:28): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2963.095043] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2963.110413] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:13 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x4000000, @tick, {}, {}, @connect}], 0x30) 21:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x5000000, @tick, {}, {}, @connect}], 0x30) 21:32:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100c0]}) 21:32:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2963.444401] FAULT_INJECTION: forcing a failure. [ 2963.444401] name failslab, interval 1, probability 0, space 0, times 0 [ 2963.476063] CPU: 1 PID: 19113 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2963.483043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:32:13 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2963.492410] Call Trace: [ 2963.495029] dump_stack+0x172/0x1f0 [ 2963.498690] should_fail.cold+0xa/0x1b [ 2963.502609] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2963.507740] ? lock_downgrade+0x810/0x810 [ 2963.511916] ? ___might_sleep+0x163/0x280 [ 2963.516178] __should_failslab+0x121/0x190 [ 2963.520421] should_failslab+0x9/0x14 [ 2963.524225] __kmalloc+0x2e5/0x750 [ 2963.527779] ? kmem_cache_alloc_trace+0x34b/0x760 [ 2963.532632] ? blkcg_activate_policy+0x407/0x5c0 [ 2963.537399] ? blk_stat_alloc_callback+0x84/0x270 [ 2963.542239] ? plug_ctx_cmp+0x110/0x110 [ 2963.546231] blk_stat_alloc_callback+0x84/0x270 [ 2963.550943] ? blk_mq_can_queue+0x50/0x50 [ 2963.555102] blk_mq_init_allocated_queue+0x8b/0x1380 [ 2963.560210] ? blkcg_init_queue+0x203/0x550 [ 2963.564543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2963.570088] ? blk_alloc_queue_node+0x79c/0xb70 [ 2963.574762] ? blk_mq_alloc_tag_set+0x4a8/0x960 [ 2963.579440] blk_mq_init_queue+0x64/0xb0 [ 2963.583508] loop_add+0x2dd/0x8d0 [ 2963.586984] ? idr_find+0x47/0x60 [ 2963.590437] loop_control_ioctl+0x165/0x360 [ 2963.594768] ? loop_add+0x8d0/0x8d0 [ 2963.598405] ? __might_sleep+0x95/0x190 [ 2963.602369] ? loop_add+0x8d0/0x8d0 [ 2963.606019] do_vfs_ioctl+0xd6e/0x1390 [ 2963.609908] ? selinux_file_ioctl+0x46f/0x5e0 [ 2963.614406] ? selinux_file_ioctl+0x125/0x5e0 [ 2963.618914] ? ioctl_preallocate+0x210/0x210 [ 2963.623335] ? selinux_file_mprotect+0x620/0x620 [ 2963.628106] ? iterate_fd+0x360/0x360 [ 2963.631923] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2963.637476] ? fput+0x128/0x1a0 [ 2963.640758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2963.646298] ? security_file_ioctl+0x93/0xc0 [ 2963.650713] ksys_ioctl+0xab/0xd0 [ 2963.654278] __x64_sys_ioctl+0x73/0xb0 [ 2963.658173] do_syscall_64+0x103/0x610 [ 2963.662059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2963.667242] RIP: 0033:0x458da9 [ 2963.670430] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2963.689329] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2963.697300] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2963.704574] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2963.711850] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2963.719111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2963.726374] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:13 executing program 0 (fault-call:12 fault-nth:29): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}) 21:32:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x8000000, @tick, {}, {}, @connect}], 0x30) 21:32:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2964.155895] FAULT_INJECTION: forcing a failure. [ 2964.155895] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.206423] CPU: 1 PID: 19192 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2964.213408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.222772] Call Trace: [ 2964.225568] dump_stack+0x172/0x1f0 [ 2964.229236] should_fail.cold+0xa/0x1b [ 2964.233170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2964.238299] ? ___might_sleep+0x163/0x280 [ 2964.242467] __should_failslab+0x121/0x190 [ 2964.246713] should_failslab+0x9/0x14 [ 2964.250524] kmem_cache_alloc_node_trace+0x277/0x720 [ 2964.255641] ? find_next_bit+0x107/0x130 [ 2964.259721] __kmalloc_node+0x3d/0x80 [ 2964.263537] blk_mq_init_allocated_queue+0x186/0x1380 [ 2964.268738] ? blk_mq_init_allocated_queue+0x11/0x1380 [ 2964.274031] blk_mq_init_queue+0x64/0xb0 [ 2964.278096] loop_add+0x2dd/0x8d0 [ 2964.281555] ? idr_find+0x47/0x60 [ 2964.285021] loop_control_ioctl+0x165/0x360 [ 2964.289348] ? loop_add+0x8d0/0x8d0 [ 2964.293017] ? __might_sleep+0x95/0x190 [ 2964.297004] ? loop_add+0x8d0/0x8d0 [ 2964.300645] do_vfs_ioctl+0xd6e/0x1390 [ 2964.304546] ? selinux_file_ioctl+0x46f/0x5e0 [ 2964.309056] ? selinux_file_ioctl+0x125/0x5e0 [ 2964.313573] ? ioctl_preallocate+0x210/0x210 [ 2964.317991] ? selinux_file_mprotect+0x620/0x620 [ 2964.322769] ? iterate_fd+0x360/0x360 [ 2964.326588] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2964.332135] ? fput+0x128/0x1a0 [ 2964.335452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2964.341000] ? security_file_ioctl+0x93/0xc0 [ 2964.345436] ksys_ioctl+0xab/0xd0 [ 2964.348906] __x64_sys_ioctl+0x73/0xb0 [ 2964.352818] do_syscall_64+0x103/0x610 [ 2964.356728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2964.361923] RIP: 0033:0x458da9 [ 2964.365130] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2964.384563] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2964.392295] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2964.399576] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 21:32:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2964.406857] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2964.414137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2964.421431] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}) 21:32:14 executing program 0 (fault-call:12 fault-nth:30): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x80ffffff, @tick, {}, {}, @connect}], 0x30) 21:32:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x81ffffff, @tick, {}, {}, @connect}], 0x30) 21:32:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000]}) 21:32:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:14 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00-\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2964.934936] FAULT_INJECTION: forcing a failure. [ 2964.934936] name failslab, interval 1, probability 0, space 0, times 0 [ 2964.946660] CPU: 1 PID: 19386 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2964.953612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2964.963159] Call Trace: [ 2964.965874] dump_stack+0x172/0x1f0 [ 2964.969511] should_fail.cold+0xa/0x1b [ 2964.973409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2964.978607] ? lock_downgrade+0x810/0x810 [ 2964.982765] ? ___might_sleep+0x163/0x280 [ 2964.986938] __should_failslab+0x121/0x190 [ 2964.991218] should_failslab+0x9/0x14 [ 2964.995032] kmem_cache_alloc_node_trace+0x277/0x720 [ 2965.000150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2965.005708] ? find_next_bit+0x107/0x130 [ 2965.009795] __kmalloc_node+0x3d/0x80 [ 2965.013615] blk_mq_realloc_hw_ctxs+0x1e0/0x1010 [ 2965.018392] blk_mq_init_allocated_queue+0x21d/0x1380 [ 2965.023588] ? blkcg_init_queue+0x203/0x550 [ 2965.027930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2965.033479] blk_mq_init_queue+0x64/0xb0 [ 2965.037552] loop_add+0x2dd/0x8d0 [ 2965.040999] loop_control_ioctl+0x165/0x360 [ 2965.045321] ? loop_add+0x8d0/0x8d0 [ 2965.048956] ? do_vfs_ioctl+0xca/0x1390 [ 2965.052940] ? write_comp_data+0x1e/0x70 [ 2965.057234] ? loop_add+0x8d0/0x8d0 [ 2965.060902] do_vfs_ioctl+0xd6e/0x1390 [ 2965.064792] ? selinux_file_ioctl+0x46f/0x5e0 [ 2965.069296] ? selinux_file_ioctl+0x125/0x5e0 [ 2965.073810] ? ioctl_preallocate+0x210/0x210 [ 2965.078223] ? selinux_file_mprotect+0x620/0x620 [ 2965.083009] ? iterate_fd+0x360/0x360 [ 2965.086939] ? __fget_light+0x55/0x230 [ 2965.090972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2965.096517] ? security_file_ioctl+0x93/0xc0 [ 2965.101025] ksys_ioctl+0xab/0xd0 [ 2965.104513] __x64_sys_ioctl+0x73/0xb0 [ 2965.108407] do_syscall_64+0x103/0x610 [ 2965.112305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2965.117503] RIP: 0033:0x458da9 [ 2965.120696] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2965.139700] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2965.147408] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2965.154682] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2965.162042] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.169327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2965.176694] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:15 executing program 0 (fault-call:12 fault-nth:31): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x92ffffff, @tick, {}, {}, @connect}], 0x30) 21:32:15 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d564b]}) 21:32:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2965.625345] FAULT_INJECTION: forcing a failure. [ 2965.625345] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.650478] CPU: 1 PID: 19513 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2965.657468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2965.666847] Call Trace: [ 2965.669467] dump_stack+0x172/0x1f0 [ 2965.673114] should_fail.cold+0xa/0x1b [ 2965.677021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2965.682137] ? __should_failslab+0x67/0x190 [ 2965.686486] __should_failslab+0x121/0x190 [ 2965.690735] should_failslab+0x9/0x14 [ 2965.694544] kmem_cache_alloc_node_trace+0x277/0x720 [ 2965.699654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2965.705204] ? find_next_bit+0x107/0x130 [ 2965.709284] __kmalloc_node+0x3d/0x80 [ 2965.713102] blk_mq_realloc_hw_ctxs+0x1e0/0x1010 [ 2965.717868] ? kasan_kmalloc+0xce/0xf0 [ 2965.721814] blk_mq_init_allocated_queue+0x21d/0x1380 [ 2965.727025] ? blkcg_init_queue+0x203/0x550 [ 2965.731882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2965.737437] blk_mq_init_queue+0x64/0xb0 [ 2965.741510] loop_add+0x2dd/0x8d0 [ 2965.744973] ? idr_find+0x47/0x60 [ 2965.748533] loop_control_ioctl+0x165/0x360 [ 2965.752871] ? loop_add+0x8d0/0x8d0 [ 2965.756528] ? do_vfs_ioctl+0xca/0x1390 [ 2965.760516] ? __sanitizer_cov_trace_switch+0x3c/0x80 [ 2965.765718] ? loop_add+0x8d0/0x8d0 [ 2965.769360] do_vfs_ioctl+0xd6e/0x1390 [ 2965.773344] ? selinux_file_ioctl+0x46f/0x5e0 [ 2965.778826] ? selinux_file_ioctl+0x125/0x5e0 [ 2965.783332] ? ioctl_preallocate+0x210/0x210 [ 2965.787751] ? selinux_file_mprotect+0x620/0x620 [ 2965.792525] ? iterate_fd+0x360/0x360 [ 2965.796345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2965.801893] ? fput+0x128/0x1a0 [ 2965.805190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2965.810738] ? security_file_ioctl+0x93/0xc0 [ 2965.815158] ksys_ioctl+0xab/0xd0 [ 2965.818642] __x64_sys_ioctl+0x73/0xb0 [ 2965.822539] do_syscall_64+0x103/0x610 [ 2965.826456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2965.831655] RIP: 0033:0x458da9 [ 2965.834857] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2965.853767] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2965.861501] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2965.868784] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2965.876070] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.883364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2965.890881] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x004\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:16 executing program 0 (fault-call:12 fault-nth:32): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x93ffffff, @tick, {}, {}, @connect}], 0x30) 21:32:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}) 21:32:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x005\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x94ffffff, @tick, {}, {}, @connect}], 0x30) 21:32:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2966.331133] FAULT_INJECTION: forcing a failure. [ 2966.331133] name failslab, interval 1, probability 0, space 0, times 0 [ 2966.356042] CPU: 1 PID: 19644 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2966.363013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2966.372489] Call Trace: [ 2966.375103] dump_stack+0x172/0x1f0 [ 2966.378760] should_fail.cold+0xa/0x1b [ 2966.382685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2966.387923] ? lock_downgrade+0x810/0x810 [ 2966.392105] ? ___might_sleep+0x163/0x280 [ 2966.396290] __should_failslab+0x121/0x190 [ 2966.400554] should_failslab+0x9/0x14 [ 2966.404370] kmem_cache_alloc_node_trace+0x277/0x720 [ 2966.409495] ? lock_downgrade+0x810/0x810 [ 2966.413672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2966.419242] ? check_preemption_disabled+0x48/0x290 [ 2966.424312] __kmalloc_node+0x3d/0x80 [ 2966.428135] blk_mq_realloc_hw_ctxs+0x593/0x1010 [ 2966.432922] blk_mq_init_allocated_queue+0x21d/0x1380 [ 2966.438228] ? blkcg_init_queue+0x203/0x550 [ 2966.442581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2966.448149] blk_mq_init_queue+0x64/0xb0 [ 2966.452315] loop_add+0x2dd/0x8d0 [ 2966.455784] ? idr_find+0x47/0x60 [ 2966.459264] loop_control_ioctl+0x165/0x360 [ 2966.463596] ? loop_add+0x8d0/0x8d0 [ 2966.467236] ? do_vfs_ioctl+0xca/0x1390 [ 2966.471216] ? loop_add+0x8d0/0x8d0 [ 2966.474859] do_vfs_ioctl+0xd6e/0x1390 [ 2966.478752] ? selinux_file_ioctl+0x46f/0x5e0 [ 2966.483258] ? selinux_file_ioctl+0x125/0x5e0 [ 2966.487763] ? ioctl_preallocate+0x210/0x210 [ 2966.492177] ? selinux_file_mprotect+0x620/0x620 [ 2966.496951] ? iterate_fd+0x360/0x360 [ 2966.500790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2966.506352] ? fput+0x128/0x1a0 [ 2966.509646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2966.515193] ? security_file_ioctl+0x93/0xc0 [ 2966.519612] ksys_ioctl+0xab/0xd0 [ 2966.523081] __x64_sys_ioctl+0x73/0xb0 [ 2966.526977] do_syscall_64+0x103/0x610 [ 2966.530876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2966.536075] RIP: 0033:0x458da9 [ 2966.539399] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2966.558303] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2966.566022] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2966.573296] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2966.580566] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2966.587840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2966.595112] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xfdffffff, @tick, {}, {}, @connect}], 0x30) 21:32:16 executing program 0 (fault-call:12 fault-nth:33): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:16 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00<\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) [ 2966.857177] validate_nla: 36 callbacks suppressed [ 2966.857187] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2966.873933] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2966.895265] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xfeffffff, @tick, {}, {}, @connect}], 0x30) 21:32:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2966.921234] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2967.047427] FAULT_INJECTION: forcing a failure. [ 2967.047427] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.068644] CPU: 0 PID: 19775 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2967.075619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.075627] Call Trace: [ 2967.075651] dump_stack+0x172/0x1f0 [ 2967.075677] should_fail.cold+0xa/0x1b [ 2967.087649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2967.087670] ? lock_downgrade+0x810/0x810 [ 2967.087687] ? ___might_sleep+0x163/0x280 [ 2967.087709] __should_failslab+0x121/0x190 [ 2967.112840] should_failslab+0x9/0x14 [ 2967.116655] kmem_cache_alloc_node_trace+0x277/0x720 [ 2967.121764] ? __kmalloc_node+0x3d/0x80 [ 2967.125750] ? rcu_read_lock_sched_held+0x110/0x130 [ 2967.130787] __kmalloc_node+0x3d/0x80 [ 2967.134598] sbitmap_init_node+0x294/0x470 [ 2967.138853] blk_mq_realloc_hw_ctxs+0x606/0x1010 [ 2967.143647] blk_mq_init_allocated_queue+0x21d/0x1380 [ 2967.148859] blk_mq_init_queue+0x64/0xb0 [ 2967.152930] loop_add+0x2dd/0x8d0 [ 2967.156391] ? idr_find+0x47/0x60 [ 2967.159855] loop_control_ioctl+0x165/0x360 [ 2967.164186] ? loop_add+0x8d0/0x8d0 [ 2967.167826] ? __might_sleep+0x95/0x190 [ 2967.171808] ? loop_add+0x8d0/0x8d0 [ 2967.175452] do_vfs_ioctl+0xd6e/0x1390 [ 2967.179348] ? selinux_file_ioctl+0x46f/0x5e0 [ 2967.183851] ? selinux_file_ioctl+0x125/0x5e0 [ 2967.188363] ? ioctl_preallocate+0x210/0x210 [ 2967.192782] ? selinux_file_mprotect+0x620/0x620 [ 2967.197556] ? iterate_fd+0x360/0x360 [ 2967.201368] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2967.206921] ? fput+0x128/0x1a0 [ 2967.210222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2967.215773] ? security_file_ioctl+0x93/0xc0 [ 2967.220205] ksys_ioctl+0xab/0xd0 [ 2967.223678] __x64_sys_ioctl+0x73/0xb0 [ 2967.227583] do_syscall_64+0x103/0x610 [ 2967.231484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2967.236684] RIP: 0033:0x458da9 [ 2967.239890] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2967.258809] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2967.266537] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2967.273828] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2967.281114] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2967.288400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2967.295685] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2967.404046] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xffffff80, @tick, {}, {}, @connect}], 0x30) 21:32:17 executing program 0 (fault-call:12 fault-nth:34): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:17 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00=\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2967.462452] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10100c0]}) 21:32:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2967.502772] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2967.513912] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2967.726367] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:17 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xffffff81, @tick, {}, {}, @connect}], 0x30) 21:32:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d564b]}) [ 2967.793267] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2967.840606] FAULT_INJECTION: forcing a failure. [ 2967.840606] name failslab, interval 1, probability 0, space 0, times 0 [ 2967.855077] CPU: 0 PID: 19915 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2967.862842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2967.872216] Call Trace: [ 2967.874830] dump_stack+0x172/0x1f0 [ 2967.878498] should_fail.cold+0xa/0x1b [ 2967.882435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2967.887573] ? lock_downgrade+0x810/0x810 [ 2967.891747] ? ___might_sleep+0x163/0x280 [ 2967.896105] __should_failslab+0x121/0x190 [ 2967.900366] should_failslab+0x9/0x14 [ 2967.904192] kmem_cache_alloc_node_trace+0x277/0x720 [ 2967.909331] ? blk_alloc_flush_queue+0x54/0x2b0 [ 2967.914028] ? rcu_read_lock_sched_held+0x110/0x130 [ 2967.919074] ? kmem_cache_alloc_node_trace+0x352/0x720 [ 2967.924388] __kmalloc_node+0x3d/0x80 [ 2967.928225] blk_alloc_flush_queue+0xfc/0x2b0 [ 2967.932755] blk_mq_realloc_hw_ctxs+0x7f9/0x1010 [ 2967.937535] blk_mq_init_allocated_queue+0x21d/0x1380 [ 2967.942728] ? blkcg_init_queue+0x203/0x550 [ 2967.947059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2967.952612] blk_mq_init_queue+0x64/0xb0 [ 2967.956677] loop_add+0x2dd/0x8d0 [ 2967.960125] ? idr_find+0x47/0x60 [ 2967.963578] loop_control_ioctl+0x165/0x360 [ 2967.967897] ? loop_add+0x8d0/0x8d0 [ 2967.971519] ? __might_sleep+0x95/0x190 [ 2967.975488] ? loop_add+0x8d0/0x8d0 [ 2967.979120] do_vfs_ioctl+0xd6e/0x1390 [ 2967.983007] ? selinux_file_ioctl+0x46f/0x5e0 [ 2967.987497] ? selinux_file_ioctl+0x125/0x5e0 [ 2967.991988] ? ioctl_preallocate+0x210/0x210 [ 2967.996391] ? selinux_file_mprotect+0x620/0x620 [ 2968.001150] ? iterate_fd+0x360/0x360 [ 2968.004949] ? check_memory_region+0x112/0x190 [ 2968.009535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2968.015074] ? security_file_ioctl+0x93/0xc0 [ 2968.019506] ksys_ioctl+0xab/0xd0 [ 2968.022962] __x64_sys_ioctl+0x73/0xb0 [ 2968.026848] do_syscall_64+0x103/0x610 [ 2968.030736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2968.035940] RIP: 0033:0x458da9 [ 2968.039131] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2968.058031] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2968.065828] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2968.073110] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2968.080374] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 21:32:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2968.087668] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2968.094934] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:18 executing program 0 (fault-call:12 fault-nth:35): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xffffff92, @tick, {}, {}, @connect}], 0x30) 21:32:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:18 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}) 21:32:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:18 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00C\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xffffff93, @tick, {}, {}, @connect}], 0x30) 21:32:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2968.596661] FAULT_INJECTION: forcing a failure. [ 2968.596661] name failslab, interval 1, probability 0, space 0, times 0 [ 2968.612886] CPU: 0 PID: 20122 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2968.619944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2968.629958] Call Trace: [ 2968.632890] dump_stack+0x172/0x1f0 [ 2968.637344] should_fail.cold+0xa/0x1b [ 2968.641385] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2968.646517] ? lock_downgrade+0x810/0x810 [ 2968.650693] ? ___might_sleep+0x163/0x280 [ 2968.654859] __should_failslab+0x121/0x190 [ 2968.659107] should_failslab+0x9/0x14 [ 2968.662906] kmem_cache_alloc_node_trace+0x277/0x720 [ 2968.668010] blk_mq_init_tags+0x73/0x2c0 [ 2968.672069] blk_mq_alloc_rq_map+0xa4/0x230 [ 2968.676394] blk_mq_init_sched+0x21b/0x770 [ 2968.680629] elevator_init_mq+0xda/0x160 [ 2968.684688] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2968.689898] blk_mq_init_queue+0x64/0xb0 [ 2968.693968] loop_add+0x2dd/0x8d0 [ 2968.697416] ? idr_find+0x47/0x60 [ 2968.700874] loop_control_ioctl+0x165/0x360 [ 2968.705419] ? loop_add+0x8d0/0x8d0 [ 2968.709043] ? __might_sleep+0x95/0x190 [ 2968.713039] ? retint_kernel+0x2d/0x2d [ 2968.716939] ? loop_add+0x8d0/0x8d0 [ 2968.722627] do_vfs_ioctl+0xd6e/0x1390 [ 2968.726524] ? selinux_file_ioctl+0x46f/0x5e0 [ 2968.731034] ? selinux_file_ioctl+0x125/0x5e0 [ 2968.735558] ? ioctl_preallocate+0x210/0x210 [ 2968.739993] ? selinux_file_mprotect+0x620/0x620 [ 2968.744769] ? iterate_fd+0x360/0x360 [ 2968.748590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2968.753356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2968.758892] ? security_file_ioctl+0x93/0xc0 [ 2968.763304] ksys_ioctl+0xab/0xd0 [ 2968.766788] __x64_sys_ioctl+0x73/0xb0 [ 2968.770676] ? do_syscall_64+0x5b/0x610 [ 2968.774707] do_syscall_64+0x103/0x610 [ 2968.778621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2968.783834] RIP: 0033:0x458da9 [ 2968.787039] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2968.806041] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2968.813940] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2968.821235] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2968.828604] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2968.835871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2968.843142] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:18 executing program 0 (fault-call:12 fault-nth:36): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xffffff94, @tick, {}, {}, @connect}], 0x30) 21:32:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00D\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20100c0]}) 21:32:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xfffffffd, @tick, {}, {}, @connect}], 0x30) 21:32:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2969.350462] FAULT_INJECTION: forcing a failure. [ 2969.350462] name failslab, interval 1, probability 0, space 0, times 0 [ 2969.374940] CPU: 0 PID: 20289 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2969.381920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2969.391296] Call Trace: [ 2969.393917] dump_stack+0x172/0x1f0 [ 2969.397656] should_fail.cold+0xa/0x1b [ 2969.401544] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2969.406760] ? lock_downgrade+0x810/0x810 [ 2969.410906] ? ___might_sleep+0x163/0x280 [ 2969.415054] __should_failslab+0x121/0x190 [ 2969.419284] should_failslab+0x9/0x14 [ 2969.423097] kmem_cache_alloc_node_trace+0x277/0x720 [ 2969.428212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2969.432973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2969.438516] ? find_next_bit+0x107/0x130 [ 2969.442608] blk_mq_init_tags+0x73/0x2c0 [ 2969.446700] blk_mq_alloc_rq_map+0xa4/0x230 [ 2969.451050] ? blk_mq_init_sched+0x1bd/0x770 [ 2969.455456] blk_mq_init_sched+0x21b/0x770 [ 2969.459692] elevator_init_mq+0xda/0x160 [ 2969.463751] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2969.468969] blk_mq_init_queue+0x64/0xb0 [ 2969.473035] loop_add+0x2dd/0x8d0 [ 2969.476498] ? idr_find+0x47/0x60 [ 2969.479947] loop_control_ioctl+0x165/0x360 [ 2969.484269] ? loop_add+0x8d0/0x8d0 [ 2969.487895] ? __might_sleep+0x95/0x190 [ 2969.491863] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 2969.496732] ? loop_add+0x8d0/0x8d0 [ 2969.500378] do_vfs_ioctl+0xd6e/0x1390 [ 2969.504338] ? selinux_file_ioctl+0x46f/0x5e0 [ 2969.508829] ? selinux_file_ioctl+0x125/0x5e0 [ 2969.513331] ? ioctl_preallocate+0x210/0x210 [ 2969.517737] ? selinux_file_mprotect+0x620/0x620 [ 2969.522494] ? iterate_fd+0x360/0x360 [ 2969.526337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2969.531093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2969.536634] ? security_file_ioctl+0x93/0xc0 [ 2969.541061] ksys_ioctl+0xab/0xd0 [ 2969.544530] __x64_sys_ioctl+0x73/0xb0 [ 2969.548415] do_syscall_64+0x103/0x610 [ 2969.552303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2969.557495] RIP: 0033:0x458da9 [ 2969.560697] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2969.579615] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2969.587331] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2969.594600] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2969.601884] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2969.609161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2969.616451] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:19 executing program 0 (fault-call:12 fault-nth:37): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xfffffffe, @tick, {}, {}, @connect}], 0x30) 21:32:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24d564b]}) 21:32:19 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00H\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x100000000000000, @tick, {}, {}, @connect}], 0x30) 21:32:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2970.119683] FAULT_INJECTION: forcing a failure. [ 2970.119683] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.143270] CPU: 1 PID: 20423 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2970.150265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.159636] Call Trace: [ 2970.162263] dump_stack+0x172/0x1f0 [ 2970.165921] should_fail.cold+0xa/0x1b 21:32:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30001c0]}) 21:32:20 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00L\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2970.169843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2970.174972] ? lock_downgrade+0x810/0x810 [ 2970.179181] ? ___might_sleep+0x163/0x280 [ 2970.183358] __should_failslab+0x121/0x190 [ 2970.187674] should_failslab+0x9/0x14 [ 2970.191499] kmem_cache_alloc_node_trace+0x277/0x720 [ 2970.196618] ? check_preemption_disabled+0x48/0x290 [ 2970.201657] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2970.206702] ? find_next_bit+0x107/0x130 [ 2970.210817] sbitmap_queue_init_node+0x23e/0x6c0 [ 2970.215609] blk_mq_init_tags+0x119/0x2c0 [ 2970.219792] blk_mq_alloc_rq_map+0xa4/0x230 [ 2970.224145] blk_mq_init_sched+0x21b/0x770 [ 2970.228411] elevator_init_mq+0xda/0x160 [ 2970.232498] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2970.237740] blk_mq_init_queue+0x64/0xb0 [ 2970.241832] loop_add+0x2dd/0x8d0 [ 2970.245304] ? idr_find+0x47/0x60 [ 2970.248767] loop_control_ioctl+0x165/0x360 [ 2970.253097] ? loop_add+0x8d0/0x8d0 [ 2970.256733] ? __inode_security_revalidate+0x55/0x120 [ 2970.262039] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 2970.266897] ? loop_add+0x8d0/0x8d0 [ 2970.270524] do_vfs_ioctl+0xd6e/0x1390 [ 2970.274421] ? selinux_file_ioctl+0x46f/0x5e0 [ 2970.278946] ? selinux_file_ioctl+0x125/0x5e0 [ 2970.283459] ? ioctl_preallocate+0x210/0x210 [ 2970.287926] ? selinux_file_mprotect+0x620/0x620 [ 2970.292704] ? iterate_fd+0x360/0x360 [ 2970.296537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2970.302090] ? fput+0x128/0x1a0 [ 2970.305390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2970.310947] ? security_file_ioctl+0x93/0xc0 [ 2970.316077] ksys_ioctl+0xab/0xd0 [ 2970.319593] __x64_sys_ioctl+0x73/0xb0 [ 2970.323508] do_syscall_64+0x103/0x610 [ 2970.327411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2970.332605] RIP: 0033:0x458da9 [ 2970.335822] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2970.354862] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2970.362603] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 21:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x200000000000000, @tick, {}, {}, @connect}], 0x30) [ 2970.369924] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2970.377194] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2970.384474] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2970.391784] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:20 executing program 0 (fault-call:12 fault-nth:38): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:20 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00M\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x300000000000000, @tick, {}, {}, @connect}], 0x30) 21:32:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30100c0]}) 21:32:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 21:32:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x400000000000000, @tick, {}, {}, @connect}], 0x30) 21:32:20 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2970.927738] FAULT_INJECTION: forcing a failure. [ 2970.927738] name failslab, interval 1, probability 0, space 0, times 0 [ 2970.941809] CPU: 0 PID: 20577 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2970.948782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2970.958241] Call Trace: [ 2970.960851] dump_stack+0x172/0x1f0 [ 2970.964529] should_fail.cold+0xa/0x1b [ 2970.968810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2970.973983] ? lock_downgrade+0x810/0x810 [ 2970.978151] ? ___might_sleep+0x163/0x280 [ 2970.982372] __should_failslab+0x121/0x190 [ 2970.986609] should_failslab+0x9/0x14 [ 2970.990416] kmem_cache_alloc_node_trace+0x277/0x720 [ 2970.995533] sbitmap_queue_init_node+0x23e/0x6c0 [ 2971.000291] blk_mq_init_tags+0x17b/0x2c0 [ 2971.004443] blk_mq_alloc_rq_map+0xa4/0x230 [ 2971.008851] blk_mq_init_sched+0x21b/0x770 [ 2971.013089] elevator_init_mq+0xda/0x160 [ 2971.017180] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2971.022369] ? blk_alloc_queue_node+0x788/0xb70 [ 2971.027049] blk_mq_init_queue+0x64/0xb0 [ 2971.031119] loop_add+0x2dd/0x8d0 [ 2971.034565] ? idr_find+0x47/0x60 [ 2971.038042] loop_control_ioctl+0x165/0x360 [ 2971.042379] ? loop_add+0x8d0/0x8d0 [ 2971.046012] ? __might_sleep+0x95/0x190 [ 2971.049992] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2971.054750] ? loop_add+0x8d0/0x8d0 [ 2971.058380] do_vfs_ioctl+0xd6e/0x1390 [ 2971.062342] ? ioctl_preallocate+0x210/0x210 [ 2971.066925] ? retint_kernel+0x2d/0x2d [ 2971.070830] ? security_file_ioctl+0x3d/0xc0 [ 2971.075239] ? security_file_ioctl+0xa5/0xc0 [ 2971.079650] ? security_file_ioctl+0x93/0xc0 [ 2971.084058] ksys_ioctl+0xab/0xd0 [ 2971.087515] __x64_sys_ioctl+0x73/0xb0 [ 2971.091399] ? do_syscall_64+0x5b/0x610 [ 2971.095388] do_syscall_64+0x103/0x610 [ 2971.099276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2971.104458] RIP: 0033:0x458da9 [ 2971.107645] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:32:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34d564b]}) [ 2971.126828] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2971.134547] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2971.142001] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2971.149265] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2971.156530] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2971.163809] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:21 executing program 0 (fault-call:12 fault-nth:39): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x2) 21:32:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x500000000000000, @tick, {}, {}, @connect}], 0x30) 21:32:21 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00T\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40001c0]}) 21:32:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x3) 21:32:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x800000000000000, @tick, {}, {}, @connect}], 0x30) 21:32:21 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2971.691586] FAULT_INJECTION: forcing a failure. [ 2971.691586] name failslab, interval 1, probability 0, space 0, times 0 [ 2971.717327] CPU: 0 PID: 20714 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2971.724318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2971.733984] Call Trace: [ 2971.736615] dump_stack+0x172/0x1f0 [ 2971.740244] should_fail.cold+0xa/0x1b [ 2971.744130] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2971.749343] ? ___might_sleep+0x163/0x280 [ 2971.753490] __should_failslab+0x121/0x190 [ 2971.757736] should_failslab+0x9/0x14 [ 2971.761557] kmem_cache_alloc_node_trace+0x277/0x720 [ 2971.766678] ? sbitmap_queue_init_node+0x53/0x6c0 [ 2971.771537] __kmalloc_node+0x3d/0x80 [ 2971.775341] blk_mq_alloc_rq_map+0xd5/0x230 [ 2971.779661] blk_mq_init_sched+0x21b/0x770 [ 2971.783903] elevator_init_mq+0xda/0x160 [ 2971.787962] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2971.793150] blk_mq_init_queue+0x64/0xb0 [ 2971.797218] loop_add+0x2dd/0x8d0 [ 2971.800698] ? idr_find+0x47/0x60 [ 2971.804149] loop_control_ioctl+0x165/0x360 [ 2971.809075] ? loop_add+0x8d0/0x8d0 [ 2971.812699] ? __might_sleep+0x95/0x190 [ 2971.816666] ? loop_add+0x8d0/0x8d0 [ 2971.820294] do_vfs_ioctl+0xd6e/0x1390 [ 2971.824194] ? selinux_file_ioctl+0x46f/0x5e0 [ 2971.828787] ? selinux_file_ioctl+0x125/0x5e0 [ 2971.833283] ? ioctl_preallocate+0x210/0x210 [ 2971.837709] ? selinux_file_mprotect+0x620/0x620 [ 2971.842482] ? iterate_fd+0x360/0x360 [ 2971.846330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2971.851196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2971.856755] ? security_file_ioctl+0x93/0xc0 [ 2971.861181] ksys_ioctl+0xab/0xd0 [ 2971.864667] __x64_sys_ioctl+0x73/0xb0 [ 2971.868574] do_syscall_64+0x103/0x610 [ 2971.872470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2971.877664] RIP: 0033:0x458da9 [ 2971.880853] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2971.899776] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2971.907504] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2971.914780] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2971.922056] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2971.929332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2971.936613] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x4) 21:32:22 executing program 0 (fault-call:12 fault-nth:40): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:22 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44d564b]}) 21:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x80ffffff00000000, @tick, {}, {}, @connect}], 0x30) [ 2972.142102] validate_nla: 46 callbacks suppressed [ 2972.142111] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2972.192728] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2972.227153] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:22 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2972.314891] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xa) 21:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x81ffffff00000000, @tick, {}, {}, @connect}], 0x30) 21:32:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70001c0]}) [ 2972.468569] FAULT_INJECTION: forcing a failure. [ 2972.468569] name failslab, interval 1, probability 0, space 0, times 0 [ 2972.483836] CPU: 1 PID: 20853 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2972.490805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2972.500168] Call Trace: [ 2972.502769] dump_stack+0x172/0x1f0 [ 2972.506420] should_fail.cold+0xa/0x1b [ 2972.510305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2972.515423] ? ___might_sleep+0x163/0x280 [ 2972.519583] __should_failslab+0x121/0x190 [ 2972.523837] should_failslab+0x9/0x14 [ 2972.527659] kmem_cache_alloc_node_trace+0x277/0x720 [ 2972.533138] ? sbitmap_queue_init_node+0x53/0x6c0 [ 2972.538016] ? kasan_unpoison_shadow+0x35/0x50 [ 2972.542621] __kmalloc_node+0x3d/0x80 [ 2972.546482] blk_mq_alloc_rq_map+0x116/0x230 [ 2972.550911] blk_mq_init_sched+0x21b/0x770 [ 2972.555173] elevator_init_mq+0xda/0x160 [ 2972.559250] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2972.564477] blk_mq_init_queue+0x64/0xb0 [ 2972.568556] loop_add+0x2dd/0x8d0 [ 2972.572282] ? idr_find+0x47/0x60 [ 2972.575747] loop_control_ioctl+0x165/0x360 [ 2972.580077] ? loop_add+0x8d0/0x8d0 [ 2972.583710] ? __might_sleep+0x95/0x190 [ 2972.587740] ? loop_add+0x8d0/0x8d0 [ 2972.591382] do_vfs_ioctl+0xd6e/0x1390 [ 2972.595277] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2972.600064] ? retint_kernel+0x2d/0x2d [ 2972.603982] ? ioctl_preallocate+0x210/0x210 [ 2972.608402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2972.613179] ? retint_kernel+0x2d/0x2d [ 2972.617106] ksys_ioctl+0xab/0xd0 [ 2972.620574] __x64_sys_ioctl+0x73/0xb0 [ 2972.624473] do_syscall_64+0x103/0x610 [ 2972.628407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2972.633605] RIP: 0033:0x458da9 [ 2972.636826] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2972.655845] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2972.663577] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2972.670868] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2972.678142] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2972.685434] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2972.692712] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2972.809904] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:22 executing program 0 (fault-call:12 fault-nth:41): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x92ffffff00000000, @tick, {}, {}, @connect}], 0x30) [ 2972.861897] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:22 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00d\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2972.936446] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2973.003615] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8010040]}) 21:32:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xe) 21:32:23 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x93ffffff00000000, @tick, {}, {}, @connect}], 0x30) [ 2973.193118] FAULT_INJECTION: forcing a failure. [ 2973.193118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2973.220821] CPU: 1 PID: 20986 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2973.228232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2973.237896] Call Trace: [ 2973.240488] dump_stack+0x172/0x1f0 [ 2973.244144] should_fail.cold+0xa/0x1b [ 2973.248040] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2973.253647] ? ___might_sleep+0x163/0x280 [ 2973.257832] ? __might_sleep+0x95/0x190 [ 2973.261864] __alloc_pages_nodemask+0x1ee/0x760 [ 2973.266562] ? retint_kernel+0x2d/0x2d [ 2973.270601] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2973.276170] ? __cpu_to_node+0x7e/0xa0 [ 2973.280073] ? blk_mq_hw_queue_to_node+0xcf/0x110 [ 2973.284930] blk_mq_alloc_rqs+0x23e/0x820 [ 2973.289092] ? __kmalloc_node+0x51/0x80 [ 2973.293087] blk_mq_init_sched+0x275/0x770 [ 2973.297876] elevator_init_mq+0xda/0x160 [ 2973.301954] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2973.307171] blk_mq_init_queue+0x64/0xb0 [ 2973.311246] loop_add+0x2dd/0x8d0 [ 2973.314706] ? idr_find+0x47/0x60 [ 2973.318183] loop_control_ioctl+0x165/0x360 [ 2973.322691] ? loop_add+0x8d0/0x8d0 [ 2973.326791] ? __might_sleep+0x95/0x190 [ 2973.330783] ? loop_add+0x8d0/0x8d0 [ 2973.334445] do_vfs_ioctl+0xd6e/0x1390 [ 2973.338360] ? selinux_file_ioctl+0x46f/0x5e0 [ 2973.342868] ? selinux_file_ioctl+0x125/0x5e0 [ 2973.347379] ? ioctl_preallocate+0x210/0x210 [ 2973.351804] ? selinux_file_mprotect+0x620/0x620 [ 2973.357063] ? iterate_fd+0x360/0x360 [ 2973.360884] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2973.365662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2973.371215] ? security_file_ioctl+0x93/0xc0 [ 2973.375670] ksys_ioctl+0xab/0xd0 [ 2973.379169] __x64_sys_ioctl+0x73/0xb0 [ 2973.383068] ? do_syscall_64+0x5b/0x610 [ 2973.387051] do_syscall_64+0x103/0x610 [ 2973.390950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2973.396147] RIP: 0033:0x458da9 [ 2973.399345] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2973.418459] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2973.426192] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2973.433477] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2973.440780] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2973.448066] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2973.455349] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8030000]}) 21:32:23 executing program 0 (fault-call:12 fault-nth:42): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2973.735433] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x94ffffff00000000, @tick, {}, {}, @connect}], 0x30) 21:32:23 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2973.792286] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xf) 21:32:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa010000]}) [ 2973.959767] FAULT_INJECTION: forcing a failure. [ 2973.959767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2973.994083] CPU: 1 PID: 21113 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2974.001072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.010451] Call Trace: [ 2974.013081] dump_stack+0x172/0x1f0 [ 2974.016740] should_fail.cold+0xa/0x1b [ 2974.020652] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2974.025775] ? ___might_sleep+0x163/0x280 [ 2974.029985] ? __might_sleep+0x95/0x190 [ 2974.033973] __alloc_pages_nodemask+0x1ee/0x760 [ 2974.038647] ? retint_kernel+0x2d/0x2d [ 2974.042543] ? loop_info64_from_compat+0x5d0/0x5d0 [ 2974.047514] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2974.052547] ? __memmove+0x1a0/0x1a0 [ 2974.056275] ? memset+0x32/0x40 [ 2974.059575] blk_mq_alloc_rqs+0x23e/0x820 [ 2974.063946] blk_mq_init_sched+0x275/0x770 [ 2974.068210] elevator_init_mq+0xda/0x160 [ 2974.072292] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2974.077502] ? blk_alloc_queue_node+0x78e/0xb70 [ 2974.082202] blk_mq_init_queue+0x64/0xb0 [ 2974.086282] loop_add+0x2dd/0x8d0 [ 2974.089744] ? idr_find+0x47/0x60 [ 2974.093222] loop_control_ioctl+0x165/0x360 [ 2974.097571] ? loop_add+0x8d0/0x8d0 [ 2974.101220] ? loop_add+0x8d0/0x8d0 [ 2974.104877] do_vfs_ioctl+0xd6e/0x1390 [ 2974.108779] ? selinux_file_ioctl+0x46f/0x5e0 [ 2974.113295] ? selinux_file_ioctl+0x125/0x5e0 [ 2974.117937] ? ioctl_preallocate+0x210/0x210 [ 2974.122367] ? selinux_file_mprotect+0x620/0x620 [ 2974.127156] ? iterate_fd+0x360/0x360 [ 2974.130987] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2974.136628] ? fput+0x128/0x1a0 [ 2974.139939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2974.145503] ? security_file_ioctl+0x93/0xc0 [ 2974.149940] ksys_ioctl+0xab/0xd0 [ 2974.153426] __x64_sys_ioctl+0x73/0xb0 [ 2974.157345] do_syscall_64+0x103/0x610 [ 2974.161284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.166488] RIP: 0033:0x458da9 [ 2974.169692] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2974.188634] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2974.196480] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2974.203821] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2974.211278] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2974.218561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2974.225850] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xfdffffff00000000, @tick, {}, {}, @connect}], 0x30) 21:32:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00|\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:24 executing program 0 (fault-call:12 fault-nth:43): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xfeffffff00000000, @tick, {}, {}, @connect}], 0x30) 21:32:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x60) 21:32:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x81\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xf0) 21:32:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0xffffffff00000000, @tick, {}, {}, @connect}], 0x30) 21:32:24 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x84\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}) [ 2974.779556] FAULT_INJECTION: forcing a failure. [ 2974.779556] name failslab, interval 1, probability 0, space 0, times 0 [ 2974.803739] CPU: 1 PID: 21193 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2974.810728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2974.820099] Call Trace: [ 2974.822745] dump_stack+0x172/0x1f0 [ 2974.826404] should_fail.cold+0xa/0x1b [ 2974.830305] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2974.835456] __should_failslab+0x121/0x190 [ 2974.839712] should_failslab+0x9/0x14 [ 2974.843521] kmem_cache_alloc_node_trace+0x277/0x720 [ 2974.848743] ? memset+0x32/0x40 [ 2974.852041] ? loop_init_request+0x25/0xb0 [ 2974.856304] elevator_alloc+0x7f/0x200 [ 2974.860227] dd_init_queue+0x25/0x440 [ 2974.864046] blk_mq_init_sched+0x3b1/0x770 [ 2974.868457] elevator_init_mq+0xda/0x160 [ 2974.872547] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2974.877760] blk_mq_init_queue+0x64/0xb0 [ 2974.881987] loop_add+0x2dd/0x8d0 [ 2974.885596] loop_control_ioctl+0x165/0x360 [ 2974.889928] ? loop_add+0x8d0/0x8d0 [ 2974.893574] ? __might_sleep+0x95/0x190 [ 2974.897548] ? loop_add+0x8d0/0x8d0 [ 2974.901189] do_vfs_ioctl+0xd6e/0x1390 [ 2974.905094] ? selinux_file_ioctl+0x46f/0x5e0 [ 2974.909590] ? selinux_file_ioctl+0x125/0x5e0 [ 2974.914085] ? ioctl_preallocate+0x210/0x210 [ 2974.918503] ? selinux_file_mprotect+0x620/0x620 [ 2974.923268] ? iterate_fd+0x360/0x360 [ 2974.927087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2974.932640] ? security_file_ioctl+0x93/0xc0 [ 2974.937055] ksys_ioctl+0xab/0xd0 [ 2974.940509] __x64_sys_ioctl+0x73/0xb0 [ 2974.944394] do_syscall_64+0x103/0x610 [ 2974.948283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2974.953473] RIP: 0033:0x458da9 [ 2974.956669] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:32:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x300) [ 2974.975618] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2974.983334] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2974.990603] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2974.997876] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2975.005152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2975.012435] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:25 executing program 0 (fault-call:12 fault-nth:44): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xa00) 21:32:25 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x87\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}) 21:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xe00) 21:32:25 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x94\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2975.526893] FAULT_INJECTION: forcing a failure. [ 2975.526893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2975.556991] CPU: 0 PID: 21370 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2975.564252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2975.564269] Call Trace: [ 2975.564295] dump_stack+0x172/0x1f0 [ 2975.564328] should_fail.cold+0xa/0x1b [ 2975.564351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2975.564376] ? ___might_sleep+0x163/0x280 [ 2975.589798] ? __might_sleep+0x95/0x190 [ 2975.589818] __alloc_pages_nodemask+0x1ee/0x760 [ 2975.589842] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2975.608251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2975.614036] ? __cpu_to_node+0x7e/0xa0 [ 2975.617949] ? blk_mq_hw_queue_to_node+0xcf/0x110 [ 2975.622814] blk_mq_alloc_rqs+0x23e/0x820 [ 2975.626992] ? __kmalloc_node+0x51/0x80 [ 2975.631001] blk_mq_init_sched+0x275/0x770 [ 2975.635268] elevator_init_mq+0xda/0x160 [ 2975.639353] blk_mq_init_allocated_queue+0xeab/0x1380 [ 2975.644566] blk_mq_init_queue+0x64/0xb0 [ 2975.648637] loop_add+0x2dd/0x8d0 [ 2975.652094] ? idr_find+0x47/0x60 [ 2975.655732] loop_control_ioctl+0x165/0x360 [ 2975.660066] ? loop_add+0x8d0/0x8d0 [ 2975.664062] ? __inode_security_revalidate+0x71/0x120 [ 2975.669273] ? __inode_security_revalidate+0x8a/0x120 [ 2975.674481] ? loop_add+0x8d0/0x8d0 [ 2975.678121] do_vfs_ioctl+0xd6e/0x1390 [ 2975.682017] ? selinux_file_ioctl+0x46f/0x5e0 [ 2975.686539] ? selinux_file_ioctl+0x125/0x5e0 [ 2975.691048] ? ioctl_preallocate+0x210/0x210 [ 2975.695464] ? selinux_file_mprotect+0x620/0x620 [ 2975.700241] ? iterate_fd+0x360/0x360 [ 2975.704059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2975.708829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2975.714379] ? security_file_ioctl+0x93/0xc0 [ 2975.718802] ksys_ioctl+0xab/0xd0 [ 2975.722289] __x64_sys_ioctl+0x73/0xb0 [ 2975.726187] ? do_syscall_64+0x5b/0x610 [ 2975.730176] do_syscall_64+0x103/0x610 [ 2975.734081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2975.739284] RIP: 0033:0x458da9 [ 2975.742487] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2975.761402] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2975.769130] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 21:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2975.776413] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2975.785215] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2975.792507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2975.799788] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}) 21:32:26 executing program 0 (fault-call:12 fault-nth:45): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xf00) 21:32:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9c\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150001c0]}) 21:32:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2976.376248] FAULT_INJECTION: forcing a failure. [ 2976.376248] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.414444] CPU: 1 PID: 21527 Comm: syz-executor.0 Not tainted 4.19.36 #4 21:32:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa4\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2976.421433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2976.430909] Call Trace: [ 2976.433530] dump_stack+0x172/0x1f0 [ 2976.437186] should_fail.cold+0xa/0x1b [ 2976.441145] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2976.446295] ? lock_downgrade+0x810/0x810 [ 2976.450478] ? ___might_sleep+0x163/0x280 [ 2976.454862] __should_failslab+0x121/0x190 [ 2976.459562] should_failslab+0x9/0x14 [ 2976.463646] kmem_cache_alloc_node_trace+0x277/0x720 [ 2976.468794] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2976.473480] ? trace_hardirqs_on+0x67/0x230 [ 2976.477828] ? kasan_check_read+0x11/0x20 [ 2976.481977] __alloc_disk_node+0x70/0x420 [ 2976.486156] loop_add+0x3be/0x8d0 [ 2976.489628] ? idr_find+0x47/0x60 [ 2976.493139] loop_control_ioctl+0x165/0x360 [ 2976.497470] ? loop_add+0x8d0/0x8d0 [ 2976.501292] ? __might_sleep+0x95/0x190 [ 2976.505268] ? loop_add+0x8d0/0x8d0 [ 2976.508930] do_vfs_ioctl+0xd6e/0x1390 [ 2976.512845] ? selinux_file_ioctl+0x46f/0x5e0 [ 2976.517339] ? selinux_file_ioctl+0x125/0x5e0 [ 2976.521868] ? ioctl_preallocate+0x210/0x210 [ 2976.526329] ? selinux_file_mprotect+0x620/0x620 [ 2976.531113] ? iterate_fd+0x360/0x360 [ 2976.534915] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2976.540453] ? fput+0x128/0x1a0 [ 2976.543737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2976.549273] ? security_file_ioctl+0x93/0xc0 [ 2976.553684] ksys_ioctl+0xab/0xd0 [ 2976.557176] __x64_sys_ioctl+0x73/0xb0 [ 2976.561101] do_syscall_64+0x103/0x610 [ 2976.565011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2976.570198] RIP: 0033:0x458da9 [ 2976.573387] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2976.592373] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2976.600084] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2976.607361] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2976.614650] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 21:32:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x3f00) 21:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2976.621917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2976.629183] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:26 executing program 0 (fault-call:12 fault-nth:46): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x4000) 21:32:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:26 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x170101c0]}) 21:32:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x4458) 21:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 21:32:27 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb1\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000]}) [ 2977.185214] FAULT_INJECTION: forcing a failure. [ 2977.185214] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.198647] CPU: 0 PID: 21677 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2977.205636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.214985] Call Trace: [ 2977.217595] dump_stack+0x172/0x1f0 [ 2977.221250] should_fail.cold+0xa/0x1b [ 2977.225143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2977.230244] ? lock_downgrade+0x810/0x810 [ 2977.234419] ? ___might_sleep+0x163/0x280 [ 2977.238579] __should_failslab+0x121/0x190 [ 2977.242817] should_failslab+0x9/0x14 [ 2977.246626] kmem_cache_alloc_node_trace+0x277/0x720 [ 2977.251735] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2977.256329] ? trace_hardirqs_on+0x67/0x230 [ 2977.260655] ? kasan_check_read+0x11/0x20 [ 2977.264841] __alloc_disk_node+0x70/0x420 [ 2977.268989] loop_add+0x3be/0x8d0 [ 2977.272444] ? idr_find+0x47/0x60 [ 2977.275910] loop_control_ioctl+0x165/0x360 [ 2977.280224] ? loop_add+0x8d0/0x8d0 [ 2977.283847] ? __might_sleep+0x95/0x190 [ 2977.287815] ? loop_add+0x8d0/0x8d0 [ 2977.291439] do_vfs_ioctl+0xd6e/0x1390 [ 2977.295358] ? selinux_file_ioctl+0x46f/0x5e0 [ 2977.299846] ? selinux_file_ioctl+0x125/0x5e0 [ 2977.304341] ? ioctl_preallocate+0x210/0x210 [ 2977.308746] ? selinux_file_mprotect+0x620/0x620 [ 2977.313587] ? iterate_fd+0x360/0x360 [ 2977.317384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2977.322913] ? fput+0x128/0x1a0 [ 2977.326188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2977.331719] ? security_file_ioctl+0x93/0xc0 [ 2977.336126] ksys_ioctl+0xab/0xd0 [ 2977.339576] __x64_sys_ioctl+0x73/0xb0 [ 2977.343460] do_syscall_64+0x103/0x610 [ 2977.347355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2977.352542] RIP: 0033:0x458da9 [ 2977.355760] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2977.374659] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2977.382474] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2977.389760] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2977.397110] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2977.404374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2977.411765] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:27 executing program 0 (fault-call:12 fault-nth:47): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2977.511422] validate_nla: 34 callbacks suppressed [ 2977.511445] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:27 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2977.608807] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b0001c0]}) 21:32:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x5844) [ 2977.655636] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2977.674438] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2977.795800] FAULT_INJECTION: forcing a failure. [ 2977.795800] name failslab, interval 1, probability 0, space 0, times 0 [ 2977.824204] CPU: 1 PID: 21779 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2977.831516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2977.840895] Call Trace: 21:32:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2977.843522] dump_stack+0x172/0x1f0 [ 2977.847194] should_fail.cold+0xa/0x1b [ 2977.851129] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2977.856544] ? lock_downgrade+0x810/0x810 [ 2977.860732] ? ___might_sleep+0x163/0x280 [ 2977.865152] __should_failslab+0x121/0x190 [ 2977.869418] should_failslab+0x9/0x14 [ 2977.873239] kmem_cache_alloc_trace+0x2cf/0x760 [ 2977.877935] ? part_uevent+0x120/0x120 [ 2977.881843] rand_initialize_disk+0x40/0xc0 [ 2977.886357] __alloc_disk_node+0x23f/0x420 [ 2977.890609] loop_add+0x3be/0x8d0 [ 2977.894072] ? idr_find+0x47/0x60 [ 2977.897560] loop_control_ioctl+0x165/0x360 [ 2977.901902] ? loop_add+0x8d0/0x8d0 [ 2977.905564] ? __might_sleep+0x95/0x190 [ 2977.909954] ? loop_add+0x8d0/0x8d0 [ 2977.913615] do_vfs_ioctl+0xd6e/0x1390 [ 2977.917513] ? selinux_file_ioctl+0x46f/0x5e0 [ 2977.922141] ? selinux_file_ioctl+0x125/0x5e0 [ 2977.926656] ? ioctl_preallocate+0x210/0x210 [ 2977.931079] ? selinux_file_mprotect+0x620/0x620 [ 2977.935861] ? iterate_fd+0x360/0x360 [ 2977.939681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2977.945233] ? fput+0x128/0x1a0 [ 2977.948631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2977.954182] ? security_file_ioctl+0x93/0xc0 [ 2977.958611] ksys_ioctl+0xab/0xd0 [ 2977.962086] __x64_sys_ioctl+0x73/0xb0 [ 2977.965996] do_syscall_64+0x103/0x610 [ 2977.969900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2977.975099] RIP: 0033:0x458da9 21:32:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2977.978302] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2977.997582] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2978.005310] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2978.012853] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2978.020132] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2978.027503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2978.034781] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2978.214044] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:28 executing program 0 (fault-call:12 fault-nth:48): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 2978.291296] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) [ 2978.348554] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 2978.371259] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 21:32:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x6000) 21:32:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e010000]}) 21:32:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2978.551808] FAULT_INJECTION: forcing a failure. [ 2978.551808] name failslab, interval 1, probability 0, space 0, times 0 [ 2978.580262] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:32:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) [ 2978.601695] CPU: 0 PID: 21890 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2978.608672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2978.618037] Call Trace: [ 2978.620648] dump_stack+0x172/0x1f0 [ 2978.624310] should_fail.cold+0xa/0x1b [ 2978.628228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2978.633365] ? lock_downgrade+0x810/0x810 [ 2978.637544] ? ___might_sleep+0x163/0x280 [ 2978.641718] __should_failslab+0x121/0x190 21:32:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0xf000) [ 2978.642675] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 2978.645974] should_failslab+0x9/0x14 [ 2978.645992] kmem_cache_alloc_trace+0x2cf/0x760 [ 2978.646011] ? part_uevent+0x120/0x120 [ 2978.646033] rand_initialize_disk+0x40/0xc0 [ 2978.670077] __alloc_disk_node+0x23f/0x420 [ 2978.674332] ? __alloc_disk_node+0x1/0x420 [ 2978.678600] loop_add+0x3be/0x8d0 [ 2978.682055] ? idr_find+0x47/0x60 [ 2978.685517] loop_control_ioctl+0x165/0x360 [ 2978.689833] ? loop_add+0x8d0/0x8d0 [ 2978.693466] ? __inode_security_revalidate+0x71/0x120 [ 2978.698659] ? __inode_security_revalidate+0x9d/0x120 [ 2978.703846] ? loop_add+0x8d0/0x8d0 [ 2978.707489] do_vfs_ioctl+0xd6e/0x1390 [ 2978.711373] ? selinux_file_ioctl+0x46f/0x5e0 [ 2978.715859] ? selinux_file_ioctl+0x125/0x5e0 [ 2978.720349] ? ioctl_preallocate+0x210/0x210 [ 2978.724752] ? selinux_file_mprotect+0x620/0x620 [ 2978.729503] ? iterate_fd+0x360/0x360 [ 2978.733301] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2978.738839] ? fput+0x128/0x1a0 [ 2978.742120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2978.747661] ? security_file_ioctl+0x93/0xc0 [ 2978.752072] ksys_ioctl+0xab/0xd0 [ 2978.755521] __x64_sys_ioctl+0x73/0xb0 [ 2978.759419] do_syscall_64+0x103/0x610 [ 2978.763304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2978.768508] RIP: 0033:0x458da9 [ 2978.771692] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2978.790586] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2978.798378] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2978.805642] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2978.812990] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2978.820270] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2978.827535] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 21:32:28 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:29 executing program 0 (fault-call:12 fault-nth:49): ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) keyctl$revoke(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 21:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x30000) 21:32:29 executing program 4: r0 = socket(0x2, 0x3, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@broute={'broute\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3, [{}, {}, {0x6}]}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 21:32:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000040)={0x7f, 0x2, [0x4b564d02], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f0001c0]}) 21:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x20004010) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) chmod(0x0, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 2979.397687] FAULT_INJECTION: forcing a failure. [ 2979.397687] name failslab, interval 1, probability 0, space 0, times 0 [ 2979.456493] CPU: 0 PID: 22062 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2979.463477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.463484] Call Trace: [ 2979.463510] dump_stack+0x172/0x1f0 [ 2979.463535] should_fail.cold+0xa/0x1b [ 2979.463558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2979.463592] __should_failslab+0x121/0x190 [ 2979.463612] should_failslab+0x9/0x14 [ 2979.463629] kmem_cache_alloc_trace+0x2cf/0x760 [ 2979.463649] ? mark_held_locks+0xb1/0x100 [ 2979.463670] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.463695] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.501192] device_create_groups_vargs+0x8e/0x270 [ 2979.501215] device_create_vargs+0x45/0x60 [ 2979.501238] bdi_register_va.part.0+0x38/0x740 [ 2979.528659] bdi_register+0x12a/0x140 [ 2979.532480] ? bdi_register_va+0x80/0x80 [ 2979.536652] ? mark_held_locks+0xb1/0x100 [ 2979.540827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.545616] bdi_register_owner+0x61/0x110 [ 2979.549877] __device_add_disk+0xcef/0x10b0 [ 2979.554220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.559004] ? blk_alloc_devt+0x2e0/0x2e0 [ 2979.563186] device_add_disk+0x23/0x30 [ 2979.567437] loop_add+0x650/0x8d0 [ 2979.570911] loop_control_ioctl+0x165/0x360 [ 2979.575245] ? loop_add+0x8d0/0x8d0 [ 2979.578894] ? __might_sleep+0x95/0x190 [ 2979.582879] ? loop_add+0x8d0/0x8d0 [ 2979.586531] do_vfs_ioctl+0xd6e/0x1390 [ 2979.590433] ? selinux_file_ioctl+0x46f/0x5e0 [ 2979.594940] ? selinux_file_ioctl+0x125/0x5e0 [ 2979.599460] ? ioctl_preallocate+0x210/0x210 [ 2979.603879] ? selinux_file_mprotect+0x620/0x620 [ 2979.608653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.613435] ? retint_kernel+0x2d/0x2d [ 2979.617353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2979.623086] ? security_file_ioctl+0x93/0xc0 [ 2979.627516] ksys_ioctl+0xab/0xd0 [ 2979.630986] __x64_sys_ioctl+0x73/0xb0 [ 2979.634891] do_syscall_64+0x103/0x610 [ 2979.638800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2979.644023] RIP: 0033:0x458da9 [ 2979.647233] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2979.667010] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2979.674749] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2979.682382] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2979.689687] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2979.696974] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 21:32:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) write$sndseq(r1, &(0x7f0000000140)=[{0x81, 0x1, 0x0, 0x0, @tick, {}, {}, @connect}], 0x30) 21:32:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100000005}]}, 0x2c}}, 0x34000) [ 2979.704269] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2979.727039] WARNING: CPU: 1 PID: 22062 at block/genhd.c:697 __device_add_disk+0xe63/0x10b0 [ 2979.735581] Kernel panic - not syncing: panic_on_warn set ... [ 2979.735581] [ 2979.742973] CPU: 1 PID: 22062 Comm: syz-executor.0 Not tainted 4.19.36 #4 [ 2979.749918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2979.759473] Call Trace: [ 2979.762076] dump_stack+0x172/0x1f0 [ 2979.765734] panic+0x263/0x51d [ 2979.768950] ? __warn_printk+0xf3/0xf3 [ 2979.772869] ? __device_add_disk+0xe63/0x10b0 [ 2979.777377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2979.783919] ? __warn.cold+0x5/0x54 [ 2979.787563] ? __device_add_disk+0xe63/0x10b0 [ 2979.792428] __warn.cold+0x20/0x54 [ 2979.795987] ? __device_add_disk+0xe63/0x10b0 [ 2979.800493] report_bug+0x263/0x2b0 [ 2979.804129] do_error_trap+0x204/0x360 [ 2979.808016] ? math_error+0x340/0x340 [ 2979.811824] ? bdi_register_va.part.0+0x4a/0x740 [ 2979.816585] ? error_entry+0x76/0xd0 [ 2979.820301] ? trace_hardirqs_off_caller+0x65/0x220 [ 2979.825319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2979.830161] do_invalid_op+0x1b/0x20 [ 2979.833990] invalid_op+0x14/0x20 [ 2979.837472] RIP: 0010:__device_add_disk+0xe63/0x10b0 [ 2979.842579] Code: ff ff 4c 89 e7 e8 bd 6c 8c fe e9 dc f2 ff ff e8 33 6d 8c fe e9 b7 f5 ff ff e8 39 0b 56 fe 0f 0b e9 92 fb ff ff e8 2d 0b 56 fe <0f> 0b e9 9a fe ff ff e8 11 e0 29 fe 4c 89 f7 e8 c9 6c 8c fe e9 e1 [ 2979.861497] RSP: 0018:ffff88805f387b08 EFLAGS: 00010246 [ 2979.866860] RAX: 0000000000040000 RBX: ffff88805f387bf0 RCX: ffffc90006080000 [ 2979.874134] RDX: 0000000000040000 RSI: ffffffff831539e3 RDI: 0000000000000005 [ 2979.881421] RBP: ffff88805f387c18 R08: ffff88805d3f2140 R09: ffffed1015d24733 [ 2979.888692] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: ffff88805b02ac80 [ 2979.895959] R13: ffff88805b02ad10 R14: 00000000fffffff4 R15: 0000000000000000 [ 2979.903284] ? __device_add_disk+0xe63/0x10b0 [ 2979.907810] ? __device_add_disk+0xe63/0x10b0 [ 2979.912330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.917094] ? blk_alloc_devt+0x2e0/0x2e0 [ 2979.921255] device_add_disk+0x23/0x30 [ 2979.925150] loop_add+0x650/0x8d0 [ 2979.928615] loop_control_ioctl+0x165/0x360 [ 2979.932947] ? loop_add+0x8d0/0x8d0 [ 2979.936574] ? __might_sleep+0x95/0x190 [ 2979.940564] ? loop_add+0x8d0/0x8d0 [ 2979.944194] do_vfs_ioctl+0xd6e/0x1390 [ 2979.948085] ? selinux_file_ioctl+0x46f/0x5e0 [ 2979.952603] ? selinux_file_ioctl+0x125/0x5e0 [ 2979.957109] ? ioctl_preallocate+0x210/0x210 [ 2979.961516] ? selinux_file_mprotect+0x620/0x620 [ 2979.966270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2979.971026] ? retint_kernel+0x2d/0x2d [ 2979.974936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2979.980480] ? security_file_ioctl+0x93/0xc0 [ 2979.984905] ksys_ioctl+0xab/0xd0 [ 2979.988375] __x64_sys_ioctl+0x73/0xb0 [ 2979.992275] do_syscall_64+0x103/0x610 [ 2979.996265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2980.001445] RIP: 0033:0x458da9 [ 2980.004636] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2980.023539] RSP: 002b:00007fcd0ebd6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2980.031248] RAX: ffffffffffffffda RBX: 00007fcd0ebd6c90 RCX: 0000000000458da9 [ 2980.038533] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 2980.045798] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2980.053073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcd0ebd76d4 [ 2980.060340] R13: 00000000004c20ba R14: 00000000004d4988 R15: 0000000000000005 [ 2980.068889] Kernel Offset: disabled [ 2980.072691] Rebooting in 86400 seconds..